Next-Generation Leading Email Security Leader
September 07, 2019

Next-Generation Leading Email Security Leader

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Email Protection

We are using Proofpoint Email Protection across our whole organization to filter out spam,
bulk, viruses and unwanted email from ever getting to our end-users. We are using it for inbound and outbound mail flow.



  • Proofpoint uses a multi-layered approach in terms of scanning emails. Each and every message has to pass through different layers like Proofpoint Dynamic Reputation, virus protection, spam protection, targeted attack protection(URL defense and attachment defense) to be judged as bad email or clean email.
  • Proofpoint is very effective in blocking spam emails and reducing false positives with its MLX and SCSC technology.
  • Proofpoint's approach is different from the traditional email security tool in blocking the imposter emails. We have observed that 80% of the imposter emails are blocked by Proofpoint even though it can evade easily any filtering solution because imposter emails don't have any malicious attributes.
  • I have used almost all features in Proofpoint such as TLS, secure messaging, DLP, dictionaries, custom firewall rules, end-user digest, etc. It helps a lot to protect our environment from a cyber attack.
  • I feel Proofpoint has to improve the logs and reporting feature as it is not accurate some times.
  • Firewall rule can not be created in the middle of an order as per our choice, it has to be manually moved up or down.
  • It would be better if Proofpoint could block the message that matches the imposter display name that we add under imposter display name option. But Proofpoint doesn't block those messages, it just increases or decreases the imposter score.
  • Proofpoint's capability and product maturity to combat cyberattacks is very effective, so it is really worth investing in this tool.
  • Proofpoint Targeted Attack Protection provides excellent protection and high visibility to threats entering into our organization.
  • Threat Response Auto-Pull gives us the ability to pull the malicious emails out of the user's inbox before the end-users access it.
  • Email Fraud Defense blocks socially engineered attacks such as business email compromise (BEC) and consumer phishing.
Proofpoint is aggressive in blocking malicious attachments. The cloud sandboxing is very effective and blocks 99% of the attachment threat. Proofpoint's URL rewrite option hugely reduces the chance of allowing end-users to access a phishing site.

Proofpoint Email Protection Feature Ratings

Anti-malware
10
Customizability
10
Data Loss Protection
10
Threat Detection
9
Sandboxing
9
End-to-End Encryption
10
Management Tools
10