Proofpoint Rules!
September 11, 2019
Proofpoint Rules!

Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Proofpoint Email Protection
We are using it to align security practices and provide protection from email threat vectors. Proofpoint is used across most of the organization. There are some outliers that are not protected by Proofpoint. It serves to protect many protected resources from access due to malware and virus outbreaks. It addresses users unknowingly hitting links and or attachments within the email system.
- Improves security vectors in email.
- Sandboxing bad URL and detonating malicious email content.
- Using the product frees up time for other admin tasks.
- The web interface.
- Nothing else, the product is great.
- Phishing campaigns to educate users.
- Protection for data loss prevention.
- Encryption of critical data.
When doing the research for different competitors, it was clear that there are only a few players in the market place that have the needed capabilities to secure the environment as Proofpoint does. Proofpoint is far and above the other competitors in the space of email protection.