Proofpoint Rules!
September 11, 2019

Proofpoint Rules!

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Email Protection

We are using it to align security practices and provide protection from email threat vectors. Proofpoint is used across most of the organization. There are some outliers that are not protected by Proofpoint. It serves to protect many protected resources from access due to malware and virus outbreaks. It addresses users unknowingly hitting links and or attachments within the email system.
  • Improves security vectors in email.
  • Sandboxing bad URL and detonating malicious email content.
  • Using the product frees up time for other admin tasks.
  • The web interface.
  • Nothing else, the product is great.
  • Phishing campaigns to educate users.
  • Protection for data loss prevention.
  • Encryption of critical data.
When doing the research for different competitors, it was clear that there are only a few players in the market place that have the needed capabilities to secure the environment as Proofpoint does. Proofpoint is far and above the other competitors in the space of email protection.
Proofpoint is well suited for reporting, TAP and TRAP. The product works well on-premises as well as in the cloud. To not have a product like Proofpoint in your enterprise is a mistake. It is a fantastic product to protect your data and secure the enterprise. Professional services and training are stand-out characteristics for the company and product.

Proofpoint Email Protection Feature Ratings

Data Loss Protection
Threat Detection
End-to-End Encryption
Management Tools