A necessity most enterprises can't live without.
December 10, 2018
A necessity most enterprises can't live without.
Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Proofpoint Targeted Attack Protection for Email
We utilize Proofpoint's Targeted Attack Protection services to protect our entire enterprise of over 18,000 individuals. One of the highest risk attacks we've been dealing with is that of the ever evolving "phishing" and ransomware/malware type attacks. Proofpoint's services have provided solid protection to our organization minimizing that risk, along with providing us with a high level of insight into the threats.
Pros
- The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites.
- The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems.
- The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies.
- The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages.
- Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.
Cons
- The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly.
- Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.
- This really boils down to what is the cost to an organization related to data leakage associated with compromised credentials? Phishing attacks continue to be on the rise and are getting increasingly sophisticated. The Proofpoint TAP services provide a solid platform to mitigate this type of threat.
- Compromised accounts where are the then used for outbound attacks or spamming never look good when they are originating from your domain. How much is one's reputation worth?
We implemented both Microsoft's Advanced Threat Protection at the same time as Proofpoint's Targeted Attack Protection. We ended of dropping the Microsoft solution, even though it was a lower cost, based on Microsoft's poor support and lack of insight related to the threat analysis.
Comments
Please log in to join the conversation