TAP protection helps users not get tapped by malicious links
December 13, 2018

TAP protection helps users not get tapped by malicious links

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

We use Proofpoint Targeted Attack Protection (TAP) company-wide. It solves for us web links that were good at the time the email was sent in, then the website becomes malicious later or is found to be malicious later. TAP identifies and alerts us about the users that have clicked the link that went from good to bad, when they clicked it an how often. That information saves us a ton of wondering who did what, how often and who is affected. It focuses our efforts on the correct people.
  • Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad.
  • Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code.
  • Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.
  • Proofpoint needs to get a single sign-on for all the different portals.
  • Positive ROI through better use of my technicians - we can determine who clicked any bad links and when.
  • Positive ROI - Even though malicious links that were good became bad - we know we don't have to track down the email users and prevent them from clicking. We can just email them and tell them not to click it and delete it, if they don't - the software protects them anyway.
I used Proofpoint Essentials product first, but it was far inferior to this Proofpoint product. It did not cover nearly what I expected and was a poor substitute. I had to migrate to Proofpoint Enterprise to get the true functionality needed.
I've found it suited to our entire environment. It has proved to be a good layer of protection for email links.