TAPping into your infosec capabilities with Proofpoint Targeted Attack Protection
April 19, 2019

TAPping into your infosec capabilities with Proofpoint Targeted Attack Protection

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

The Infosec team uses TAP to be alerted when threats occur, compromises may have happened, and actions may need to be taken. It gives us insight into the attacks that have occurred, a lot of background on them (if available), and who was targeted and who fell for the attacks. It helps us protect the company from attacks and quickly resolve them.
  • TAP allows administrators and authorized users to effectively analyze threats and identify all targets.
  • The tracking (did a user open an email, did they click a link and how many times) and analytics are a great asset to have for any IT admin.
  • The ability to flag specific users as VIPs or important folks you want to keep an extra measure of attention on.
  • Sometimes, it is difficult to determine what the threat did or the effect it had on the recipients. I think this is most difficult due to our inexperience, so I imagine this will be easier for us over time.
  • Saves IT time when an attack is successful and isn't reported in a timely manner or at all until damages are done. IT has to spend less time and effort because we are able to stop it before it spreads.
  • Protecting business resources and assets is a huge positive impact. TAP allows us to better protect our business and information within.
  • The only negative thing is that it doesn't automatically handle these attacks - but that is what TRAP is for! I wish Proofpoint bundled TAP and TRAP.
I have not evaluated other products like this. I've seen/trialed Barracuda protection, but not at a Targeted Attack Protection level.
I receive an email notification when someone clicks on a link in an email that originally was not a threat, but was later activated/determined by TAP to be malicious. This helps me to quickly jump into an event that may never get reported by the user. Multiple times I've reached out to the user before they said anything because they just thought the link was broken and ignored it. Or, they might have tried their credentials in a phishing scam and since it didn't work, simply emailed the attacker (unbeknownst to our user) that the credentials didn't work. User reporting is generally too slow and TAP allows infosec to quickly take action and often stop attacks before they can do any damage.