Overall Satisfaction with Proofpoint Targeted Attack Protection for Email
Targeted Attack Protection (TAP) for Email is used across the entire enterprise. TAP gives us a layer of protection against the numerous attack vectors that exist in the cyberworld.
- Attachment Defense. This component scans all attachments for malicious content, quarantining anything suspicious. This is a must have for any legitimate email protection product.
- URL Defense. With so many phishing attempts out there that try to lure the unsuspecting user into clicking a link to a malicious web site, URL Defense provide an invaluable safety net by encoding the URL and re-routing it to Proofpoint's "sandbox". If legitimate, it seamlessly redirects the user to the original URL. Despite your best efforts at education, a percentage of your end users will click the link. Knowing that TAP is sandboxing those links to test for malicious activity is protection we cannot live without.
- TAP Dashboard. This lets me see who's being targeted in my environment as well as provide metrics that tell me how effective the protection has been. We're able to identify our "VIP's" so that we can receive special alerets whey they come under attack.
- It's a stretch for me to find something that needs improvement. If I had to put at least one thing it would relate to URL Defense. The process works great but, there are times when you have to decode the encoded URL. Currently, the only place to do that is in the TAP dashboard. To save clicks and logins, it would be nice to have that decode functionality in the Proofpoint management console.
- No other issues.
- I believe this has been one of the best protection offerings we have used. It's hard to quantify an ROI on something like this but, at the same time, you cannot put a price on the safety it affords.
We started with Barracuda and it served our purposes well but we outgrew it. The same could be said of Forcepoint. Over time, we simply noticed that more and more of the bad stuff was getting through the filter and, no matter how we tweaked the settings, we couldn't stop it. Proofpoint made an immediate impact. We did a POC with Proofpoint in-line behind Forcepoint and could see how it was catching things that Forcepoint missed every day.
Proofpoint Targeted Attack Protection (TAP) Feature Ratings
Using Proofpoint Targeted Attack Protection for Email
2000 - Administration, Support, Clinical
3 - Primarily, the ones who support the product have a networking background with a degree of familiarity with how email systems work.
- Phishing prevention.
- Anti-malware.
- Anti-spoofing.
- There were no unexpected uses for this product.
- There are no additional ways this product can be used by our organization as it stands today.
Evaluating Proofpoint Targeted Attack Protection for Email and Competitors
Yes - Forcepoint. We replaced it because it simply wasn't working effectively.
- Price
- Product Features
- Product Usability
- Product Reputation
Features would have to be the most important factor in our decision to purchase Proofpoint. It had all the features we wanted, and then some.
I can't begin to imagine how I would change my process.
Proofpoint Targeted Attack Protection for Email Implementation
- Implemented in-house
Yes - We implemented inbound protection first, then added outbound protection.
Change management was minimal - The implementation was fairly seamless to the end user so change management was not an issue.
- The only issues we encountered revolved around us understanding how the product worked; specifically, how it differed from our previous solutions.
Proofpoint Targeted Attack Protection for Email Support
Pros | Cons |
---|---|
Quick Resolution Good followup Knowledgeable team Problems get solved Kept well informed Immediate help available Support understands my problem Support cares about my success Quick Initial Response | Escalation required |
Yes - It was included in our initial purchase.
Every support request I've had has been satisfactory; but, what I really like is the quarterly heath check that they do to help ensure that I've not made a policy change that will weaken my protection.
Using Proofpoint Targeted Attack Protection for Email
Pros | Cons |
---|---|
Like to use Relatively simple Easy to use Technical support not required Well integrated Consistent Quick to learn Convenient Feel confident using Familiar | None |
- Spam detection
- Visus detection
- Email Firewall
- Email Authentication
- Understanding how policy routes and whitelisting works.