Proofpoint TAP gives excellent visibility of threats coming into your network.
August 15, 2019

Proofpoint TAP gives excellent visibility of threats coming into your network.

Fraser Clark | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

Proofpoint TAP is being used by our entire organisation, which is a multi-national company with offices in central Europe. With TAP, we are able to see malicious attachments & links that are being sent to our organisation. It gives us excellent insights into our users and what sort of attacks we are seeing come in.
  • URL rewriting. TAP can rewrite URLs to obfuscate potentially harmful links. And if it is harmful, then we can see this in the dashboard and respond appropriately.
  • Attachment defense is particularly impressive. We see 99% of attachments which are potentially malicious being blocked.
  • Reporting. The reporting in TAP is fantastic and provides great insight into our organisation. It's the sort of reports the senior management are interested in.
  • The dashboard can be a bit tricky to understand. There is a lot of info, and it can be confusing at first to figure out what certain phrases mean.
  • Drilling down into attack dashboards, I would expect some items to be clickable to get more info. But they are not which means I have to search around for the information I want.
  • Again, the effectiveness dashboard does not have a lot of clickable elements, but they look like they should be which is frustrating.
  • Proofpoint TAP has helped us pass our annual pen-test, while also working in tandem with TRAP.
  • In the last month, we have seen 99% of all potentially malicious attachments blocked and 85% of URL threats blocked.
  • We have identified several VAP (very attacked people) who we now have rules created for and keep an eye on for potential threats.
I think Proofpoint Targeted Attack Protection (TAP) is suited to larger organisations that can also afford to purchase Threat Response Auto-Pull (TRAP) from Proofpoint, as these work in tandem very, very well.
With smaller organisations, it could potentially provide a lot of work investigating things found within TAP rather than just having TRAP deal with the issues automatically.

Proofpoint Targeted Attack Protection (TAP) Feature Ratings