Proofpoint Targeted Attack Review
November 29, 2019

Proofpoint Targeted Attack Review

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

We have Proofpoint Targeted Attack Protection (TAP) deployed across the entire organization. We rolled out Proofpoint TAP to detect malicious email attachments and URLs to malicious websites and websites attempting to steal employee credentials.
  • Proofpoint TAP does a good job of tracking malicious campaigns and providing a portal where my team can confirm which employees were targeted by each campaign.
  • Proofpoint TAP does a good job of detecting malicious attachments.
  • Proofpoint TAP does a good job of continually updating its threat intelligence so if we were targeted early in a campaign before it had been detected it will send us a notification if there is a match between emails we have already received that threat intelligence now classifies as malicious.
  • While Proofpoint TAP does perform URL protection it has room for improvement on how it detects URLs going to credential-stealing websites. Our employees report emails with credential-stealing URLs on a daily basis that were not blocked by Proofpoint TAP.
  • While Proofpoint TAP does provide basic reports of files it analyzes, the reports do not provide enough information to understand what the malicious file activity was. in contrast, publicly available sandboxes provide that information for free.
  • While Proofpoint TAP does provide a dashboard that allows us to view the emails associated with threat campaigns, the dashboard views and reports have significant limitations on the timeframe we can search by. Some of the dashboards/views/reports are limited to 14 days. We need to report findings based on monthly and quarterly trends which are not possible with the current timeframe limitations.
  • We do not expect our security solutions to provide ROI.
  • While we have not experienced a breach of our enterprise, there has been a somewhat negative impact on our overall business objectives given the number of emails with credential-stealing URLs Proofpoint TAP has allowed into our environment.
We selected Proofpoint TAP as part of the email security solution we were planning to deploy. We did not do an active bake off between specific features, like Proofpoint TAP, when we were evaluating different vendors.
Proofpoint TAP is well suited for enterprises that are being targeted by attackers sending traditional malicious email attachments and malicious URLs. Its lets suited for enterprises that are being targeted by attackers focused on sending emails without attachments or URLs to 'benign' websites that do not have exploits, but do attempt to convince the employee to log in and provide their username and password.

Proofpoint Targeted Attack Protection (TAP) Feature Ratings