Email threat protection for loosely connected devices
November 29, 2019
Email threat protection for loosely connected devices
Score 10 out of 10
Vetted Review
Verified User
Overall Satisfaction with Proofpoint Targeted Attack Protection for Email
Proofpoint Targeted Attack Protection is being used across the entire organization for both inbound and outbound email protection. We currently have TAP integrated with PPS and the Threat Response product form Proofpoint. This system has drastically reduced our mean time to detect and respond to email-related attacks. Our previous tool for this effort was O365 ATP. Proofpoint TAP is far superior at detection and response than what O365 ATP provides.
Pros
- Detecting post-delivery weaponization of URLs.
- Attachment inspection and detection.
- Email retrieval once an incident is detected.
- Select the treatment of VIP users that allows for enhanced protection.
- Proofpoint TAP provides great insight into attack campaigns.
- It allows for faster response to zero-day attacks.
Cons
- User-interface could use improvement.
- Better details on detonation information emails from my own organization. Show me exactly what email and path from the sandbox.
- The mean time to detect is less than 5 minutes.
- TAP provide sub 1 minutes response time.
- Executives and leadership seldom see the impact of an email threat because of the automation and detection from TAP. This is a huge win from IT because of the high visibility email has on today's organizations.
I have used Cisco IronPort in the past and there is no comparison to the protection that Proofpoint TAP provides. With systems that are not on-prem and other corporate-owned devices,
like cell phones and iPad's, corporate-owned anti-x controls are not always able to maintain currently updated signatures. With TAP our loosely connected devices are always protected from email threats.
like cell phones and iPad's, corporate-owned anti-x controls are not always able to maintain currently updated signatures. With TAP our loosely connected devices are always protected from email threats.
Comments
Please log in to join the conversation