Email threat protection for loosely connected devices
November 29, 2019

Email threat protection for loosely connected devices

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

Proofpoint Targeted Attack Protection is being used across the entire organization for both inbound and outbound email protection. We currently have TAP integrated with PPS and the Threat Response product form Proofpoint. This system has drastically reduced our mean time to detect and respond to email-related attacks. Our previous tool for this effort was O365 ATP. Proofpoint TAP is far superior at detection and response than what O365 ATP provides.
  • Detecting post-delivery weaponization of URLs.
  • Attachment inspection and detection.
  • Email retrieval once an incident is detected.
  • Select the treatment of VIP users that allows for enhanced protection.
  • Proofpoint TAP provides great insight into attack campaigns.
  • It allows for faster response to zero-day attacks.
  • User-interface could use improvement.
  • Better details on detonation information emails from my own organization. Show me exactly what email and path from the sandbox.
  • The mean time to detect is less than 5 minutes.
  • TAP provide sub 1 minutes response time.
  • Executives and leadership seldom see the impact of an email threat because of the automation and detection from TAP. This is a huge win from IT because of the high visibility email has on today's organizations.
I have used Cisco IronPort in the past and there is no comparison to the protection that Proofpoint TAP provides. With systems that are not on-prem and other corporate-owned devices,
like cell phones and iPad's, corporate-owned anti-x controls are not always able to maintain currently updated signatures. With TAP our loosely connected devices are always protected from email threats.
Proofpoint Cloud App Security Broker (Proofpoint CASB), Proofpoint Email Protection, Proofpoint Threat Response Auto-Pull
Proofpoint TAP provides excellent protection for post weaponization of URL based phishing emails. Its ability to restore a URL and kick off the automation is especially helpful. Proofpoint's integration with other vendors also allows the organization to extend protection across the enterprise both for on-prem devices and loosely connected devices.

Proofpoint Targeted Attack Protection (TAP) Feature Ratings