Great product!
November 11, 2021
Great product!
Score 10 out of 10
Vetted Review
Verified User
Overall Satisfaction with Proofpoint Targeted Attack Protection for Email
Currently, at my organization, Proofpoint Target Attack Protection, also known as TAP, is used by the SOC and also our Threat Intelligence team. The SOC uses it by researching emails that they get alerted on, and the cyber threat intelligence team uses it to research campaigns that target our organization.
Pros
- Details on specific malicious email campaigns
- Details on the users that are targeted by those campaigns
- Use of API's to be used with other cyber tools your company has
- Insight on the types of malware and types of campaigns
Cons
- Better user import capabilities
- MITRE alignment
- Stronger campaign capture
- Campaign tracking
- Whaling
- Department targeting
This is the first product of its kind that I've used personally. The last 3 companies that I worked for also used Proofpoint, which includes Proofpoint Targeted Attack Protection, so I don't have a way to really compare it. I have seen that it is a leader in the industry.
Do you think Proofpoint Targeted Attack Protection (TAP) delivers good value for the price?
Yes
Are you happy with Proofpoint Targeted Attack Protection (TAP)'s feature set?
Yes
Did Proofpoint Targeted Attack Protection (TAP) live up to sales and marketing promises?
Yes
Did implementation of Proofpoint Targeted Attack Protection (TAP) go as expected?
Yes
Would you buy Proofpoint Targeted Attack Protection (TAP) again?
Yes
Comments
Please log in to join the conversation