TrustRadius: an HG Insights company

Proofpoint Email Protection

Score8.7 out of 10

217 Reviews and Ratings

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Top Performing Features

  • Anti-malware

    Anti-malware is a type of software program designed to prevent, detect and remove malicious software

    Category average: 9.1

  • End-to-End Encryption

    In end-to-end encryption the data is encrypted on the sender's system or device and only the recipient is able to decrypt it

    Category average: 8.4

  • Threat Detection

    Threat protection defend against sophisticated malware or hacking-based attacks targeting sensitive data.

    Category average: 8.7

Areas for Improvement

  • Customizability

    Customizing email security gateways can improve detection capabilities

    Category average: 7.7

  • Sandboxing

    Sandboxing is a software management strategy that isolates applications from critical system resources and other programs providing an extra layer of security

    Category average: 7.3

  • Data Loss Protection

    A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

    Category average: 7.5

Proofpoint Email Protection the Good Solutions

Use Cases and Deployment Scope

I use Proofpoint Email Protection, I had the several problems of SPAM, Phishing, Malware and same thing like that. Proofpoint Email Protection resolved more than 90% of issues with e-mails. The process the deployment was good, however was necessary make several tests to work perfectly due the Proofpoint Email Protection have several options to e-mail filter.

Pros

  • Good detection
  • Many features
  • Enterprise solutions

Cons

  • The e-mails rules could work as firewall, for example, after the e-mail match in the first rule, the e-mail not pass to more rules.
  • More Flexibility to edit the SPAM engine/detection.

Return on Investment

  • Excellent Detection
  • Easy Deployment
  • Easy Deployment

Usability

Alternatives Considered

Sophos Email and Sophos Central Device Encryption

Other Software Used

Sophos Intercept X, SonicWall TZ, Bitdefender GravityZone, WatchGuard AuthPoint, Watchguard Endpoint Security

Proofpoint Email Protection is a high performance worker and reliable system.

Pros

  • System runs fast and stable.
  • The upgrade process is running very good without major issues.

Cons

  • The reporting system is very simple and needs improvement for business cases and investigation of incidents.
  • The log viewer section needs improvement regarding handling.

Return on Investment

  • You will get your ROI, if you resell the system as a service.

Alternatives Considered

Cisco IronPort Web Security Appliance

Like the Tidy Bowl Man, works so you don't have to.

Pros

  • Implementation was the best I have ever encountered. They reviewed every switch, setting, and their implication during a half dozen sessions. This allowed me to almost achieve a set it and forget it installation which has lasted years.
  • Their periodic reviews are helpful as well as this is a deep product and you need to stay current.
  • And of course why we bought it, Proofpoint has contributed to stopping malware infections. We have not had an infection since it was installed!

Cons

  • I have a few issues with their support. First, it is an external site so you must go there and login to request assistance. This is inconvenient, especially with 2 sets of credentials. Second, no phone support until/unless you put in the ticket. I get the point, but sometimes time is of the essence. Third, as with many companies, sometimes you get into a ping pong 'battle of the SysAdmin wits'. I think their personality is that they like toying with you. In other words, multiple question and answers back and forth unless/until you call. I would expect they pick up the phone and call after the first question, so I do.
  • Getting to know the product is challenging, but this is only if you don't use it daily and because it is so deep of a product. Not a negative, just a fact.

Return on Investment

  • Can't really measure it but not having infections, ransomware, or breaches is priceless.

Other Software Used

CylancePROTECT, Zscaler Web Security, LogRhythm

ProofPoint Email Protection: Buy it, you won't be sad!

Pros

  • Customization of email firewall rules allows for detailed prevention of specific attacks.
  • Email Fraud Defense portal gives very detailed authentication information and errors to our team as we work toward full DMARC compliance.
  • The ability to insert email warning tags at the ProofPoint level prevents additional O365 mail flow rules.

Cons

  • The administrative portal is a little complex. Would like to see a more "user friendly" portal to find everything we need.
  • When creating email firewall rules, we have to manually move the rule up using the arrows into the position we want it. Would like to specify the position in the rule stack during creation.
  • When finding emails in smart search, it would be ideal to take action on the emails in the same search area rather than clicking on the email, redirecting to the quarantined folder, then having the option to take action.

Return on Investment

  • Our business loves the ability to release their own quarantined emails. This has saved ample time for admins searching for them in O365.
  • It really allows us to enforce email security policies much better without much direct impact on our users.

Alternatives Considered

Microsoft 365 (formerly Office 365)

Other Software Used

Proofpoint Targeted Attack Protection for Email, Proofpoint Threat Response Auto-Pull

Usability

Helps a lot at time of incident. A true friend

Pros

  • Searching capability is good. Can search with domains.
  • Quarantined mails can be downloaded & investigated for additional IOCs.
  • You can block senders & whitelist any sender with PP.

Cons

  • Refresh time should be increased in domain-based login.

Return on Investment

  • Searching mail for a specific recipient or mails with a specific subject was much easier.

Other Software Used

Proofpoint Targeted Attack Protection for Email, Arcsight Enterprise Security Manager (formerly HP Arcsight)