TrustRadius: an HG Insights company

Proofpoint Intelligent Compliance

Score8.3 out of 10

11 Reviews and Ratings

What is Proofpoint Intelligent Compliance?

Launched in August, 2022 and replacing Proofpoint Archiving and Compliance, Proofpoint's Intelligent Compliance Platform offers enterprises regulatory compliance safeguards while simplifying corporate legal protection practices. The platform offers AI-powered collection, classification, detection, prevention, search, eDiscovery, supervision, and predictive analytics, helping companies to meet complex compliance and information governance obligations.

Proofpoint Intelligent Compliance - An end-to-end protection for your digital communications

Use Cases and Deployment Scope

There was lots of misconduct in our organization, and we need to make it streamline by using a software and then we implement the Proofpoint Intelligent Compliance. It is working well and intelligently detect misconduct in a second and having the capability to reduce the time of investigation review. It is a nice protection at user level end-to-end.

Pros

  • Detecting misconduct
  • Manage data in unified and compliant way
  • End-to-end protection

Cons

  • Proofpoint Archive needs to be fine tunned
  • Automate has to be more advance. M/L needs to upgrade
  • Immutable data store needs to work well in all environments

Most Important Features

  • Proofpoint Capture
  • Proofpoint Patrol
  • Proofpoint Archive

Return on Investment

  • Positive - Investigation time of review
  • Positive - Unified data management
  • End-to-end protection

Other Software Used

LogicGate

Proofpoint Intelligent Compliance. Save yourself the time and effort and choose the right product the first time.

Use Cases and Deployment Scope

It is used to supervise a vast array of digital communications for corporate and regulatory compliance protection.

Pros

  • Communications management and control
  • Communications captures
  • Retain communication in full fidelity

Cons

  • We reviewed multiple products and Proofpoint Intelligent Compliance checked all the boxes.
  • Nothing lacking for our use cases.

Most Important Features

  • Proofpoint Discover
  • Proofpoint Supervision
  • Proofpoint Track
  • Proofpoint Archive

Return on Investment

  • Being a Non-Profit pricing is always a challenge. Proofpoint worked with us and provided discounts making the solution cost effective.
  • We have a small team and with a few tweaks we were able to get the product up and running. Which we appreciated.

Other Software Used

Cisco DNA Center, Palo Alto Networks WildFire, Secureworks Counter Threat Unit (CTU)

A Useful Tool for Privacy-Focused Organizations.

Use Cases and Deployment Scope

We use Proofpoint Intelligent Compliance in order to bolster our in-house Cybersecurity Training and train our employee base on better Cybersecurity practices. We utilize the Phishing Simulation tool most often but have recently started to use Proofpoint's available training resources and videos as additional learning material regarding phishing and general good practices.

Pros

  • Phishing Simulation.
  • Having a variety of Training content.
  • Updating the content of the tools regularly.

Cons

  • Implementing a lot of the custom features requires calls to Proofpoint support.
  • Cost of the tool is quite pricey.
  • The Phishing Simulation tool interface could be updated for easier use.

Most Important Features

  • Phishing Simulation Tool.
  • Training content such as videos and interactive exercises.
  • Ability to sync users with our Active Directory.

Return on Investment

  • Strengthened our staff's Cybersecurity Skills.
  • Provided a variety of additional training content that is used throughout the year
  • Allowed us to track and monitor which of our users need additional training in regard to Cybersecurity

Other Software Used

Jira Service Management, Skillsoft Percipio (Skillport), Emburse Chrome River Invoice

Proofpoint at a glance

Use Cases and Deployment Scope

We use Proofpoint primarily for email archiving for all users for the retention period of 6 years. Users are allowed to view their personal archives and we can also give access to other user archives for use cases such as an employee leaving our institution and their supervisor needing access to any ongoing email strings, including attachments. We also utilize Proofpoint's email and information protection. This includes an email firewall, allowing us to scan and allow or quarantine all emailing coming into our exchange server, and creating rules that limit what can be sent to and from our user emails. We also utilize Proofpoint's secure mail feature to encrypt all outgoing external emails. Lastly, we utilize Proofpoint's targeted attack protection as another line of defense with the email firewall to scan all incoming emails to quarantine and re-write malicious links and phishing attempts targeted at our users.

Pros

  • Email archiving. Being able to access, on the fly, your entire email archive. Being able to filter by date, sender, attachment, etc. It can get really granular and is able to pull up records fast.
  • Targeted Attack Protection for all incoming emails. Having the ability to automatically scan, quarantine, or re-write URLs within emails. Comparing incoming emails to potential phishing attempts already seen by other institutions.
  • Email encryption & automatic encryption are based on certain rules set up on the firewall. e.g. automatically encrypt outgoing email if it has an attachment or contains a string of numbers that may be personal information.

Cons

  • Email archiving is part of a hosted solution, meaning if something on Proofpoint's end goes down, it can lead to extended downtime. We've had times when our users were unable to access their archives for hours in a day. Proofpoint is good about communicating when outages occur though.

Most Important Features

  • Email archiving for set retention period
  • Email encryption
  • Email protection/firewall
  • Targeted Attack Protection (TAP)
  • Secure Share

Return on Investment

  • Although I cannot provide any concrete numbers for positive ROI. I can say with confidence that after implementing Proofpoint Archiving, there has never been a negative impact on our bottom line or any negative impact on our company as a whole. If anything there have been only positive outcomes where a user would need to recover a lost email, or if a user accidentally sends an email to an external party unencrypted, our firewall policies will automatically encrypt the email for them protecting us and the external customer. There are also countless times when an incoming email did contain malicious attachments or links where Proofpoint automatically re-wrote the links and protected our users from potential threats.

Alternatives Considered

Proofpoint Advanced Threat Protection, Proofpoint Email Protection and Proofpoint Targeted Attack Protection (TAP)

Other Software Used

Proofpoint Targeted Attack Protection (TAP), Veeam Backup for Microsoft 365

Proofpoint Archiving and Compliance has positives and negatives.

Pros

  • Mapping emails to specific users allow it to be organized and accessible to each end user.
  • SSO makes it easy for end users to log in and view their archives.

Cons

  • The end-user interface is lacking in appeal/aesthetics and is not that intuitive. I have seen archive solutions that don't work very well have a better interface than this. I think the interface can be prettied up quite a bit.
  • The admin interface is lacking in features and is not intuitive. It has more capabilities than the previous archives I've used, but utilizing these features is a little complicated without demos or being walked through it.
  • We have had a lot of accounts not map properly. Apparently, there is a limit as to how many errors can be outstanding before you run into issues because all the emails tied to those issues are "queued" waiting for a home (and there is a storage limit for that). I have to set a reminder to check that periodically and resolve the issues manually.

Return on Investment

  • Eventually, we will be consolidating our archives into this solution. Having all archives in one location (from various migrations over the years) will cut down on admin time for legal matters, as well as not having to worry about duplicate emails from different archives.
  • Admins will not have to search for emails that users deleted or can't find and now need. They can find their own emails.
  • We can grant access to our legal team to run their own search and gather projects, which takes a decent amount of time off IT admins' plates.

Alternatives Considered

Sonian Archiving and Microsoft Office 365

Other Software Used

Microsoft System Center Configuration Manager