

Darktrace and Proofpoint Email Protection are leading names in cybersecurity solutions. While Darktrace is strong in AI-driven threat detection and network security, Proofpoint stands out in advanced email protection. Based on customer needs, Proofpoint might have an edge for those prioritizing email security for its high accuracy in detecting advanced threats.
Features: Darktrace's notable features include AI-driven threat detection, rapid anomaly identification, and a robust alert system providing comprehensive network visibility and real-time insights. Proofpoint excels in email security, with advanced email filtering, URL scanning, and sandboxing, offering a streamlined user experience that effectively blocks phishing and other malicious content.
Room for Improvement: Darktrace could enhance its false positive rate, improve integration with SIEM solutions, and make its interface more user-friendly. Extending its endpoint protection would provide broader security coverage. Proofpoint may improve its integration capabilities for complex environments and refine its search functionality for more flexible operations. Both solutions could review pricing to become more accessible for smaller organizations.
Ease of Deployment and Customer Service: Darktrace offers on-premises deployment with positive feedback on responsive technical support, important during complex setups. Proofpoint, primarily cloud-hosted, is praised for its easy deployment and minimal technical support needs. Both companies provide reliable customer service for efficient issue resolution.
Pricing and ROI: Darktrace, with its pricing model based on device monitoring, can be costly, particularly for larger setups. However, its AI capabilities justify the investment for many users. Proofpoint, with similar pricing, is valued for effective email threat mitigation, providing appreciable ROI by reducing email-based risks. Despite the high cost, both solutions offer effective security that many organizations find financially beneficial.
Other NDR solutions provide virtual appliances that can be deployed on virtualization servers to get up and running quickly.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
The ideal situation would be to have all these portals combined into one unified dashboard.
The time required for email investigations and responses has changed with Proofpoint Email Protection's visibility and automation.
If you implement these kinds of solutions in your security stack, the first beneficial thing will be that you will not suffer any malware, and you will not face attacks, which ultimately leads to financial benefit.
The technical support from Darktrace is of high quality.
Darktrace provides excellent technical support with a monthly meeting to review platform incidents, ensuring the system functions as expected.
The challenge lies in waiting for a response after logging a ticket.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
I rate customer support a three out of ten mainly because of the phishing attacks that are getting through.
Sometimes I get some really great responses and analysts, but sometimes when their cloud services have a failure, they are slow to respond and tell me about it, though they have been improving.
Darktrace has high scalability, and I would rate it a nine out of ten.
Since it's cloud-based, it expands easily.
There is still a gap in terms of storage, and we are trying to figure out how to increase that capacity for regulated environments, which require data retention for 5 to 6 years.
Proofpoint is scalable for multi-site organizations with thousands of users.
Proofpoint Email Protection is a scalable solution that very much fits our capacity requirements.
Proofpoint Email Protection is quite scalable.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
For stability, I would rate Darktrace an eight out of ten.
It was very rock solid.
Sometimes, when creating connectors for implementing with Google Workspace, we encounter challenges because both Google Workspace and Proofpoint Email Protection do not have very good documentation on how to do this.
When evaluating the stability of Proofpoint Email Protection in regards to downtime, bugs, and glitches, it comes and goes in waves.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
They say they can integrate with most firewalls, but when we did an integration with Meraki MX firewalls, that integration didn't work and still doesn't work to this day.
We need Darktrace on each branch to get the data out, and I suggest having some kind of a centralized product that gets data from multiple sources to aggregate and provide the data.
The older legacy user interface just took a little to work with, and the new unified interface, as it was able to do more and more of the functionality of the old one, the product just got easier and easier to use.
Proofpoint could expand its phishing detection capabilities to improve its efficiency.
More security could be implemented.
The product is considered expensive compared to others.
The pricing is costly in USD, and they charge based on device counts.
The licensing cost is approximately eight dollars a year.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Given my other experience with other vendors, I think they are a bit on the high end and a bit on the pricey end for the email security functionality that we were using.
Additional costs do come in, but it enhances security.
It is capable of responding to lateral movement and ransomware deployment within environments where there is data exfiltration.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
If I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
The main feature I find most effective is that Proofpoint Email Protection scans emails and quarantines the doubtful ones.
The most beneficial feature of Proofpoint Email Protection is mostly spam filtering; it was very efficient, and we were very happy with the functionality as only relevant emails were allowed for mailboxes.
I appreciate that it's the industry leader, and its firewalling is very easy to manage and implement.
| Product | Market Share (%) |
|---|---|
| Proofpoint Email Protection | 8.1% |
| Darktrace | 2.2% |
| Other | 89.7% |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 19 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 15 |
| Large Enterprise | 21 |
Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
Darktrace offers a proactive and intelligent approach to cybersecurity. It utilizes AI algorithms to learn and understand the 'pattern of life' for every user and device within a network. This understanding enables it to detect anomalies that could signify a cyber threat, from subtle insider threats to more obvious ransomware attacks.
Its adaptability, autonomous response features, and comprehensive network visibility make it a top-tier solution for different sizes of organizations and across many industries. It was named one of TIME magazine’s ‘Most Influential Companies’ in 2021 and protects over 8,800 organizations globally from advanced cyber threats.
Darktrace Cyber AI Loop
The Darktrace Cyber AI Loop introduces an advanced artificial intelligence-based system for cybersecurity, designed to build a self-improving defense mechanism. This system functions like a closed loop, where each stage feeds information and insights into the next, amplifying the overall effectiveness of the platform.
The key components of the loop are:
Darktrace's AI algorithms can identify threats that traditional security tools might miss. It continuously learns and updates its understanding of what is normal for each environment, ensuring that it can quickly detect and respond to unusual activities that could indicate a breach. Darktrace's Antigena module can autonomously respond to threats in real time. This is particularly crucial in containing fast-moving threats like ransomware, where every second counts.
Darktrace's solution provides unparalleled visibility into all parts of the network, including cloud services, IoT devices, and industrial control systems. This comprehensive coverage ensures that no part of the network is left unprotected. However, while the Darktrace Cyber AI Loop offers a robust solution, it is not a complete cure-all and requires careful implementation and integration with existing security frameworks.Darktrace offers a comprehensive and unified approach to cybersecurity. It provides continuous protection against known and unknown threats, regardless of where they emerge. Darktrace's solutions provide visibility into your cloud infrastructure, continuous monitoring of application usage and communication patterns (e.g., identification of suspicious actions like unauthorized data access), comprehensive email security that goes beyond traditional spam and phishing filters, real-time protection for endpoints, and continuous monitoring of network traffic and device activity.
Darktrace also provides specialized coverage to secure your zero-trust architecture. Identifies compromised identities, unauthorized access attempts, and risky data exfiltration within a least-privilege environment. Finally, it has a dedicated solution for safeguarding industrial control systems and critical infrastructure. Monitors communication patterns, device behavior, and physical access within OT environments, protecting against operational disruptions and cyberattacks.
Proofpoint Email Protection provides powerful filtering against spam, phishing, and malware, leveraging effective threat detection and blocking capabilities. This solution integrates smoothly with platforms like Office 365, offering a user-friendly dashboard for seamless operations.
Proofpoint Email Protection focuses on email security, ensuring protection against phishing, malware, and spam. It includes features like URL scanning, anti-phishing, anti-virus protection, and sandboxing for comprehensive threat analysis. Its advanced analytics through TAP and TRAP, along with strong integration abilities, make it appealing for handling email threats. While scalability and ease of deployment are advantages, challenges such as integration in complex environments, the cost, and limited local support require attention. Enhancements in search functionality, email encryption, and improved phishing detection are also needed.
What are the key features of Proofpoint Email Protection?
What benefits and ROI should users look for in reviews?
Industries adopting Proofpoint Email Protection include finance, healthcare, and education sectors, which benefit from its robust email security measures. Educational institutions prioritize safe communication for staff and students, while healthcare organizations focus on protecting sensitive patient data. Financial services benefit from preventing data breaches and fraud through advanced threats management.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.