No more typing reviews! Try our Samantha, our new voice AI agent.

Proofpoint Email Protection vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 5, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (13th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Proofpoint Email Protection
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
99
Ranking in other categories
Advanced Threat Protection (ATP) (3rd), Digital Risk Protection (3rd), Office 365 Protection (1st), Secure Email Gateway (SEG) (2nd)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (11th)
 

Mindshare comparison

As of May 2026, in the Email Security category, the mindshare of Cloudflare One is 1.7%, up from 1.6% compared to the previous year. The mindshare of Proofpoint Email Protection is 7.2%, down from 8.1% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.2%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Proofpoint Email Protection7.2%
Trellix Collaboration Security2.2%
Cloudflare One1.7%
Other88.9%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Vivek_Jaiswal - PeerSpot reviewer
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees
Advanced email defenses have protected healthcare staff and simplified incident response
There are many things that could be improved, but once you are very well-known about this application, you could perform that improvement plan. There are many scenarios where I have worked with Proofpoint Email Protection where a requirement was not fulfilled due to the limitation of the product. For example, we have Report Phish automation. With Proofpoint Email Protection, we can configure Report Phish and forward the email to any email addresses or shared mailboxes that we provide in the configuration. That email is forwarded as is with whatever the user reports as a phishing email. However, some organizations do not want the reported phishing email to go as is into their ticketing tool because it might contain malicious attachments and malicious links that are not required to go into their internal organization. Proofpoint Email Protection has that limitation. They cannot forward or restrict, but could forward only limited information such as some header information, sender subject details, or only limited information. As it is, the email can be forwarded, not as limited information. Proofpoint TRAP solution also has limitations. It cannot create alert notifications for some specific requirements because Proofpoint works the way it is designed, and if you want it to work based on our requirement, that should not be possible. There is a scope of limitations here. There are many improvements that should be made. First, they should work on their false positive minimization. Proofpoint generally takes all emails, investigates them, and classifies them. There are many situations where legit emails are blocked because that domain is found to be under a malicious category somehow, but actually it is not. False positive minimization could be improved, and they could enhance their other applications or solutions. There are many things that they could improve from each application and each portal.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare is simple to use."
"Cloudflare DDoS is better than its competitors for its security, deployment, and scalability."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"Enables me to work from two locations."
"Cloudflare Access is part of the Zero Trust philosophy."
"Clover is the best product globally."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"A one-stop shop for email protection"
"Proofpoint is number one in terms of market share worldwide, and we recommend it to clients because of its rich features in email protection, cloud protection, and backup targeted attack protection."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"Proofpoint Email Protection has positively impacted my organization by simplifying the analysis of emails since it provides segregated statements that highlight the important parameters we need to check, allowing us to efficiently conclude if the alerts are false positives or true positives."
"The stability is good; there are no bugs or glitches, it doesn't crash or freeze, and it's reliable."
"From a business perspective, the solution was very helpful as it speeded our business flow and increased email delivery."
"It's a mature product. It does a good job in detection."
"It's easy to use, even for those new to IT."
"FireEye is good for malware depicting and security."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"The product protects my email."
"A specific example of how I have used Trellix Collaboration Security in my consulting work is in my current work environment, where I manage over 130,000 endpoints, allowing me to protect each endpoint with a firewall, which makes a significant difference because the entire network is not protected by a network firewall alone."
"In my experience, the best features related to Trellix Collaboration Security concern the protection against threats."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"I'd recommend the product due to the fact that it can stop most of the phishing and malicious items from getting through our email."
 

Cons

"Our customers no longer use Cloudflare because its service is subpar."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"For the topic of improvement, providing some training material is one of my suggestions."
"The onboarding process can be improved a little bit."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
"Proofpoint Email Protection could improve by allowing more customization of the reports, such as exceptions and black-and-white lists."
"Proofpoint Email Protection could improve on the training. Every organization is different and to fine-tune it to block everything properly there needs to be better training."
"It's scalable, but the devil's in the details — you have to know your email volumes."
"The flexibility of the solution can be improved."
"The incident reporting on offer needs to be improved. It's lacking right now. It should be on the platform somewhere."
"Proofpoint Email Protection can be improved in that it is quite a large product, so learning how to be fully conversant in it can take some time within the team; this is probably the biggest challenge at the moment for us, getting everyone fully conversant to support the product."
"The initial setup is complex."
"It really is a good product, but in my view, it needs to improve detection based on behaviors."
"The spam detection feature could be better."
"If you really need something powerful to handle multiple routes and delivery points then this solution might not be for you."
"I would like to see this solution become more flexible."
"Trellix Collaboration Security can be improved by making the reporting and analysis tools more detailed."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"We're not really that satisfied with technical support. They are too slow to respond."
 

Pricing and Cost Advice

"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"The solution is not that expensive."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The solution uses a licensing model that is reasonable compared to other products."
"Proofpoint is fairly expensive."
"The end customer is buying our solution, which can be for monthly or annual usage depending on our payment and business model."
"The solution is expensive."
"The price is reasonable."
"It is on a yearly basis. Their floor for SMB doesn't matter. The user count is 100 users and below at $2,500 a year. Its cost is higher than other solutions. It is probably about 20% to 30% higher than what you would get with Microsoft. There are no additional costs. All costs are factored in. It can be improved pricing-wise so that it is affordable for the SMB market."
"Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost."
"Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees."
"The solution requires a license to be purchased for every user."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The licensing is on a yearly basis."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
8%
Manufacturing Company
6%
Financial Services Firm
12%
Manufacturing Company
9%
Computer Software Company
8%
Comms Service Provider
6%
Manufacturing Company
14%
Construction Company
12%
Comms Service Provider
11%
Healthcare Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business28
Midsize Enterprise24
Large Enterprise53
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Proofpoint Email Protection?
This is not something that I deal with regarding pricing, setup cost, and licensing.
What needs improvement with Proofpoint Email Protection?
For a beginner level, someone who is very new to email security might find it difficult to manage as an admin. Naviga...
What is your primary use case for Proofpoint Email Protection?
Proofpoint Email Protection serves as our email security solution. The entire SOC team uses Proofpoint Email Protecti...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Proofpoint Enterprise Protection, Proofpoint Digital Protection
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Proofpoint Email Protection vs. Trellix Collaboration Security and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.