What is our primary use case?
I have been using Proofpoint Email Protection as a part of our security operation workflow for monitoring and analyzing email-based threats across the organizations. Previously, I managed four clients, and I have been using Proofpoint Email Protection for two of them. Proofpoint Email Protection plays a very critical role in detecting phishing campaigns and malicious attachments and suspicious URLs before they reach the end users. One of the strongest aspects that I have noticed in Proofpoint Email Protection is its phishing and URL defense capability, content it triggres when user interact with any suspisous emails or links or attachments.
I have used Proofpoint Email Protection for more than two years. In my previous organization, I used Proofpoint Email Protection for approx 2 years.
In my environment, we primarily used the TAP (Targeted Attack Protection) cloud deployment.
What is most valuable?
Proofpoint Email Protection effectively identifies malicious links using URL rewriting and time of click analysis, which is very impressive. It significantly reduces the risk of users accessing malicious websites. In several cases during incident investigations, I observed that Proofpoint Email Protection successfully blocked most of the malicious links and blocked credentials harvesting attempts. It also helps prevent malware delivery through email attachments.
From the perspective of SOC analysts, the visibility provided through large threat logs and message trace functionality is very useful during investigations. When users report a suspicious email, I can quickly research and search that message, analyze it, and check the sender reputation and review the attachment behaviors in the sandbox, and it even tells how many days back suspicious or malicious domain has been registered.
I can also determine whether similar emails have been received by other end users. Additionally, Proofpoint Email Protection integrates well with security tools such as SIEM platforms. In our environment, alerts and logs can be correlated with security telemetry. This helps SOC analysts and even SOC interns can use it; it is very user-friendly. They can also identify the broader aspects of attack patterns, such as phishing campaigns targeting multiple users.
Another benefit of using Proofpoint Email Protection is that I can quickly analyze the email if someone or endusers reports it. Before analyzing, it provides the sender address, domain name, receiver name, subject, and the entire raw email header. With Proofpoint Email Protection, if I use it for three to four months, I will be able to find out the intention of the email; it is handy and easy.
What needs improvement?
There are very few areas where Proofpoint Email Protection could improve. The user interface can sometimes feel complex for some background employees. The policy configurations may require careful tuning to reduce false positives. While fine-tuning the policies and configurations, if something is a bit off, it can cause end users to receive malicious emails or suspicious emails.
Additionally, initial setup and progression policy optimizations may take some time depending on the organization's email environment. Overall, Proofpoint Email Protection is very powerful for all users, from less experienced end users to large organizations. It is very helpful.
One area they can improve is that although Proofpoint Email Protection analyzes the entire email and then delivers it to the end users, it should indicate the exact number of end users who have already received the email. I used to copy-paste the email subject into Microsoft Defender for hunting and analysis, but Proofpoint Email Protection should present these details in a very proper UI/UX design.
For how long have I used the solution?
I worked with Proofpoint Email Protection for approximately 2 years in my previous organization, primarily for monitoring and investigating email-based threats such as phishing, malicious attachments, and suspicious URLs.
What do I think about the stability of the solution?
I have not noticed any incidents or stability issues.
What do I think about the scalability of the solution?
Proofpoint Email Protection is scalable.
How are customer service and support?
I do not think I escalated anything to Proofpoint Email Protection, but I do not remember exactly. I do not think I have been in touch with Proofpoint technical team because everything was on the table; I used to use them. I do not think I created any tickets with Proofpoint technical team.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
In my previous organizations, we purchased Proofpoint Email Protection directly from Proofpoint because my previous organization used to spend a lot of money on tools to strengthen the security environment. I have been using a lot of tools; I even used KnowBe4 for security awareness training for our end users. My previous organization used to spend a lot of money on purchasing these kinds of tools that are the best in the market, and they purchased them directly from Proofpoint.
I have also worked with Cofense, which is a platform focused on phishing detection and response, particularly through user-reported phishing emails. When users click the “Report Phishing” button in Outlook, the suspicious email is forwarded to the security team or the Cofense platform for investigation. This allows security analysts to review, classify, and respond to potential phishing threats reported by end users.
However, compared to Cofense, Proofpoint Email Protection provides a broader email security capability because it functions as a secure email gateway. Proofpoint analyzes and filters malicious emails before they reach users’ inboxes using advanced threat detection techniques such as spam filtering, malware detection, and URL analysis.
In contrast, Cofense primarily focuses on post-delivery phishing reporting, investigation, and response workflows. This difference in functionality is one of the key distinctions between the two solution
For Proofpoint Email Protection, I had access to the dashboard and console.
What about the implementation team?
The deployment was done in-house. Our team did it ourselves. Our team and we deployed it with the help of Proofpoint technical team and our technicians; we deployed and configured everything.
What other advice do I have?
Proofpoint Email Protection provides strong protection against phishing and malicious attachments and email-borne threats. For organizations that rely heavily on email communications, they must use Proofpoint Email Protection. It is a very effective layer of defense that significantly strengthens the organization's security posture.
In many functions, it is handled within one dashboard. Because of this, I could investigate suspicious emails, malicious attachments, and suspicious URLs. That is how Proofpoint Email Protection console works, and it manages many tasks in one dashboard.
From the SOC perspective, the centralized logging and threat intelligence within Proofpoint Email Protection helps SOC analysts or any analyst to quickly identify the pattern of the attack and any campaigns, which might include suspicious campaigns, marketing campaigns, or phishing campaigns targeting multiple users. Overall, the capabilities in one simplified platform operation were good.
Regarding improvements, I used to see that our end users might have clients that started their company and became clients of our end users. Their domain used to get blocked in Proofpoint Email Protection because they started a few years ago, and their domain and email used to get blocked. Before doing any whitelisting, if the client end users reported that they were not receiving any emails from this vendor, I checked the entire websites and domain analysis and email analysis. After that, I whitelisted their domain. If any suspicious activity occurred, I asked them to communicate through other channels.
I have around 5,000 end users, and most of the email threats were already taken care of by Proofpoint Email Protection. However, a few attacker emails used to bypass so many email servers and push emails to the end users. Those kinds of emails, while they were suspicious and malicious, sometimes Proofpoint Email Protection failed to detect them. Some attackers utilized numerous email servers to deliver the malicious email payloads to the end users' mailboxes. Although Proofpoint Email Protection detects them, it does so after several hours.
Proofpoint Email Protection is important because communication with vendors and end users mainly happens through email. Organizations must invest in Proofpoint Email Protection. This is very important for securing email communications. Most attacks happen through emails themselves, whether through insider attacks or employee vulnerabilities. Organizations must use Proofpoint Email Protection. I rate this product an 8.5 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.