Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.
Network Manager at a non-profit with 201-500 employees
Filters out about 99.5% of all spam and offers email protection
Pros and Cons
- "The tool has improved our workflow by ensuring people receive only the emails they need for work rather than being inundated with hundreds or thousands of unnecessary emails daily."
What is our primary use case?
What is most valuable?
The tool has improved our workflow by ensuring people receive only the emails they need for work rather than being inundated with hundreds or thousands of unnecessary emails daily.
The most valuable feature of Proofpoint Email Protection is the ability to review and access quarantined emails. Sometimes, the tool may classify valid emails as spam, so being able to review and retrieve them is crucial.
The solution has all the plugins needed to integrate with Office 365.
For how long have I used the solution?
I have been using the product for ten years.
What do I think about the stability of the solution?
I rate the tool's stability a ten out of ten.
Buyer's Guide
Proofpoint Email Protection
January 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,757 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I rate the solution's scalability a ten out of ten.
How are customer service and support?
I am not allowed to contact security product vendors directly. However, I haven't had any issues with the solution.
What about the implementation team?
Our security team worked directly with Proofpoint Email Protection for the deployment; no consultants were involved. Its technical support team assisted us in setting up the solution.
What other advice do I have?
Proofpoint Email Protection is a standard email protection product and is gaining recognition as a leader in the field. It safeguards email systems. I rate the overall solution a ten out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director of Infrastructure and Security at a healthcare company with 1,001-5,000 employees
Catches more threats than most, but currently unstable with poor sales support
Pros and Cons
- "Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products."
- "Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
What is our primary use case?
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
What is most valuable?
Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products.
What needs improvement?
Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general.
Even their sales and support is deteriorating as well. I can't even get them to quote me for the next year, possibly because they are still in disarray from their sale.
Because of these issues, we are likely going to move away from it soon. I would prefer not to change, but I might not have a choice, especially if they can't even send me the proper quotes for everything.
For how long have I used the solution?
I have been using Proofpoint Email Protection for about five years now.
What do I think about the stability of the solution?
The stability of Proofpoint Email Protection is a problem right now, and I assume it has to do with their sale to Thoma Bravo.
These days, I would rate the stability a four of ten.
What do I think about the scalability of the solution?
We have somewhere between 4,000-6,000 users who are benefiting from the solution. However, when it comes to extending our usage, I'm not sure if we will go ahead with them because they're completely dropping the bomb on everything; they won't even respond to give me quotes to renew this year.
Licensing issues aside, I would rate the product an eight out of ten in terms of scalability.
How was the initial setup?
The initial setup was good, at least until the last 12 months after their sale. I would rate the setup process an eight out of ten.
What about the implementation team?
Our in-house team worked with Proofpoint's engineers for the deployment. It was a pretty quick process of setting up the email gateways and starting up the VMs in our hybrid environment. Overall, we only needed one person for the VMs and server setup, and one other person to take care of the security configuration and all the rest.
What was our ROI?
In terms of ROI as compared to their competitors, Proofpoint still has a very good phishing signature file, so they're probably catching 5-10% more threats than what the other products are catching. If you can keep it running, that is.
What's my experience with pricing, setup cost, and licensing?
They are competitively priced, but I have been forced to get quotes for other solutions now because they haven't been responding to requests to do the work that we would like them to do.
What other advice do I have?
My advice to others is to be cautious because they seem to be going through some changes (likely to do with corporate structuring issues) that are negatively affecting customer service and stability.
I would rate Proofpoint Email Protection a six out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Proofpoint Email Protection
January 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,757 professionals have used our research since 2012.
Senior Information Security Consultant at a financial services firm with 51-200 employees
The product protects organizations from malicious attacks, has no downtime, and has a responsible support team
Pros and Cons
- "There is no downtime."
- "The price could be improved."
What is our primary use case?
The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.
How has it helped my organization?
The product helps us with email archiving and indexing of emails.
What is most valuable?
All the security features in the tool are good enough. It provides ransomware protection. The solution is always available. There is no downtime. There is no loss of data. We also have Emergency Inbox services. If our Exchange Server is down, we could still retrieve our emails from Proofpoint’s cloud. The tool provides us with all the basic and advanced security features. The dashboard is quite good. I rate the product’s user experience and administrative interface a seven out of ten.
What needs improvement?
The price could be improved.
For how long have I used the solution?
I have been using the solution for two years.
What do I think about the stability of the solution?
I rate the tool’s stability a nine out of ten.
What do I think about the scalability of the solution?
The tool is very scalable. I rate the scalability a nine out of ten. We have around 200 users in our organization.
How are customer service and support?
The support team is very responsible. The onboarding activities are very good. The team provides support 24/7. All products have similar features. The quality of the product depends on the support. If the support is good, the product is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The solution we used previously was on-premise. It was too expensive to maintain. The annual maintenance costs were very high. We wanted to have a lower footprint on our data center. So, we chose a cloud-based service.
We were running two solutions parallelly. Proofpoint worked in the front, and Barracuda worked at the backend as a second layer of protection. Proofpoint caught malicious attacks 99.9% of the time. So, we stopped using Barracuda. We have also used Fortinet.
How was the initial setup?
The solution is cloud-based.
What's my experience with pricing, setup cost, and licensing?
The product is expensive. Cloud services are pricey. However, compared to an on-premise product, a cloud solution is much better. It reduces costs in the long run. I rate the pricing a five out of ten.
What other advice do I have?
I will recommend the solution to others. Overall, I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Operations Lead at a tech vendor with 1,001-5,000 employees
Scalable and easy to deploy but needs improvement in preventing phishing attacks
Pros and Cons
- "The most valuable feature is the option to edit the inbound security."
- "There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats."
What is our primary use case?
The primary use case of Proofpoint Email Protection is to ensure email security for both incoming and outgoing emails.
What is most valuable?
The most valuable feature is the option to edit the inbound security.
What needs improvement?
In terms of improvement, I have some concerns regarding the effectiveness of Proofpoint's phishing protection. There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats. There are other solutions on the market that do a good job with that.
For how long have I used the solution?
I have been using the solution for three years.
What do I think about the stability of the solution?
In terms of stability, the solution performs well. We have not experienced any issues or downtime.
What do I think about the scalability of the solution?
The solution is scalable enough for our organization. Approximately 2,000 people use it at our company daily.
Which solution did I use previously and why did I switch?
We are currently working with both Proofpoint and Abnormal Security, but we plan on completely switching to Abnormal Security soon. Proofpoint needs to work on its performance in handling spam and phishing and to improve its services when it comes to AI or ML-based solutions. Even if Proofpoint decides to roll out such features, it will take some time. There are competitors on the market who already offer those features, and that is why we opted for Abnormal Security.
How was the initial setup?
The initial setup is quite easy. It took one day to deploy the solution because our team needed to edit SPF, DKIM, and DMARC records, which took some time as well.
What other advice do I have?
My advice to people who are considering using Proofpoint would be to properly evaluate the services it offers. During the POC phase, you should assess all features offered, including phishing protection, and ensure they are up to date. You should compare Proofpoint with other vendors in the market before making a decision. Overall, I would rate the solution a six out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Vice President at a financial services firm with 10,001+ employees
A reasonably priced product that offers protection to emails, along with spam filters
Pros and Cons
- "The solution's technical support is good. I rate the technical support a ten out of ten."
- "The stability and UI are the two areas of the solution with certain shortcomings that need improvement."
What is our primary use case?
I use Proofpoint Email Protection as an email protection system.
What is most valuable?
The most valuable feature of the solution is the protection it offers to emails, along with the spam filters.
What needs improvement?
The stability and UI are the two areas of the solution with certain shortcomings that need improvement.
For how long have I used the solution?
I have been using Proofpoint Email Protection for four or five years. My company is a customer of the solution.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight out of ten.
I wouldn't say that the solution's stability is imperfect since it has been a stable tool. In our company, we see some notifications in the tool stating that certain login attempts are not happening successfully, but it is important to note that these issues happen rarely. The issue in the solution may be because of our lack of experience with the solution in our company.
A lot of people rely on the solution's UI. I often see the solution's UI go down, like once a month, which doesn't happen very often, in my opinion.
What do I think about the scalability of the solution?
It is a scalable solution. Scalability-wise, I rate the solution a ten out of ten.
How are customer service and support?
The solution's technical support is good. I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I had previously worked with an email protection system from Symantec.
How was the initial setup?
The initial setup of Proofpoint Email Protection is easy.
The solution is deployed on an on-premises model, along with a SaaS version. A PnP deployment is enough with the on-premises version, which is an appliance.
The solution's deployment process took around a week.
I was a part of the solution's deployment process, which was pretty much engaging professional services, putting requirements and other stuff in place before going for the validation part, making it a simple process.
What's my experience with pricing, setup cost, and licensing?
Proofpoint Email Protection is a reasonably priced product, which means that it is neither too low nor too high in terms of price.
I rate the price of Proofpoint Email Protection a seven on a scale of one to ten, where one is low, and ten is high.
What other advice do I have?
Proofpoint has many modules, allowing one to opt for the right module that fits into their business. Oversubscribing to modules in Proofpoint may not help, and it can get expensive after a certain point. I work for a financial organization, so I know emails and stuff coming over emails are considered critical in our company, and because of this, we are pretty much subscribed to most of Proofpoint's modules. I see a benefit from the product. The solution may not fit into some other organizations.
Though Proofpoint Email Protection has been a strong and stable product, I feel that Proofpoint can still do better. The support for the product has been great since the solution's support team has been very responsive and accommodating to our requests, especially regarding the enhancements we have put in the solution.
Proofpoint Email Protection has been a very good tool that has been very accommodating to our company's needs. The tool helps my company since it has a lot of capabilities, especially the feature to provide protection to emails. I don't have anything that I could complain about. My experience with the solution has been good, as it works the way I expected it to function.
The stability can get redundant because of ensuring the email system in an organization where every minute counts, and since it is deployed on a SaaS model, it becomes a critical infrastructure where an organization doesn't have much visibility. Organizations rely on vendor infrastructure, so I hope that Proofpoint does a better job there and ensures that the solution functions with the least downtime or on a no-downtime kind of model.
I rate the overall solution a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Marketing Manager at a consultancy with 11-50 employees
User-friendly and stable
Pros and Cons
- "The solution is very user-friendly."
- "The flexibility of the solution can be improved."
What is our primary use case?
The solution protects our mailboxes from phishing and scanning.
What is most valuable?
The solution is very user-friendly.
What needs improvement?
The flexibility of the solution can be improved. We have a history of a white labeling project that we completed with one of the largest worldwide telecom companies. We encountered a major issue with some blending cases, as it was almost impossible to meet the blending of colors or requirements expected by our customers within the white labeling project. This is not only a technical issue, but from a marketing perspective, it is also very important. A white hyperlink means that we have prepared a dedicated infrastructure specifically labeled. All parts of our service had to be labeled with a very specific brand, and it was very challenging to make it all happen.
For how long have I used the solution?
I have been using the solution for a few years.
What do I think about the stability of the solution?
The solution is stable.
How was the initial setup?
For customers unfamiliar with DNS settings, we created very specific instructions with informative graphics to make the process less complicated. If we had no knowledge, it could have been difficult, so we created several infographics to show the steps that needed to be taken, and it worked.
The time to deploy depends on if we have a dedicated person or team working on the deployment or if we have to pull someone off another job.
What about the implementation team?
The implementation is completed in-house.
What's my experience with pricing, setup cost, and licensing?
We have a very specific licensing setup for all the vendors we use for our infrastructure. The end customer is buying our solution, which can be for monthly or annual usage depending on our payment and business model. If someone is trying to test the imaging, the shortest period for testing is a free trial of either fourteen days or seven days or a paid period of one month. The customer does not need to worry about any licensing with Proofpoint, as this is included with our solution.
What other advice do I have?
I give the solution an eight out of ten.
We have almost 1000 people using the solution.
I recommend the solution to others.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Senior Information Security Analyst at a healthcare company with 1-10 employees
Powerful data analysis with robust algorithms, machine learning, and strong rules
Pros and Cons
- "The Phish Alarm button allows users to submit questionable emails for review and complete analysis."
- "The solution's server console and cluster dashboard have been the same for four years so need to be upgraded."
What is our primary use case?
Our organization is large and has multiple entities that use the solution.
Our department includes two senior information security analysts and two network analysts. We use the solution and as our main security filter for 90% of emails. Emails come into the domain, hit the gateway firsthand, and the solution filters for spam, phishing, malware, and virus attachments.
The TAP service integrates with the PPS API connection and analyzes every bit of email that goes through the system. Troublesome domains are blocked automatically without needing to be analyzed. If a specific email address is not blocked, the email gets released. TAP still analyzes the email, identifies whether it is a threat, and details its attributes such as the IP address, subject and content, and URL name.
All metadata for a threat email is sent from TAP to TRAP which goes back to the user's mailbox and automatically pulls the email so that it disappears. TRAP also identifies if the email has been distributed, even to 10,000 users, and attempts to pull back all instances. TRAP can pull internal emails but not external emails because it does not have access to external systems.
How has it helped my organization?
Our company uses the solution to its fullest potential.
A organization's security culture and investment defines how extensively they will use the solution. For example, Bank of America is a big company where security is important so they will spend millions of dollars improving their product. A smaller company with just 10,000 users might only do a certain level to improve.
Spam scoring is a feature for which usage varies. The solution scores emails from zero to 100 and companies can decide the level of acceptance. A level of 70 might block too many emails so users will complain. If you have 2,000 users, the complaints might cause you to loosen the rating constraints to 85 or so.
What is most valuable?
The solution's whole server is valuable because has robust algorithms, AI that learns what goes through a company's email server, and strong rules for analyzing data. Competitor's products are just standard email filters that block or pass with no ongoing AI for learning.
The security is very strong and comparatively better than Cisco CES. For example, in the last six months there has been an uptick in phishing campaigns or malicious email attachments purporting to come from Geek Squad. I see a substantial number of these troublesome emails pass through CES, Barracuda, and Mimecast but I have not seen a single email pass through the solution.
The Phish Alarm button allows users to submit questionable emails for review and complete analysis. A submitted email is analyzed in the cloud sandbox and the results are provided along with the actual email. Substantial information is included in this dynamic analysis such as email details, URLs, links, domains, ages of accounts, and what the email is intending to do. No other product offers this type of built-in email analysis. I have reviewed three different products including Cofense and they all send the email with its metadata to the user's security response team for manual review.
What needs improvement?
The solution's server console and cluster dashboard have been the same for four years so need to be upgraded. There is no feature-rich dashboard so searching emails is cumbersome and slow. The way Facebook, Gmail, and LinkedIn looked five years ago is not the same as today. Everything today is feature-rich and user-friendly.
For how long have I used the solution?
I have been using the solution for four years.
What do I think about the stability of the solution?
The solution is very stable with no issues in six years. I never have situations with the cloud going down or email going haywire. However, I have seen other products have these issues.
What do I think about the scalability of the solution?
The solution is scalable depending on your licenses.
How are customer service and support?
Technical support is excellent, very easy to access, and fast. It is easy to chat with support via the online community portal. They will point you in the right direction during chat sessions or set up a call with a support agent.
Which solution did I use previously and why did I switch?
This is the first solution our company has used.
How was the initial setup?
The deployment process is pretty easy.
The solution builds your cluster in the cloud and gives you a gateway, URL, MX records, and IP addresses. You then set up your DMS and MX records for your cluster and tie it to your email gateway. The process is pretty simple and can be done within a week.
Suppose all your emails and servers are from Microsoft 365 with mailboxes in the cloud. Once your domain is on the solution's cluster, it needs to be connected with the Microsoft email gateway. Think of a pipe where water goes from one end to the other. The solution sits at the entrance of the pipe to filter out bad particles. Filtered items go into the pipe or Microsoft's email gateway. Down the pipe there is an open tap which pours right into the user's glasses.
What about the implementation team?
We implement the solution for customers. Implementation takes one to three people depending on the size of the organization.
Our team handles any ongoing maintenance which is minimal.
What's my experience with pricing, setup cost, and licensing?
The solution uses a licensing model that is reasonable compared to other products. I rate pricing a nine out of ten.
Which other solutions did I evaluate?
I appreciate the solution because it is purely for email security.
What other advice do I have?
The solution is a great product and the best existing option in 2022. You will be very happy with the solution's security features.
I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Consultant (SIEM Admin) at a tech vendor with 10,001+ employees
Good at identifying threats, helpful sandboxing capabilities, and useful support
Pros and Cons
- "It's very good at identifying threats."
- "Sometimes it detects false positives."
What is our primary use case?
The solution is primarily used for email protection. However, it is not as good as EDR. It is good at handling privacy.
How has it helped my organization?
It's helped us when one of our senior managers got a fake email about getting a payment. The solution automatically flagged and notified us.
What is most valuable?
It's great for email protection.
It's very good at identifying threats.
There is useful sandboxing available.
The pricing is very reasonable. This is an affordable product.
Technical support is very good.
What needs improvement?
Sometimes it detects false positives.
We'd like the sandbox to integrate with the on-prem device.
It needs to identify the paths and signatures. We'd like advanced machine learning for detection.
We'd like the have more lunch and learns to get more out of the solution.
For how long have I used the solution?
I've used the solution for around two years.
What do I think about the stability of the solution?
I'd rate the stability five or six out of ten. It's okay. It's not perfect.
What do I think about the scalability of the solution?
I'd rate the scalability around six or seven out of ten. It's decent.
We have around 100 people using it.
How are customer service and support?
Technical support is quite good. We are happy with the level of support we receive.
How would you rate customer service and support?
Positive
How was the initial setup?
It was quite easy to set up.
We have about four people able to deploy and maintain the product.
What was our ROI?
I have witnessed an ROI after using it.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable. I'd rate the pricing one out of ten in terms of affordability. It is not expensive at all.
What other advice do I have?
I've been using the latest version of the solution.
If you understand email technicalities like email authentication, you will have an easy time with the solution. I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Proofpoint Email Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Secure Email Gateway (SEG) Email Security Advanced Threat Protection (ATP) Digital Risk Protection Office 365 ProtectionPopular Comparisons
Microsoft Defender for Office 365
Cloudflare One
Check Point Harmony Email & Collaboration
Palo Alto Networks WildFire
Cisco Secure Email
Microsoft Exchange Online Protection (EOP)
Mimecast Advanced Email Security
Abnormal Security
Fortinet FortiMail
Trend Micro Worry-Free Services Suites
Barracuda Email Protection
Barracuda Email Security Gateway
Buyer's Guide
Download our free Proofpoint Email Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:



















