Proofpoint Email Protection is primarily used for anti-spam purposes. As other companies receive a lot of malware, phishing emails, and unwanted bulk email, Proofpoint Email Protection stops unwanted email from getting through to mailboxes.
Information Security Analyst at a government with 11-50 employees
Real User
Top 20
Feb 26, 2026
My main use case for Proofpoint Email Protection is to block malicious or suspicious emails as per my role. Proofpoint Email Protection is our email filtering tool and we do our DMARC using Proofpoint Email Protection as well. So basically it's our email security tool overall. I use Proofpoint Email Protection almost every day. As a security analyst, I'm responsible for investigating suspicious emails that the staff report. Once I investigate the email and determine that the sender is suspicious or malicious, I take their email address, or even the domain and block it in Proofpoint Email Protection so that they cannot send any further email. For me that's my main use case, my day-to-day thing.
My main use case for Proofpoint Email Protection is for protecting email and email security to prevent business email compromise and malicious email from reaching our users. Proofpoint Email Protection helps in stopping malicious emails from getting to our users, such as phishing emails and emails with malicious attachments. Proofpoint Email Protection does quarantine multiple malicious emails in our environment, and an example would be an email recently with a malicious website asking the user to log in; Proofpoint was able to detect that the URL was malicious and block and discard the email.
Infrastructure Engineer at a government with 1,001-5,000 employees
Real User
Top 20
Feb 25, 2026
My main use case for Proofpoint Email Protection is email protection and policy setup. For email protection and setting up policies, especially for encryption, we use encrypted emails to send out and the URL Defense feature. These are policies that we set up, along with safe attachments for any attachment protection.
Infrastructure Analyst at a consultancy with 51-200 employees
Real User
Top 5
Feb 25, 2026
Proofpoint Email Protection is used to set up filters to review and filter out threats from emails, managing security posture and inbox security. Additionally, it helps create rules and policies to filter out potentially malicious emails, thus defending the environment and reducing risks to users.
Release lead at a financial services firm with 10,001+ employees
Real User
Top 10
Feb 25, 2026
My main use case for Proofpoint Email Protection is DMARC and DKIM, which assists me in ensuring that emails are delivered and not tampered with. I have been using Proofpoint Email Protection for multiple years, predominantly for DKIM and DMARC. At this stage, I do not have anything else to add about my main use case or how I use Proofpoint Email Protection.
My main use case for Proofpoint Email Protection is to handle phishing emails. When an email comes from a spoofed email or domain, we get alerted, and we check the domain and attachments flowing from that email. Proofpoint directly redirects any suspicious emails to us as an alert, allowing us to check the authentication paths such as SPF, DKIM, and DMARC, and we also analyze the suspicious IPs or domains. Another use case with Proofpoint TAP involves checking if the URL in the email is blocked or re-injected by Proofpoint. If blocked, it redirects to a sandbox environment to keep users safe from attacks. Re-injected URLs mean the user is protected when they unknowingly click on malicious content.
Threat Hunter at a manufacturing company with 10,001+ employees
Real User
Top 20
Feb 4, 2026
I pretty much summarize and cover everything about my main use case or how I use Proofpoint Email Protection. If I look at the statistics of our daily inbound email, I can gladly say that one of the best features Proofpoint Email Protection offers is that approximately 60 to 65% of the emails that are being targeted to my organization are being blocked. All of the spam, the junk, the bulk, the low reputation, the unwanted emails, and those that have bad intention with viruses are all stopped at the gate. I think this is one of the best use cases that I can call out with Proofpoint Email Protection. The subsequent best use case would be Clear and TRAP, which helps to reduce the time we spend on investigating every email that gets reported from the end user. Lastly, TAP ATO gives us a bit of peace of mind to monitor logins and tell us when there is a suspicious login that we should be aware of. Before, what would happen in the past is every single email that gets reported, we would have to reply and triage those emails individually. I would look at the email and then have to reply to the reporter and tell them whether this is good or bad, and why. The entire process was manual. With TRAP and Clear working hand in hand together, I have automated analysis. If there is a manual review required, we have pre-configured workflows on Proofpoint Email Protection. All we have to do is trigger the workflow based on what we feel the classification of the reported email is. The percentage is still not up to par. We were expecting more automated classification or automated dispositions from Proofpoint Email Protection. Nevertheless, the good thing is we are not triaging every single email individually and not typing out the reply individually as well. That is a good feature to call out, but I would expect a little more enhancement from Proofpoint Email Protection in the future. We have seen a reduction in phishing incidents with Proofpoint Email Protection, but not fully. It is not 100%. There are still cracks within the walls of Proofpoint Email Protection that let this type of email in for various reasons. Either the content is sitting behind a password protected page or document. We do see a reduction. I unfortunately cannot put a statistic to it yet, but there is reduction, and this could even be a little better.
Senior Security Engineer at DCIPHERS IT SOLUTIONS (P) LTD
Real User
Top 5
Feb 3, 2026
I started working with Proofpoint Email Protection one year ago. Before that, I was working as a DLP guy in Data Loss Prevention. When I changed my companies, my current company is more focused towards Proofpoint Email Security. I got to know about email security and started learning. Now I am in a state where I am able to implement the tool, and I know how the policies are being processed and how it is getting done. Proofpoint Email Protection has certain two modes. The first one is Core Email Protection. I am currently using the P0 bundle, which is offering Core Email Protection with SEG, which is Secure Email Gateway. Apart from that, TAP, which is Targeted Attack Protection, includes URL Defense and Attachment Defense. Apart from that, we have Threat Protection and Cloud Threat Protection. These certain things I have been using. I am using Core Email Protection. Proofpoint is for the enterprise customer, and they are focused only on the cloud solution. Some of the solutions are providing on-premises as well, but for email security, they specifically work on the cloud portals. Our company is working rigorously with Proofpoint as a partner, where we are pitching this solution to the customers that we are handling, positioning the product of email security from Proofpoint. That is why we are more into it.
Solution Architect Cybersecurity at a computer software company with 5,001-10,000 employees
Real User
Top 10
Feb 2, 2026
From a solution architect perspective, I do not have day-to-day operational exposure to Proofpoint Email Protection, but I have conducted multiple demos, design discussions, and solution evaluations focused on email threat protection. I primarily work with the SaaS deployment model, typically procured through authorized vendors rather than directly from Proofpoint. The environments I support range from 20,000 to 70,000 users, where Proofpoint integrates tightly with SOC operations. When integrated with a SOC, Proofpoint provides consolidated phishing alerts that are easy for L1 analysts to understand and act upon. Analysts can quickly validate indicators (e.g., via VirusTotal), enrich alerts, and build SOAR automations around phishing response.
Sr Security Engineer at a comms service provider with 201-500 employees
Real User
Top 10
Jan 30, 2026
My use case with Proofpoint Email Protection was primarily as a secure email gateway, and all of those sound like they describe the same thing. I know Proofpoint Email Protection has a big product portfolio, and we had other products that filled some of the other services that they also offered.
Our main use case for Proofpoint Email Protection is using the whole suite of services, including CASB, DLP, URL protection, email security, and other components. I have configured 365 email to filter all emails through Proofpoint Email Security, and we have alerts set up for any critical or high severity incidents, receiving alerts for business email compromise and phishing attacks. We also conduct phishing training, which are some of the day-to-day tasks that we use it for.
Senior Cybersecurity Specialist at a retailer with 10,001+ employees
Real User
Top 20
Sep 11, 2025
I have about three years of experience with Proofpoint products. I gained experience with this product while working in the retail industry. We deploy it in the cloud.
Logistics Manager at a educational organization with 501-1,000 employees
Real User
Top 10
Feb 27, 2025
I use Proofpoint Email Protection ( /products/proofpoint-email-protection-reviews ) to filter and scan doubtful emails. The solution screens emails, quarantines suspicious ones, and only sends through legitimate emails.
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365.
We use it for user queries. For example, if a user flags that they're not receiving emails from a particular sender, we investigate where it got blocked in Proofpoint, if it was delivered successfully, or if it was quarantined. We also onboard new domains, adding SPF and DKIM records to the DNS records so that all incoming mail is processed by Proofpoint before reaching the internal network.
Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.
The product serves as my company's enterprise email security platform. Everything related to the emails in my company comes through Proofpoint Email Protection.
Senior Information Security Consultant at Dimah Capital
Consultant
Jan 30, 2024
The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.
Senior Information Security Engineer at a energy/utilities company with 201-500 employees
Real User
Dec 12, 2023
We use the solution to filter out spam from our end users, block malicious attacks, and add banners to the emails if they're from suspicious senders. If there's a suspicious link, we'll have a URL to open it in a browser.
Director of Infrastructure and Security at Halifax Health
Real User
Jan 18, 2023
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
Most customers interested in Proofpoint Email Protection have problems with spam, or their email security solution cannot detect phishing or spam, so they want to replace it with Proofpoint Email Protection.
Manager Technology - Advanced Analytics and Data Management at Mashreq
Real User
Nov 14, 2022
I have been using Proofpoint Email Protection for the emails that we receive to determine if there is any suspicious attachment or content. It will detect and give us an alert on our dashboard. From there we can pick up the alerts and review and take action to mitigate the risk.
Proofpoint Email Protection is used as an email security platform to detect all kinds of malware, viruses, and unethical acts being done through email solicitations.
Information Technology Security Risk Manager at a healthcare company with 1,001-5,000 employees
Real User
Jan 12, 2022
Our primary use case of Proofpoint Email Protection is focused around data loss prevention (DLP). To protect against spam, viruses, incoming and outgoing mail.
Data Security Engineer at a tech services company with 11-50 employees
Real User
Aug 10, 2021
Our primary use case is the encryption tooling of email security. Emails sent externally are automatically encrypted as is all the information included. There are some DLP related options available in Proofpoint, which we enabled with the help of classifying the emails, like internal, external, private, public, sharing. That's our main use. We are customers of Proofpoint.
Information Technology Help Desk Technician at a consumer goods company with 51-200 employees
Real User
Mar 19, 2021
We use it as a corporate or as an exchange email filter to protect, to stop any executables from coming through email, and to halt phishing scams. Basically, the product is for email security. We use it for our network. Also, if a user thinks that they didn't get an email, we can access the Proofpoint dashboard and go find missing mail that either people didn't get so we can rerelease it to them. Or if it did get quarantined, we can release and approve a sender. You can blacklist and whitelist sender lists. If you are getting phishing scams that get through the filter, you can end up shutting those down. You can actually block the entire domain so that domain can never email you ever again. If there is an external email outside of your network or your company, you can whitelist them if it's an unknown sender, so you don't ever have to worry about missing their emails.
Principal Consultant at a tech services company with 201-500 employees
Consultant
Mar 2, 2021
We use this solution as a firewall for our email environment; it's basically a reputation-based service. It denies the connection from known bad sites. That's the biggest protection they have when you go to the antivirus and anti-spam modules. They even have an encryption piece in it.
Security Professional at Qatar Computer Services WLL
Real User
Jan 11, 2021
We are service providers who recommend products for our customers. Our customer's license expired and we suggested Proofpoint Email Protection. Our customers are enterprise companies.
Director at a tech services company with 51-200 employees
Real User
Jan 22, 2020
Proofpoint is number one in terms of market share worldwide. We recommend it to clients because of its rich features. It offers a lot of choices. We primarily use the solution because of its rich features in email protection. It also provides protection for the cloud. It provides backup targeted attack protection features as well.
Proofpoint Email Protection provides powerful filtering against spam, phishing, and malware, leveraging effective threat detection and blocking capabilities. This solution integrates smoothly with platforms like Office 365, offering a user-friendly dashboard for seamless operations.
Proofpoint Email Protection focuses on email security, ensuring protection against phishing, malware, and spam. It includes features like URL scanning, anti-phishing, anti-virus protection, and sandboxing for...
Proofpoint Email Protection is primarily used for anti-spam purposes. As other companies receive a lot of malware, phishing emails, and unwanted bulk email, Proofpoint Email Protection stops unwanted email from getting through to mailboxes.
My main use case for Proofpoint Email Protection is to protect our company emails from suspicious attacks as it serves as an email security gateway.
My main use case for Proofpoint Email Protection is to block malicious or suspicious emails as per my role. Proofpoint Email Protection is our email filtering tool and we do our DMARC using Proofpoint Email Protection as well. So basically it's our email security tool overall. I use Proofpoint Email Protection almost every day. As a security analyst, I'm responsible for investigating suspicious emails that the staff report. Once I investigate the email and determine that the sender is suspicious or malicious, I take their email address, or even the domain and block it in Proofpoint Email Protection so that they cannot send any further email. For me that's my main use case, my day-to-day thing.
My main use case for Proofpoint Email Protection is for protecting email and email security to prevent business email compromise and malicious email from reaching our users. Proofpoint Email Protection helps in stopping malicious emails from getting to our users, such as phishing emails and emails with malicious attachments. Proofpoint Email Protection does quarantine multiple malicious emails in our environment, and an example would be an email recently with a malicious website asking the user to log in; Proofpoint was able to detect that the URL was malicious and block and discard the email.
My main use case for Proofpoint Email Protection is email protection and policy setup. For email protection and setting up policies, especially for encryption, we use encrypted emails to send out and the URL Defense feature. These are policies that we set up, along with safe attachments for any attachment protection.
Proofpoint Email Protection is used to set up filters to review and filter out threats from emails, managing security posture and inbox security. Additionally, it helps create rules and policies to filter out potentially malicious emails, thus defending the environment and reducing risks to users.
My main use case for Proofpoint Email Protection is DMARC and DKIM, which assists me in ensuring that emails are delivered and not tampered with. I have been using Proofpoint Email Protection for multiple years, predominantly for DKIM and DMARC. At this stage, I do not have anything else to add about my main use case or how I use Proofpoint Email Protection.
My main use case for Proofpoint Email Protection is to handle phishing emails. When an email comes from a spoofed email or domain, we get alerted, and we check the domain and attachments flowing from that email. Proofpoint directly redirects any suspicious emails to us as an alert, allowing us to check the authentication paths such as SPF, DKIM, and DMARC, and we also analyze the suspicious IPs or domains. Another use case with Proofpoint TAP involves checking if the URL in the email is blocked or re-injected by Proofpoint. If blocked, it redirects to a sandbox environment to keep users safe from attacks. Re-injected URLs mean the user is protected when they unknowingly click on malicious content.
I pretty much summarize and cover everything about my main use case or how I use Proofpoint Email Protection. If I look at the statistics of our daily inbound email, I can gladly say that one of the best features Proofpoint Email Protection offers is that approximately 60 to 65% of the emails that are being targeted to my organization are being blocked. All of the spam, the junk, the bulk, the low reputation, the unwanted emails, and those that have bad intention with viruses are all stopped at the gate. I think this is one of the best use cases that I can call out with Proofpoint Email Protection. The subsequent best use case would be Clear and TRAP, which helps to reduce the time we spend on investigating every email that gets reported from the end user. Lastly, TAP ATO gives us a bit of peace of mind to monitor logins and tell us when there is a suspicious login that we should be aware of. Before, what would happen in the past is every single email that gets reported, we would have to reply and triage those emails individually. I would look at the email and then have to reply to the reporter and tell them whether this is good or bad, and why. The entire process was manual. With TRAP and Clear working hand in hand together, I have automated analysis. If there is a manual review required, we have pre-configured workflows on Proofpoint Email Protection. All we have to do is trigger the workflow based on what we feel the classification of the reported email is. The percentage is still not up to par. We were expecting more automated classification or automated dispositions from Proofpoint Email Protection. Nevertheless, the good thing is we are not triaging every single email individually and not typing out the reply individually as well. That is a good feature to call out, but I would expect a little more enhancement from Proofpoint Email Protection in the future. We have seen a reduction in phishing incidents with Proofpoint Email Protection, but not fully. It is not 100%. There are still cracks within the walls of Proofpoint Email Protection that let this type of email in for various reasons. Either the content is sitting behind a password protected page or document. We do see a reduction. I unfortunately cannot put a statistic to it yet, but there is reduction, and this could even be a little better.
I started working with Proofpoint Email Protection one year ago. Before that, I was working as a DLP guy in Data Loss Prevention. When I changed my companies, my current company is more focused towards Proofpoint Email Security. I got to know about email security and started learning. Now I am in a state where I am able to implement the tool, and I know how the policies are being processed and how it is getting done. Proofpoint Email Protection has certain two modes. The first one is Core Email Protection. I am currently using the P0 bundle, which is offering Core Email Protection with SEG, which is Secure Email Gateway. Apart from that, TAP, which is Targeted Attack Protection, includes URL Defense and Attachment Defense. Apart from that, we have Threat Protection and Cloud Threat Protection. These certain things I have been using. I am using Core Email Protection. Proofpoint is for the enterprise customer, and they are focused only on the cloud solution. Some of the solutions are providing on-premises as well, but for email security, they specifically work on the cloud portals. Our company is working rigorously with Proofpoint as a partner, where we are pitching this solution to the customers that we are handling, positioning the product of email security from Proofpoint. That is why we are more into it.
From a solution architect perspective, I do not have day-to-day operational exposure to Proofpoint Email Protection, but I have conducted multiple demos, design discussions, and solution evaluations focused on email threat protection. I primarily work with the SaaS deployment model, typically procured through authorized vendors rather than directly from Proofpoint. The environments I support range from 20,000 to 70,000 users, where Proofpoint integrates tightly with SOC operations. When integrated with a SOC, Proofpoint provides consolidated phishing alerts that are easy for L1 analysts to understand and act upon. Analysts can quickly validate indicators (e.g., via VirusTotal), enrich alerts, and build SOAR automations around phishing response.
My use case with Proofpoint Email Protection was primarily as a secure email gateway, and all of those sound like they describe the same thing. I know Proofpoint Email Protection has a big product portfolio, and we had other products that filled some of the other services that they also offered.
Our main use case for Proofpoint Email Protection is using the whole suite of services, including CASB, DLP, URL protection, email security, and other components. I have configured 365 email to filter all emails through Proofpoint Email Security, and we have alerts set up for any critical or high severity incidents, receiving alerts for business email compromise and phishing attacks. We also conduct phishing training, which are some of the day-to-day tasks that we use it for.
I have about three years of experience with Proofpoint products. I gained experience with this product while working in the retail industry. We deploy it in the cloud.
Email security is the primary use case for which our clients mainly used Proofpoint Email Protection. We have used it for email security.
I use Proofpoint Email Protection ( /products/proofpoint-email-protection-reviews ) to filter and scan doubtful emails. The solution screens emails, quarantines suspicious ones, and only sends through legitimate emails.
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365.
We use it for user queries. For example, if a user flags that they're not receiving emails from a particular sender, we investigate where it got blocked in Proofpoint, if it was delivered successfully, or if it was quarantined. We also onboard new domains, adding SPF and DKIM records to the DNS records so that all incoming mail is processed by Proofpoint before reaching the internal network.
I am an administrator. I manage it as an admin for each and every inbound and outbound email.
Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.
The product serves as my company's enterprise email security platform. Everything related to the emails in my company comes through Proofpoint Email Protection.
The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.
We use the solution to filter out spam from our end users, block malicious attacks, and add banners to the emails if they're from suspicious senders. If there's a suspicious link, we'll have a URL to open it in a browser.
I use Proofpoint Email Protection as an email protection system.
We use Proofpoint Email Protection mostly for email filtering, spam, and phishing.
We use it for our email flow. We use it for our daily operations. For example, it helps in dropping spam and phishing emails.
The solution is primarily used for email protection. However, it is not as good as EDR. It is good at handling privacy.
I use the solution to protect email. It's primarily used for security purposes.
The solution protects our mailboxes from phishing and scanning.
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
Most customers interested in Proofpoint Email Protection have problems with spam, or their email security solution cannot detect phishing or spam, so they want to replace it with Proofpoint Email Protection.
I have been using Proofpoint Email Protection for the emails that we receive to determine if there is any suspicious attachment or content. It will detect and give us an alert on our dashboard. From there we can pick up the alerts and review and take action to mitigate the risk.
We primarily use the solution for email protection.
It serves as an added layer above your email gateway.
We use Proofpoint Email Protection for machine learning and artificial intelligence engine.
Proofpoint Email Protection is used as an email security platform to detect all kinds of malware, viruses, and unethical acts being done through email solicitations.
Proofpoint Email Protection is used to protect your entire email.
Our primary use case of Proofpoint Email Protection is focused around data loss prevention (DLP). To protect against spam, viruses, incoming and outgoing mail.
My primary use case for this solution is for email security.
Our primary use case is the encryption tooling of email security. Emails sent externally are automatically encrypted as is all the information included. There are some DLP related options available in Proofpoint, which we enabled with the help of classifying the emails, like internal, external, private, public, sharing. That's our main use. We are customers of Proofpoint.
I am the CIO, I have consultants. We use Proofpoint Email Protection to filter out malicious emails.
We use it as a corporate or as an exchange email filter to protect, to stop any executables from coming through email, and to halt phishing scams. Basically, the product is for email security. We use it for our network. Also, if a user thinks that they didn't get an email, we can access the Proofpoint dashboard and go find missing mail that either people didn't get so we can rerelease it to them. Or if it did get quarantined, we can release and approve a sender. You can blacklist and whitelist sender lists. If you are getting phishing scams that get through the filter, you can end up shutting those down. You can actually block the entire domain so that domain can never email you ever again. If there is an external email outside of your network or your company, you can whitelist them if it's an unknown sender, so you don't ever have to worry about missing their emails.
We use this solution as a firewall for our email environment; it's basically a reputation-based service. It denies the connection from known bad sites. That's the biggest protection they have when you go to the antivirus and anti-spam modules. They even have an encryption piece in it.
We primarily use the solution for a variety of services. It's mostly related to email.
Our primary use case for Proofpoint Email Protection is for email security, to secure all the inbound and outbound emails.
We are service providers who recommend products for our customers. Our customer's license expired and we suggested Proofpoint Email Protection. Our customers are enterprise companies.
We use it in front of Office 365 for anti-phishing, anti-malware, and threat protection.
We are system integrators and this is a product that we implement for our customers.
We primarily use the solution to block malicious email and spam in bulk.
Proofpoint is number one in terms of market share worldwide. We recommend it to clients because of its rich features. It offers a lot of choices. We primarily use the solution because of its rich features in email protection. It also provides protection for the cloud. It provides backup targeted attack protection features as well.
We use Proofpoint for advanced email protection from a number of threats, including phishing and account spoofing.