No more typing reviews! Try our Samantha, our new voice AI agent.

Abnormal Security vs Proofpoint Email Protection comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (13th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Abnormal Security
Ranking in Email Security
6th
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
Secure Email Gateway (SEG) (4th)
Proofpoint Email Protection
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
97
Ranking in other categories
Advanced Threat Protection (ATP) (3rd), Digital Risk Protection (3rd), Office 365 Protection (1st), Secure Email Gateway (SEG) (2nd)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
reviewer2251509 - PeerSpot reviewer
Senior Director, Information Technology at a insurance company with 51-200 employees
AI has helped classify threat types more accurately but product ownership can improve
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise are crucial. However, there is always room for improvement, as achieving a perfect 10 means there is no more room for enhancement. For Abnormal Security, it's about leveraging AI even more, which they are already working on in their roadmap.
Vivek_Jaiswal - PeerSpot reviewer
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees
Advanced email defenses have protected healthcare staff and simplified incident response
There are many things that could be improved, but once you are very well-known about this application, you could perform that improvement plan. There are many scenarios where I have worked with Proofpoint Email Protection where a requirement was not fulfilled due to the limitation of the product. For example, we have Report Phish automation. With Proofpoint Email Protection, we can configure Report Phish and forward the email to any email addresses or shared mailboxes that we provide in the configuration. That email is forwarded as is with whatever the user reports as a phishing email. However, some organizations do not want the reported phishing email to go as is into their ticketing tool because it might contain malicious attachments and malicious links that are not required to go into their internal organization. Proofpoint Email Protection has that limitation. They cannot forward or restrict, but could forward only limited information such as some header information, sender subject details, or only limited information. As it is, the email can be forwarded, not as limited information. Proofpoint TRAP solution also has limitations. It cannot create alert notifications for some specific requirements because Proofpoint works the way it is designed, and if you want it to work based on our requirement, that should not be possible. There is a scope of limitations here. There are many improvements that should be made. First, they should work on their false positive minimization. Proofpoint generally takes all emails, investigates them, and classifies them. There are many situations where legit emails are blocked because that domain is found to be under a malicious category somehow, but actually it is not. False positive minimization could be improved, and they could enhance their other applications or solutions. There are many things that they could improve from each application and each portal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"It is a stable solution."
"This solution is easy to understand and easy to configure."
"The solution has different options that can be used to differentiate DDoS attacks."
"Cloudflare, in my opinion, was easy to implement."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"I'm very satisfied with the environment and the dashboard."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Abnormal Security's AI capabilities are what we like most, as they can categorize and classify the emails, and based on the context of the email, understand if it's a graymail, a bulk mail, or a phish."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"I have never encountered any stability issues with Abnormal."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"Although it is a bit costly compared to Mimecast, Defender, and Cofense Vision, it is efficient and strong in security, so I do not mind the cost because I will not reduce my security risk."
"The spam filter for email is good."
"Proofpoint is number one in terms of market share worldwide, and we recommend it to clients because of its rich features in email protection, cloud protection, and backup targeted attack protection."
"Before deploying Proofpoint Email Protection, we were frequently attacked by phishing and DDoS, and after deploying it, attacks have been reduced by up to 80 percent and phishing has been completely eliminated, so it is working very efficiently."
"Overall, it is a good product, providing everything in a single dashboard where we can find all the information related to the risks involved within a suspicious email."
"The most valuable feature is the ability to remove bad messages that were delivered, prior to being classified as unwanted."
"Proofpoint Email Protection has positively impacted my organization by significantly reducing the risk of employees clicking a malicious link or the company getting compromised."
"The power, flexibility, configurability, and Proofpoint Email Protection's professional services were some of the biggest selling points for me at the time and the things that I benefited from the most."
 

Cons

"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"The onboarding process can be improved a little bit."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"They don't have a person to provide support for customers using the solution under their free plan."
"Lacks a VPN feature to provide a secure connection to the data center."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"I would like to have the ability to customize the auto-remediation feature."
"The pricing for academic institutions and student mailboxes is challenging."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"One feature I'd love to see is outbound scanning."
"There could be more selectable options and more granular selections available."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"There could be more selectable options and more granular selections available."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"Everything with Proofpoint Email Protection has room for improvement in my opinion."
"To improve Proofpoint Email Protection, I suggest improving the UI from the pod to align with the new admin.proofpoint.com interface, as the pod is still existing for a reason, but the interface is definitely outdated."
"We find the cost to be prohibitive."
"Proofpoint Email Protection has a lot of false positives, and the infrastructure is a bit complex."
"There are user interface complexities that require integration with a SOC team, which needs time and training."
"There have been a few cases where an obvious phishing email has not been blocked, but perhaps Proofpoint Email Protection was still learning and needed some extra time to figure out that the email was malicious."
"The largest complaint that we hear from our customers is that there is no local support."
"It's scalable, but the devil's in the details — you have to know your email volumes."
 

Pricing and Cost Advice

"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The prices are slightly expensive."
"The solution is not that expensive."
"The solution's pricing lacks transparency."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The license is based on the user count, so the number of users that have an email address in the organization."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"The solution charges per user per month to use it. There are not any additional fees in addition to the standard living fees."
"Proofpoint Email Protection has comparable pricing."
"Proofpoint is fairly expensive."
"The end customer is buying our solution, which can be for monthly or annual usage depending on our payment and business model."
"The licensing is basically $8/user."
"We sell annual licenses for this solution."
"Clients pay for an annual subscription of Proofpoint Email Protection. Every client always finds it expensive."
"I rate the product price a seven on a scale of one to ten, where one is low price and ten is high price."
report
Use our free recommendation engine to learn which Secure Email Gateway (SEG) solutions are best for your needs.
892,487 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
21%
Comms Service Provider
10%
Financial Services Firm
8%
Manufacturing Company
6%
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
8%
Government
6%
Financial Services Firm
12%
Manufacturing Company
9%
Computer Software Company
8%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise24
Large Enterprise50
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise a...
What is your primary use case for Abnormal Security?
The main use case for Abnormal Security is as a spam filter and for mail hygiene. This use case is for the finance in...
What is your experience regarding pricing and costs for Proofpoint Email Protection?
This is not something that I deal with regarding pricing, setup cost, and licensing.
What needs improvement with Proofpoint Email Protection?
I would like to see improvements in the transition from Proofpoint Protection Server to Proofpoint on Demand because ...
What is your primary use case for Proofpoint Email Protection?
In my environment, I am using Proofpoint Email Protection for advanced email threat protection. For malware, spam, an...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Proofpoint Enterprise Protection, Proofpoint Digital Protection
 

Overview

 

Sample Customers

23andMe
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
Find out what your peers are saying about Abnormal Security vs. Proofpoint Email Protection and other solutions. Updated: April 2026.
892,487 professionals have used our research since 2012.