We performed a comparison between Proofpoint Email Protection and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG)."The most valuable features of Proofpoint Email Protection are the performance from being on the cloud."
"A one-stop shop for email protection"
"They have customized security rules, mature rules, anti-virus protection, as well as email authentication similar to SPF, DKIM, and DMARC."
"The Phish Alarm button allows users to submit questionable emails for review and complete analysis."
"Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products."
"Its anti-phishing functionality is the most valuable. Certainly, the biggest problem I have is phishing."
"Its main defense is to stop malicious emails from coming through. There is a sandbox environment where you can open malicious or suspicious emails to make sure that they're not malicious, instead of taking the risk of having your employees do it. This is definitely something that everybody needs nowadays, especially with the rise in cyber attacks."
"The most valuable features of Proofpoint Email Protection are ease of use, data loss prevention, antivirus, and spam protection."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"The solution can scale."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"The installation phase was easy."
"Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."
"The MVX Engine seems to be very capable against threats and the way it handles APTs is impressive."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"The incident reporting on offer needs to be improved. It's lacking right now. It should be on the platform somewhere."
"The initial setup is complex."
"There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats."
"Integration for reporting needs to be improved, it's too complex."
"The largest complaint that we hear from our customers is that there is no local support."
"We find the cost to be prohibitive."
"The reporting section could be enhanced. I like some reports but if they could allow us to create custom reports with more flexibility it would enhance the reports more."
"The flexibility of the solution can be improved."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"Technical packaging could be improved."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"The analytics could be better. It seems heavily influenced by the McAfee and FireEye integration, and that integration still isn't seamless."
"The product's integration capabilities are an area of concern where improvements are required."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
More Trellix Network Detection and Response Pricing and Cost Advice →
Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 46 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Proofpoint Email Protection is rated 8.4, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Fortinet FortiGate, Zscaler Internet Access and Vectra AI.
We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.