The primary use case of Proofpoint Email Protection is to ensure email security for both incoming and outgoing emails.
Security Operations Lead at ChargePoint
Scalable and easy to deploy but needs improvement in preventing phishing attacks
Pros and Cons
- "The most valuable feature is the option to edit the inbound security."
- "There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats."
What is our primary use case?
What is most valuable?
The most valuable feature is the option to edit the inbound security.
What needs improvement?
In terms of improvement, I have some concerns regarding the effectiveness of Proofpoint's phishing protection. There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats. There are other solutions on the market that do a good job with that.
For how long have I used the solution?
I have been using the solution for three years.
Buyer's Guide
Proofpoint Email Protection
February 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,371 professionals have used our research since 2012.
What do I think about the stability of the solution?
In terms of stability, the solution performs well. We have not experienced any issues or downtime.
What do I think about the scalability of the solution?
The solution is scalable enough for our organization. Approximately 2,000 people use it at our company daily.
Which solution did I use previously and why did I switch?
We are currently working with both Proofpoint and Abnormal Security, but we plan on completely switching to Abnormal Security soon. Proofpoint needs to work on its performance in handling spam and phishing and to improve its services when it comes to AI or ML-based solutions. Even if Proofpoint decides to roll out such features, it will take some time. There are competitors on the market who already offer those features, and that is why we opted for Abnormal Security.
How was the initial setup?
The initial setup is quite easy. It took one day to deploy the solution because our team needed to edit SPF, DKIM, and DMARC records, which took some time as well.
What other advice do I have?
My advice to people who are considering using Proofpoint would be to properly evaluate the services it offers. During the POC phase, you should assess all features offered, including phishing protection, and ensure they are up to date. You should compare Proofpoint with other vendors in the market before making a decision. Overall, I would rate the solution a six out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Vice President at Synchrony
A reasonably priced product that offers protection to emails, along with spam filters
Pros and Cons
- "The solution's technical support is good. I rate the technical support a ten out of ten."
- "The stability and UI are the two areas of the solution with certain shortcomings that need improvement."
What is our primary use case?
I use Proofpoint Email Protection as an email protection system.
What is most valuable?
The most valuable feature of the solution is the protection it offers to emails, along with the spam filters.
What needs improvement?
The stability and UI are the two areas of the solution with certain shortcomings that need improvement.
For how long have I used the solution?
I have been using Proofpoint Email Protection for four or five years. My company is a customer of the solution.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight out of ten.
I wouldn't say that the solution's stability is imperfect since it has been a stable tool. In our company, we see some notifications in the tool stating that certain login attempts are not happening successfully, but it is important to note that these issues happen rarely. The issue in the solution may be because of our lack of experience with the solution in our company.
A lot of people rely on the solution's UI. I often see the solution's UI go down, like once a month, which doesn't happen very often, in my opinion.
What do I think about the scalability of the solution?
It is a scalable solution. Scalability-wise, I rate the solution a ten out of ten.
How are customer service and support?
The solution's technical support is good. I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I had previously worked with an email protection system from Symantec.
How was the initial setup?
The initial setup of Proofpoint Email Protection is easy.
The solution is deployed on an on-premises model, along with a SaaS version. A PnP deployment is enough with the on-premises version, which is an appliance.
The solution's deployment process took around a week.
I was a part of the solution's deployment process, which was pretty much engaging professional services, putting requirements and other stuff in place before going for the validation part, making it a simple process.
What's my experience with pricing, setup cost, and licensing?
Proofpoint Email Protection is a reasonably priced product, which means that it is neither too low nor too high in terms of price.
I rate the price of Proofpoint Email Protection a seven on a scale of one to ten, where one is low, and ten is high.
What other advice do I have?
Proofpoint has many modules, allowing one to opt for the right module that fits into their business. Oversubscribing to modules in Proofpoint may not help, and it can get expensive after a certain point. I work for a financial organization, so I know emails and stuff coming over emails are considered critical in our company, and because of this, we are pretty much subscribed to most of Proofpoint's modules. I see a benefit from the product. The solution may not fit into some other organizations.
Though Proofpoint Email Protection has been a strong and stable product, I feel that Proofpoint can still do better. The support for the product has been great since the solution's support team has been very responsive and accommodating to our requests, especially regarding the enhancements we have put in the solution.
Proofpoint Email Protection has been a very good tool that has been very accommodating to our company's needs. The tool helps my company since it has a lot of capabilities, especially the feature to provide protection to emails. I don't have anything that I could complain about. My experience with the solution has been good, as it works the way I expected it to function.
The stability can get redundant because of ensuring the email system in an organization where every minute counts, and since it is deployed on a SaaS model, it becomes a critical infrastructure where an organization doesn't have much visibility. Organizations rely on vendor infrastructure, so I hope that Proofpoint does a better job there and ensures that the solution functions with the least downtime or on a no-downtime kind of model.
I rate the overall solution a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Proofpoint Email Protection
February 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,371 professionals have used our research since 2012.
Marketing Manager at Veronym
User-friendly and stable
Pros and Cons
- "The solution is very user-friendly."
- "The flexibility of the solution can be improved."
What is our primary use case?
The solution protects our mailboxes from phishing and scanning.
What is most valuable?
The solution is very user-friendly.
What needs improvement?
The flexibility of the solution can be improved. We have a history of a white labeling project that we completed with one of the largest worldwide telecom companies. We encountered a major issue with some blending cases, as it was almost impossible to meet the blending of colors or requirements expected by our customers within the white labeling project. This is not only a technical issue, but from a marketing perspective, it is also very important. A white hyperlink means that we have prepared a dedicated infrastructure specifically labeled. All parts of our service had to be labeled with a very specific brand, and it was very challenging to make it all happen.
For how long have I used the solution?
I have been using the solution for a few years.
What do I think about the stability of the solution?
The solution is stable.
How was the initial setup?
For customers unfamiliar with DNS settings, we created very specific instructions with informative graphics to make the process less complicated. If we had no knowledge, it could have been difficult, so we created several infographics to show the steps that needed to be taken, and it worked.
The time to deploy depends on if we have a dedicated person or team working on the deployment or if we have to pull someone off another job.
What about the implementation team?
The implementation is completed in-house.
What's my experience with pricing, setup cost, and licensing?
We have a very specific licensing setup for all the vendors we use for our infrastructure. The end customer is buying our solution, which can be for monthly or annual usage depending on our payment and business model. If someone is trying to test the imaging, the shortest period for testing is a free trial of either fourteen days or seven days or a paid period of one month. The customer does not need to worry about any licensing with Proofpoint, as this is included with our solution.
What other advice do I have?
I give the solution an eight out of ten.
We have almost 1000 people using the solution.
I recommend the solution to others.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Director of Infrastructure and Security at Halifax Health
Catches more threats than most, but currently unstable with poor sales support
Pros and Cons
- "Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products."
- "Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
What is our primary use case?
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
What is most valuable?
Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products.
What needs improvement?
Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general.
Even their sales and support is deteriorating as well. I can't even get them to quote me for the next year, possibly because they are still in disarray from their sale.
Because of these issues, we are likely going to move away from it soon. I would prefer not to change, but I might not have a choice, especially if they can't even send me the proper quotes for everything.
For how long have I used the solution?
I have been using Proofpoint Email Protection for about five years now.
What do I think about the stability of the solution?
The stability of Proofpoint Email Protection is a problem right now, and I assume it has to do with their sale to Thoma Bravo.
These days, I would rate the stability a four of ten.
What do I think about the scalability of the solution?
We have somewhere between 4,000-6,000 users who are benefiting from the solution. However, when it comes to extending our usage, I'm not sure if we will go ahead with them because they're completely dropping the bomb on everything; they won't even respond to give me quotes to renew this year.
Licensing issues aside, I would rate the product an eight out of ten in terms of scalability.
How was the initial setup?
The initial setup was good, at least until the last 12 months after their sale. I would rate the setup process an eight out of ten.
What about the implementation team?
Our in-house team worked with Proofpoint's engineers for the deployment. It was a pretty quick process of setting up the email gateways and starting up the VMs in our hybrid environment. Overall, we only needed one person for the VMs and server setup, and one other person to take care of the security configuration and all the rest.
What was our ROI?
In terms of ROI as compared to their competitors, Proofpoint still has a very good phishing signature file, so they're probably catching 5-10% more threats than what the other products are catching. If you can keep it running, that is.
What's my experience with pricing, setup cost, and licensing?
They are competitively priced, but I have been forced to get quotes for other solutions now because they haven't been responding to requests to do the work that we would like them to do.
What other advice do I have?
My advice to others is to be cautious because they seem to be going through some changes (likely to do with corporate structuring issues) that are negatively affecting customer service and stability.
I would rate Proofpoint Email Protection a six out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Information Security Analyst at a healthcare company with 1-10 employees
Powerful data analysis with robust algorithms, machine learning, and strong rules
Pros and Cons
- "The Phish Alarm button allows users to submit questionable emails for review and complete analysis."
- "The solution's server console and cluster dashboard have been the same for four years so need to be upgraded."
What is our primary use case?
Our organization is large and has multiple entities that use the solution.
Our department includes two senior information security analysts and two network analysts. We use the solution and as our main security filter for 90% of emails. Emails come into the domain, hit the gateway firsthand, and the solution filters for spam, phishing, malware, and virus attachments.
The TAP service integrates with the PPS API connection and analyzes every bit of email that goes through the system. Troublesome domains are blocked automatically without needing to be analyzed. If a specific email address is not blocked, the email gets released. TAP still analyzes the email, identifies whether it is a threat, and details its attributes such as the IP address, subject and content, and URL name.
All metadata for a threat email is sent from TAP to TRAP which goes back to the user's mailbox and automatically pulls the email so that it disappears. TRAP also identifies if the email has been distributed, even to 10,000 users, and attempts to pull back all instances. TRAP can pull internal emails but not external emails because it does not have access to external systems.
How has it helped my organization?
Our company uses the solution to its fullest potential.
A organization's security culture and investment defines how extensively they will use the solution. For example, Bank of America is a big company where security is important so they will spend millions of dollars improving their product. A smaller company with just 10,000 users might only do a certain level to improve.
Spam scoring is a feature for which usage varies. The solution scores emails from zero to 100 and companies can decide the level of acceptance. A level of 70 might block too many emails so users will complain. If you have 2,000 users, the complaints might cause you to loosen the rating constraints to 85 or so.
What is most valuable?
The solution's whole server is valuable because has robust algorithms, AI that learns what goes through a company's email server, and strong rules for analyzing data. Competitor's products are just standard email filters that block or pass with no ongoing AI for learning.
The security is very strong and comparatively better than Cisco CES. For example, in the last six months there has been an uptick in phishing campaigns or malicious email attachments purporting to come from Geek Squad. I see a substantial number of these troublesome emails pass through CES, Barracuda, and Mimecast but I have not seen a single email pass through the solution.
The Phish Alarm button allows users to submit questionable emails for review and complete analysis. A submitted email is analyzed in the cloud sandbox and the results are provided along with the actual email. Substantial information is included in this dynamic analysis such as email details, URLs, links, domains, ages of accounts, and what the email is intending to do. No other product offers this type of built-in email analysis. I have reviewed three different products including Cofense and they all send the email with its metadata to the user's security response team for manual review.
What needs improvement?
The solution's server console and cluster dashboard have been the same for four years so need to be upgraded. There is no feature-rich dashboard so searching emails is cumbersome and slow. The way Facebook, Gmail, and LinkedIn looked five years ago is not the same as today. Everything today is feature-rich and user-friendly.
For how long have I used the solution?
I have been using the solution for four years.
What do I think about the stability of the solution?
The solution is very stable with no issues in six years. I never have situations with the cloud going down or email going haywire. However, I have seen other products have these issues.
What do I think about the scalability of the solution?
The solution is scalable depending on your licenses.
How are customer service and support?
Technical support is excellent, very easy to access, and fast. It is easy to chat with support via the online community portal. They will point you in the right direction during chat sessions or set up a call with a support agent.
Which solution did I use previously and why did I switch?
This is the first solution our company has used.
How was the initial setup?
The deployment process is pretty easy.
The solution builds your cluster in the cloud and gives you a gateway, URL, MX records, and IP addresses. You then set up your DMS and MX records for your cluster and tie it to your email gateway. The process is pretty simple and can be done within a week.
Suppose all your emails and servers are from Microsoft 365 with mailboxes in the cloud. Once your domain is on the solution's cluster, it needs to be connected with the Microsoft email gateway. Think of a pipe where water goes from one end to the other. The solution sits at the entrance of the pipe to filter out bad particles. Filtered items go into the pipe or Microsoft's email gateway. Down the pipe there is an open tap which pours right into the user's glasses.
What about the implementation team?
We implement the solution for customers. Implementation takes one to three people depending on the size of the organization.
Our team handles any ongoing maintenance which is minimal.
What's my experience with pricing, setup cost, and licensing?
The solution uses a licensing model that is reasonable compared to other products. I rate pricing a nine out of ten.
Which other solutions did I evaluate?
I appreciate the solution because it is purely for email security.
What other advice do I have?
The solution is a great product and the best existing option in 2022. You will be very happy with the solution's security features.
I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Consultant (SIEM Admin) at IBM
Good at identifying threats, helpful sandboxing capabilities, and useful support
Pros and Cons
- "It's very good at identifying threats."
- "Sometimes it detects false positives."
What is our primary use case?
The solution is primarily used for email protection. However, it is not as good as EDR. It is good at handling privacy.
How has it helped my organization?
It's helped us when one of our senior managers got a fake email about getting a payment. The solution automatically flagged and notified us.
What is most valuable?
It's great for email protection.
It's very good at identifying threats.
There is useful sandboxing available.
The pricing is very reasonable. This is an affordable product.
Technical support is very good.
What needs improvement?
Sometimes it detects false positives.
We'd like the sandbox to integrate with the on-prem device.
It needs to identify the paths and signatures. We'd like advanced machine learning for detection.
We'd like the have more lunch and learns to get more out of the solution.
For how long have I used the solution?
I've used the solution for around two years.
What do I think about the stability of the solution?
I'd rate the stability five or six out of ten. It's okay. It's not perfect.
What do I think about the scalability of the solution?
I'd rate the scalability around six or seven out of ten. It's decent.
We have around 100 people using it.
How are customer service and support?
Technical support is quite good. We are happy with the level of support we receive.
How would you rate customer service and support?
Positive
How was the initial setup?
It was quite easy to set up.
We have about four people able to deploy and maintain the product.
What was our ROI?
I have witnessed an ROI after using it.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable. I'd rate the pricing one out of ten in terms of affordability. It is not expensive at all.
What other advice do I have?
I've been using the latest version of the solution.
If you understand email technicalities like email authentication, you will have an easy time with the solution. I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager Technology - Advanced Analytics and Data Management at Mashreq
Reliable, easy to set up, and centralizes visibility
Pros and Cons
- "As a cloud-based product, it can scale well."
- "We'd like to have the ability to create more customized reports."
What is our primary use case?
The product looks at the emails that we receive. If there are any suspicious emails with attachments or strange content, it will detect that and give us an alert on a dashboard. From there, we can pick up the alert, and then we can review and take action to mitigate any risk.
What is most valuable?
Overall, it is a good product.
We like that it provides everything in a single dashboard. On that, we can find all the information related to the risks involved within a suspicious email.
The initial setup is very, very easy.
It's a stable, reliable product.
As a cloud-based product, it can scale well.
Customer support is very helpful and responsive. They are great at answering questions.
What needs improvement?
We'd like to have the ability to create more customized reports.
It would be ideal if we could customize exceptions more effectively and have more control over blacklisting and whitelisting.
The solution can be expensive.
For how long have I used the solution?
I've been using the solution for the past three or four years.
What do I think about the stability of the solution?
The solution is stable and reliable. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
We find it scales well. It is cloud-based, which makes the process very easy.
We have about 5,000 people using the solution right now.
How are customer service and support?
We do contact support regularly. We do get in touch to understand certain features or if we want to know more about how to use something. We frequently get in touch with support. They offer excellent assistance.
How would you rate customer service and support?
Positive
How was the initial setup?
This is an easy product to set up. It's not complex at all in terms of implementation.
How long it takes to deploy depends on the business. If they approve and agree to everything readily, it should only take a couple of weeks.
What's my experience with pricing, setup cost, and licensing?
I'm not sure of the exact cost. My understanding is it is expensive.
Which other solutions did I evaluate?
I have been recently attempting to compare Microsoft 365 and Proofpoint.
What other advice do I have?
We are a customer. We are not a partner.
I'm not sure which version number we're using.
It is one of the leading email security providers and has gone through reviews by our application security team. They evaluated all of the features to make sure they aligned with our needs, and so far, it has not disappointed me.
I would recommend the product as it provides everything users need right in one place, especially security controls.
It may be a good idea, however, to have a separate product for security control and a separate product for email business flows to give a separation of duties. Instead of having everything in one place, it is sometimes best to manage business and security policies separately. Companies should have dedicated security and an effective email security gateway where they can control the security of an entire organization.
I'd rate the solution eight out of ten. It's very useful to be able to see everything in one central place.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tech manager at MKTech
Reliable and straightforward to set up but does have mail flow issues
Pros and Cons
- "The spam filter for email is good."
- "Proofpoint has a lot of false alarms."
What is most valuable?
The stability is good.
The spam filter for email is good.
The solution can scale.
We have found the initial setup to be straightforward.
What needs improvement?
I have some concerns about Proofpoint mail flow rules. It's not smart.
Proofpoint has a lot of false alarms. Even their mail flow rules are not the best thing. Mimecast and Microsoft Office 365 are better than them. Many emails are marked as spam unnecessarily. I've had issues and have had to open many tickets.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
The stability is good. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
While most of my clients have under 100 users, my understanding is if it works for 100, it can work for 1,000 or 10,000 users. Scaling shouldn't be an issue.
How are customer service and support?
I've talked to support about creating rules and the issues we've had. I've had to open many tickets with them.
For example, last month our web application sent an invoice for one of the customers, and it relayed the email on behalf of the customer domain. This email was marked as phishing. Even when the SBS was correct and the DCOM was correct. I opened a ticket. The rule didn't work. They responded fast. Even though I have problems, I find them to be responsive.
Which solution did I use previously and why did I switch?
I have used Defender, Proofpoint, and Mimecast. I use them daily for different companies and have subscriptions for all three. In my company, we use Defender.
Mimecast and Microsoft are better than Proofpoint when it comes to mail rules. On Proofpoint, the rules don't work as expected.
How was the initial setup?
The solution is straightforward and simple to set up. It's not overly complex.
What other advice do I have?
I'm a freelancer working to support some companies that are using Proofpoint.
Sometimes I create a subscription for them and configure everything from scratch; sometimes, I take it already configured and just maintain it.
Anyone with basic knowledge of the solution and how to configure items will not have an issue with this product.
I'd rate it seven out of ten based on the mail flow issues I have witnessed.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller/Implementer
Buyer's Guide
Download our free Proofpoint Email Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Secure Email Gateway (SEG) Email Security Advanced Threat Protection (ATP) Digital Risk Protection Office 365 ProtectionPopular Comparisons
Microsoft Defender for Office 365
Cloudflare One
Check Point Harmony Email & Collaboration
Mimecast Email and Collaboration Threat Protection
Palo Alto Networks WildFire
Recorded Future
Cisco Secure Email
Abnormal Security
Microsoft Exchange Online Protection (EOP)
Fortinet FortiMail
Barracuda Email Protection
Barracuda Email Security Gateway
Buyer's Guide
Download our free Proofpoint Email Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:





















