Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365.
We use it for user queries. For example, if a user flags that they're not receiving emails from a particular sender, we investigate where it got blocked in Proofpoint, if it was delivered successfully, or if it was quarantined. We also onboard new domains, adding SPF and DKIM records to the DNS records so that all incoming mail is processed by Proofpoint before reaching the internal network.
Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.
The product serves as my company's enterprise email security platform. Everything related to the emails in my company comes through Proofpoint Email Protection.
Senior Information Security Consultant at Dimah Capital
Consultant
Top 20
2024-01-30T14:08:27Z
Jan 30, 2024
The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Senior Information Security Engineer at a energy/utilities company with 201-500 employees
Real User
Top 20
2023-12-12T20:03:00Z
Dec 12, 2023
We use the solution to filter out spam from our end users, block malicious attacks, and add banners to the emails if they're from suspicious senders. If there's a suspicious link, we'll have a URL to open it in a browser.
Director of Infrastructure and Security at Halifax Health
Real User
Top 10
2023-01-18T14:29:23Z
Jan 18, 2023
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
Most customers interested in Proofpoint Email Protection have problems with spam, or their email security solution cannot detect phishing or spam, so they want to replace it with Proofpoint Email Protection.
Manager Technology - Advanced Analytics and Data Management at Mashreq
Real User
2022-11-14T13:02:43Z
Nov 14, 2022
I have been using Proofpoint Email Protection for the emails that we receive to determine if there is any suspicious attachment or content. It will detect and give us an alert on our dashboard. From there we can pick up the alerts and review and take action to mitigate the risk.
Proofpoint Email Protection is used as an email security platform to detect all kinds of malware, viruses, and unethical acts being done through email solicitations.
Information Technology Security Risk Manager at a healthcare company with 1,001-5,000 employees
Real User
2022-01-12T16:30:00Z
Jan 12, 2022
Our primary use case of Proofpoint Email Protection is focused around data loss prevention (DLP). To protect against spam, viruses, incoming and outgoing mail.
Data Security Engineer at a tech services company with 11-50 employees
Real User
2021-08-10T18:29:00Z
Aug 10, 2021
Our primary use case is the encryption tooling of email security. Emails sent externally are automatically encrypted as is all the information included. There are some DLP related options available in Proofpoint, which we enabled with the help of classifying the emails, like internal, external, private, public, sharing. That's our main use. We are customers of Proofpoint.
Information Technology Help Desk Technician at a consumer goods company with 51-200 employees
Real User
2021-03-19T07:25:51Z
Mar 19, 2021
We use it as a corporate or as an exchange email filter to protect, to stop any executables from coming through email, and to halt phishing scams. Basically, the product is for email security. We use it for our network. Also, if a user thinks that they didn't get an email, we can access the Proofpoint dashboard and go find missing mail that either people didn't get so we can rerelease it to them. Or if it did get quarantined, we can release and approve a sender. You can blacklist and whitelist sender lists. If you are getting phishing scams that get through the filter, you can end up shutting those down. You can actually block the entire domain so that domain can never email you ever again. If there is an external email outside of your network or your company, you can whitelist them if it's an unknown sender, so you don't ever have to worry about missing their emails.
We use this solution as a firewall for our email environment; it's basically a reputation-based service. It denies the connection from known bad sites. That's the biggest protection they have when you go to the antivirus and anti-spam modules. They even have an encryption piece in it.
Security Professional at Qatar Computer Services WLL
Real User
2021-01-11T15:37:46Z
Jan 11, 2021
We are service providers who recommend products for our customers. Our customer's license expired and we suggested Proofpoint Email Protection. Our customers are enterprise companies.
Director at a tech services company with 51-200 employees
Real User
2020-01-22T12:44:00Z
Jan 22, 2020
Proofpoint is number one in terms of market share worldwide. We recommend it to clients because of its rich features. It offers a lot of choices. We primarily use the solution because of its rich features in email protection. It also provides protection for the cloud. It provides backup targeted attack protection features as well.
Proofpoint Email Protection enhances email security by blocking phishing, malware, and spam threats. It serves as a firewall for inbound and outbound emails, featuring encryption, data loss prevention, and machine learning capabilities.
Businesses use Proofpoint Email Protection for its advanced anti-phishing tools, threat protection, sandboxing, and spam filtering, significantly improving email security infrastructure. It offers strong AI and algorithms, user-friendly dashboards, and...
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365.
We use it for user queries. For example, if a user flags that they're not receiving emails from a particular sender, we investigate where it got blocked in Proofpoint, if it was delivered successfully, or if it was quarantined. We also onboard new domains, adding SPF and DKIM records to the DNS records so that all incoming mail is processed by Proofpoint before reaching the internal network.
I am an administrator. I manage it as an admin for each and every inbound and outbound email.
Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.
The product serves as my company's enterprise email security platform. Everything related to the emails in my company comes through Proofpoint Email Protection.
The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.
We use the solution to filter out spam from our end users, block malicious attacks, and add banners to the emails if they're from suspicious senders. If there's a suspicious link, we'll have a URL to open it in a browser.
I use Proofpoint Email Protection as an email protection system.
We use Proofpoint Email Protection mostly for email filtering, spam, and phishing.
We use it for our email flow. We use it for our daily operations. For example, it helps in dropping spam and phishing emails.
The solution is primarily used for email protection. However, it is not as good as EDR. It is good at handling privacy.
I use the solution to protect email. It's primarily used for security purposes.
The solution protects our mailboxes from phishing and scanning.
We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.
Most customers interested in Proofpoint Email Protection have problems with spam, or their email security solution cannot detect phishing or spam, so they want to replace it with Proofpoint Email Protection.
I have been using Proofpoint Email Protection for the emails that we receive to determine if there is any suspicious attachment or content. It will detect and give us an alert on our dashboard. From there we can pick up the alerts and review and take action to mitigate the risk.
We primarily use the solution for email protection.
It serves as an added layer above your email gateway.
We use Proofpoint Email Protection for machine learning and artificial intelligence engine.
Proofpoint Email Protection is used as an email security platform to detect all kinds of malware, viruses, and unethical acts being done through email solicitations.
Proofpoint Email Protection is used to protect your entire email.
Our primary use case of Proofpoint Email Protection is focused around data loss prevention (DLP). To protect against spam, viruses, incoming and outgoing mail.
My primary use case for this solution is for email security.
Our primary use case is the encryption tooling of email security. Emails sent externally are automatically encrypted as is all the information included. There are some DLP related options available in Proofpoint, which we enabled with the help of classifying the emails, like internal, external, private, public, sharing. That's our main use. We are customers of Proofpoint.
I am the CIO, I have consultants. We use Proofpoint Email Protection to filter out malicious emails.
We use it as a corporate or as an exchange email filter to protect, to stop any executables from coming through email, and to halt phishing scams. Basically, the product is for email security. We use it for our network. Also, if a user thinks that they didn't get an email, we can access the Proofpoint dashboard and go find missing mail that either people didn't get so we can rerelease it to them. Or if it did get quarantined, we can release and approve a sender. You can blacklist and whitelist sender lists. If you are getting phishing scams that get through the filter, you can end up shutting those down. You can actually block the entire domain so that domain can never email you ever again. If there is an external email outside of your network or your company, you can whitelist them if it's an unknown sender, so you don't ever have to worry about missing their emails.
We use this solution as a firewall for our email environment; it's basically a reputation-based service. It denies the connection from known bad sites. That's the biggest protection they have when you go to the antivirus and anti-spam modules. They even have an encryption piece in it.
We primarily use the solution for a variety of services. It's mostly related to email.
Our primary use case for Proofpoint Email Protection is for email security, to secure all the inbound and outbound emails.
We are service providers who recommend products for our customers. Our customer's license expired and we suggested Proofpoint Email Protection. Our customers are enterprise companies.
We use it in front of Office 365 for anti-phishing, anti-malware, and threat protection.
We are system integrators and this is a product that we implement for our customers.
We primarily use the solution to block malicious email and spam in bulk.
Proofpoint is number one in terms of market share worldwide. We recommend it to clients because of its rich features. It offers a lot of choices. We primarily use the solution because of its rich features in email protection. It also provides protection for the cloud. It provides backup targeted attack protection features as well.
We use Proofpoint for advanced email protection from a number of threats, including phishing and account spoofing.