TrustRadius: an HG Insights company

Proofpoint ET Intelligence

Score9.4 out of 10

4 Reviews and Ratings

What is Proofpoint ET Intelligence?

Proofpoint Emerging Threat (ET) Intelligence provides actionable threat intel feeds to identify IPs and domains involved in suspicious and malicious activity.

Categories & Use Cases

Proofpoint best threat mitigation tool for your business !!!

Use Cases and Deployment Scope

We have this solution implemented to prevent threats, but I have to tell that s really useful to quarantine items with a clear notification to review in a secure way, as we know on these days this is gold solid with all threats out there. Especially when you have a lot of communications between internal, partners and the most important CUSTOMERS !!

Pros

  • Mitigation Email notification
  • Quarantine ITEMS

Cons

  • I think is perfect now Specially for end users
  • Probably better communication before send updates to end users

Most Important Features

  • Email Threat Detection

Return on Investment

  • For sure tons of man hours form equal to $$ for IT department

Alternatives Considered

NordLayer

Other Software Used

NordLayer

Proofpoint Intelligently stops email threats.

Use Cases and Deployment Scope

It helps us in the HR company to recognize threats within corporate emails in time, the base program that is included in the PC is supposed to do this but not a complete cleaning and we require a double barrier that it provides us Proofpoint Emerging Threat Intelligence.

Pros

  • It has a rate of less than 5% of false positives in my case that sweeps almost all the problematic states.
  • I like to find suggestions but also the healthy emails from the bad ones when I start my work.
  • It is a fast and easy program to understand and use.

Cons

  • The cost of the application per month has risen unilaterally and this does not allow us to keep a flat accounting.
  • The application send threat alerts at a specific time in the afternoon and we have not been able to solve this.

Most Important Features

  • Which is reliable and a support-backed program.
  • That fulfills the commitment to protect.
  • That the detection is fast.
  • What privacy respects.

Return on Investment

  • It has been 95% effective in detecting threats and this allows us to trust the software and continue to use it in the future.
  • The cost and this point I am talking about is negative, it goes up unilaterally and this has generated one or another accounting problem every month.
  • The software is familiar not only with virus-type threats, but also with alerts of unauthorized attempts by CMS or by unknown IPs, even if they are from devices belonging to one of the organization's employees.