• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Proofpoint Identity Threat Defense
Logo of Proofpoint Identity Threat Defense

Proofpoint Identity Threat Defense

byProofpoint
in Identity Threat Detection and Response (ITDR)
4.5

Overview

Product Information on Proofpoint Identity Threat Defense

Updated 13th October 2025

What is Proofpoint Identity Threat Defense?

Proofpoint Identity Threat Defense is a software that detects and mitigates identity-based threats within enterprise environments. The software uses analytics to identify compromised credentials, lateral movement, and privilege escalation tactics used by attackers. It provides visibility into user accounts and privileges to help organizations manage attack surfaces associated with identity and access. By analyzing network and directory activity, the software uncovers potential exposures, high-risk accounts, and attack paths that could be exploited. It integrates with existing security tools to enrich detection and response efforts and supports policy-driven remediation to reduce risk related to compromised identities. Proofpoint Identity Threat Defense addresses identity security challenges by providing organizations with the ability to detect, prioritize, and respond to threats targeting user accounts within their networks.

Proofpoint Identity Threat Defense Pricing

Proofpoint Identity Threat Defense software uses a subscription-based pricing model, where the cost is determined by factors such as the number of users or accounts protected and the features selected. The software typically offers tiered plans, which may vary in terms of advanced detection, reporting capabilities, and integration options. Pricing details are available upon request or through a direct quote from the provider.

Overall experience with Proofpoint Identity Threat Defense

IT Security & Risk Management Associate
50M - 250M USD, Healthcare and Biotech
FAVORABLE

“Proofpoint Identity Threat Defense:- Strong, Proactive Identity Protection.”

5.0
Dec 8, 2025
My experience with Proofpoint Identity Threat Defense has been positive. The platform is effective in identifying and mitigating identity-based threats and it provides clear alerts and actionable insights. I truly appreciate its user friendly interface and the way it supports our security processes. I think it has strengthened our ability to protect sensitive information and respond to potential risk efficiently.
IT SECURITY & RISK MANAGEMENT ASSOCIATE
3B - 10B USD, Transportation
CRITICAL

“Performance strong overall, but lacks automated actions and integration features”

3.0
Sep 19, 2025
Its good, has its quirks but overall performs well and allows us to track some of our VIPsIt's good, has its quirks, but overall performs well and allows us to track some of our VIPs

About Company

Company Description

Updated 7th December 2023

The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.

Company Details

Updated 26th February 2025
Company type
Private
Year Founded
2002
Head office location
Sunnyvale, United States
Number of employees
1001 - 5000
Website
https://www.proofpoint.com

Do You Manage Peer Insights at Proofpoint?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Proofpoint Identity Threat Defense

Proofpoint Identity Threat Defense Likes & Dislikes

Like

1) Identity deception and honeytokens with high-fidelity Alerts:- I this we can plant fake credentials, honey accounts/ service principals, decoy shares and deceptive AD objects. Any usage of these signals active credential theft or lateral movement with very low false positives. 2) Actionable remediation workflows and automation:- It provides step-by-step remediation such as removing permissions, rotating credentials, fixing ACL's, disabling vulnerable SPN's and integrates with ticketing to execute changes or track them. 3) Low operational noise and lightweight footprint:- Deception-based detection reduces alert fatigue and sensors are relatively light. AD assessments are largely agentless, minimizing impact on endpoints and domain controllers. 4) Strong ecosystem integrations:- Connects with common EDR, SIEM, SOAR and IAM platforms to enrich investigations and trigger automated containment e.g host isolation, credential rotations, policy updates. 5) Incident response acceleration:- During an event, quickly highlights compromised identities, exposed paths for lateral movement, and priority containment actions to limit blast radius.

Like

It enables us to get a single pane of glass view across the various modules that proofpoint offers

Like

Very strong ID-focused threat detection, helps identify suspicious behaviour, privilege abuse; not a lot of noise, alerts are sensible, genuine and actionable; it integrates well with other identity and security solutions, and keeps up with the modern attack vectors.

Dislike

1) Windows-first visibility; gaps for non-Windows endpoints:- Endpoint and lateral movement insights are strongest on Windows joined to AD. Linux/macOS segments and identity risks outside of AD aren't as richly mapped without extra tooling. 2) Pricing and ROI considerations:- It's not the cheapest category. The value is strong if you are actively reducing AD risk and using deception detection, but teams with limited AD footprint or no bandwidth for remediation may struggle to justify the cost. 3) Policy/allowlisting management:- you will likely need to allowlist legitimate admin tools and service accounts to prevent deception triggers during routine operations. This adds ongoing governance overhead.

Dislike

Its somewhat limited with the integrations and could do with adding some automated actions depending on certain triggers

Dislike

It should definitely allow for a wider customization approach, especial where it concerns advanced threat detection logic and reporting tailored to the specific company needs. Investigations could benefit from having to jump between different views, and reporting could do well to be better aligned with compliance and executive requirements and demands.

Top Proofpoint Identity Threat Defense Alternatives

Logo of Falcon Next-Gen Identity Security
1. Falcon Next-Gen Identity Security
4.6
(138 Ratings)
Logo of Microsoft Defender for Identity
2. Microsoft Defender for Identity
4.3
(57 Ratings)
Logo of Singularity Identity
3. Singularity Identity
4.3
(27 Ratings)
View All Alternatives

Peer Discussions

Proofpoint Identity Threat Defense Reviews and Ratings

4.5

(27 Ratings)

Rating Distribution

5 Star
56%
4 Star
37%
3 Star
7%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.3

Integration & Deployment

4.5

Service & Support

4.4

Product Capabilities

4.6

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • IT Security & Risk Management Associate
    50M-1B USD
    Healthcare and Biotech
    Review Source

    Proofpoint Identity Threat Defense:- Strong, Proactive Identity Protection.

    5.0
    Dec 8, 2025
    My experience with Proofpoint Identity Threat Defense has been positive. The platform is effective in identifying and mitigating identity-based threats and it provides clear alerts and actionable insights. I truly appreciate its user friendly interface and the way it supports our security processes. I think it has strengthened our ability to protect sensitive information and respond to potential risk efficiently.
  • GLOBAL CISO
    50M-1B USD
    IT Services
    Review Source

    Effective Detection of Identity Threats With Sensible Alerts and Integration Capabilities

    4.0
    Jan 29, 2026
    A solid addition to our security stack that helped improve visibility into identity based threats and lateral movement potential risks. Establishes good correlating identity behaviour with real world attack paterns. There's room for improvement, but it's part of the stack that we're not considering changing.
  • IT SECURITY & RISK MANAGEMENT ASSOCIATE
    <50M USD
    Retail
    Review Source

    Credential Misuse Detection Effective Yet Alert Management and Tuning Need Improvement

    5.0
    Sep 30, 2025
    Overall, great product that provides value in strengthening our identity security strategy. There is clear visibility into identity-based risks such as credential misuse, privilege escalation attempts, and more. This, again as an overall, has helped us stay ahead of potential account takeovers. Incident response work has been a bit smoother since the platform integrates with our existing workflows.
  • Chief Information Security Officer
    50M-1B USD
    Telecommunication
    Review Source

    Enterprise Identity Risk detection but with configuration friction

    4.0
    Jan 4, 2026
    Proofpoint Identity Threat Defense has significantly strengthened our Active Directory Security, catching misconfigured service accounts and shadow admins that our traditional IAM missed. PAM and IAM integration streamlines remediation and SOC2 AND ISO27001 reporting is quite comprehensive.
  • IT SECURITY & RISK MANAGEMENT ASSOCIATE
    Gov't/PS/Ed
    Government
    Review Source

    Dashboard Features Aid SOC Analysts in Monitoring Emails and Threat Activity Effectively

    5.0
    Dec 2, 2025
    I think it's great in terms of supplier defense and managing the UI from a SOC analyst's perspective. Our company is massive and has many suppliers and dealers, so this helps so much.
Showing Result 1-5 of 27

Recommended Gartner Research

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.