Overview
Product Information on Proofpoint Insider Threat Management
What is Proofpoint Insider Threat Management?
Proofpoint Insider Threat Management Pricing
Overall experience with Proofpoint Insider Threat Management
“Platform Provides In-Depth Visibility Into Insider Threats But Needs Tuning”
“Frequent Crashes and Sluggish UI Create Frustration with Daily ITM Usage”
Badges
Data Loss Prevention
About Company
Company Description
The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.
Company Details
Do You Manage Peer Insights at Proofpoint?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Proofpoint Insider Threat Management
Reviewer Insights for: Proofpoint Insider Threat Management
Performance of Proofpoint Insider Threat Management Across Market Features
Proofpoint Insider Threat Management Likes & Dislikes
I believe the depth of context it provides around user actions is awesome. Allows screen captures, file movements and application usage to be reviewed in one place. Reduces investigation time to determine if flagged activity is risky behavior.
From a technical perspective I can appreciate a few things. The sandboxing actually works - if I click on something malicious, the isolation prevented any sort of malware from touching our network. The policy controls are granular enough that our security team can whitelist legit sites needed for work, and the reporting dashboard is helpful to monitor my own habits.
Screenshot Capabilities, Historical Analysis, Historical Logging, Data and Information provided by the tool.
We have experienced a high number of false positives, requiring tuning to reduce the noise. This isn't a unique issue as most insider threat management platforms generate false positive alerts that require tuning. Integration with other tools would be a nice feature but I believe Proofpoint has accounted for this with their new line of products. More good things to come.
The crashes are the worst part. Losing half-written emails is beyond headache-enducing, and sometimes the product just won't let you click on things. Or you'll send an email just to realize hours later it never sent b/c it decided to simply not accept your input. The copy/paste limits are just as maddening. Lastly, the performance lag just makes me want to use my work phone to do what I need. There's a 3-4 second delay in any action. This time adds up significantly just to simply delete an email.
licensing requirements on a per agent basis.
Top Proofpoint Insider Threat Management Alternatives
Peer Discussions
Proofpoint Insider Threat Management Reviews and Ratings
- IT SECURITY & RISK MANAGEMENT ASSOCIATE<50M USDRetailReview Source
Platform Provides In-Depth Visibility Into Insider Threats But Needs Tuning
Proofpoint Insider Threat Management has become a reliable part of our security stack. We receive strong visibility into our users' activities, and gain insights into insider risks. product is designed to help identify suspicious behavior before it escalates. We were informed that the platform has evolved and matured into what it is now, making its reporting capabilities stronger than ever. - SECURITY ENGINEERGov't/PS/EdGovernmentReview Source
Insider Threat Management Endpoint Delivers Fast Investigations and Data Accessibility
The insider threat management end point is a very unique tool. The tool does allow its administrators to go above and beyond with investigations when it comes to "Insider Threats". An insider can be a new employee, a departing employee, or someone who accesses a machine with an agent on it. The functionality, ease of deployment, and manageability provides myself and team quick investigations, quick response times, and allows my organization to provide the required teams with the necessary data to make good decisions. - DEPUTY DIRECTOR INFORMATION SECURITY1B-10B USDInsurance (except health)Review Source
Proofpoint Integration Enhances Endpoint Visibility, DLP Tuning Remains Challenge.
I have a been a user of many proofpoint services for a couple decades. This product and services are important to our detection and visibility to what users are doing. - IT SECURITY ENGINEER10B+ USDBankingReview Source
Comprehensive Data Control Available, Plenty of Visibility for User Data
Insider risk management from Proofpoint has been without a doubt one of my favorite tools I've ever used. This tool has complete visibility along with immense ease of use. - EMAIL AND DATA SECURITY LEAD1B-10B USDIT ServicesReview Source
Enhancing Security through Advanced User Activity Monitoring
The advance monitoring on user activities and dashboard data. Professional services are really appreciated in initial configuration and explanation on the product features.



