• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Targeted Attack Protection
Logo of Targeted Attack Protection

Targeted Attack Protection

byProofpoint
in Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge)
4.6

Overview

Product Information on Targeted Attack Protection

Updated 13th October 2025

What is Targeted Attack Protection?

Targeted Attack Protection is a software developed to identify, block, and mitigate advanced threats such as phishing, ransomware, and email-based attacks before they reach users. The software analyzes incoming messages and attachments using multiple detection techniques including machine learning, sandboxing, and threat intelligence. It provides organizations with visibility into targeted threats, offering real-time reporting and forensics to investigate and respond to incidents. Targeted Attack Protection aims to address the business problem of safeguarding sensitive information and users from sophisticated email threats by preventing unauthorized access, data loss, and service disruption.

Targeted Attack Protection Pricing

Targeted Attack Protection software uses a subscription-based pricing model, typically structured by the number of users or mailboxes covered. Different tiers offer varying levels of threat detection and response features, with pricing dependent on selected capabilities and organizational scale. Custom enterprise pricing may be available for large-scale or specialized deployments.

Overall experience with Targeted Attack Protection

SYSTEMS ENGINEER
<50M USD, Miscellaneous
FAVORABLE

“Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks”

5.0
Oct 9, 2025
My overall experience with TAP has been very positive. It provides strong, proactive protection against phishing and target email threats, while offering clear visibility into detect attacks and user risk.
IT Security Team Lead
10B - 30B USD, Retail
CRITICAL

“Unveiling Proofpoint's Unique Protection Against Email Threats”

3.0
Oct 30, 2024
We use multiple Proofpoint products to protect against email threats. There is room for improvement however, the timing to re-classify a vetted email as not malicious can take longer than expected.

About Company

Company Description

Updated 7th December 2023

The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.

Company Details

Updated 26th February 2025
Company type
Private
Year Founded
2002
Head office location
Sunnyvale, United States
Number of employees
1001 - 5000
Website
https://www.proofpoint.com

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Targeted Attack Protection
Deciding Factors: Targeted Attack Protection Vs. Market Average
Performance of Targeted Attack Protection Across Market Features

Targeted Attack Protection Likes & Dislikes

Like

The reporting and alerting tools make it easy to track and respond to threats quickly, and the integration with our existing email environment has been smooth. When used alongside Proofpoint TRAP, it becomes even more effective. TAP detects and classifies malicious emails in real time, while TRAP automagically quarantines or removes those messages from user inboxes even after delivery if they're later identified as threats. This integration helps close the response gap, minimizing user exposure and reducing manual remediation workload on IT. Together, TAP and TRAP provide a layered, automated defense that strengthens overall email threat protection.

Read Full Review
Like

The ability to evaluate targeted embedded links within a given email.

Read Full Review
Like

1. Integration with TRAP which allows us to soft delete detected threats in the delivered emails. 2. URL dynamic rewriting and sandboxing of URL is quite useful in powerful tool against various malicious email attacks. 3. Dashboard shows a good overview of users who are regularly facing various attacks, which allows to provide them with additional support or email security training.

Read Full Review
Dislike

Configuration, integration and tuning is complex, but support was with us 100% of the way and did the brunt of the work. False positives are a given and it's no different with TAP. You can set up VIP or high-risk users, but it doesn't do any additional protection. This only allows for more additional insight and reporting and not much else.

Read Full Review
Dislike

The time it takes to re-classify some of our vendor's email domains as not malicious sometimes takes longer than expected.

Read Full Review
Dislike

There is a different portal for each product TAP, POD, TRAP. It would be great to have everything in one place.

Read Full Review

Top Targeted Attack Protection Alternatives

Logo of R80 Security Management
1. R80 Security Management
4.6
(240 Ratings)
Logo of Check Point Intrusion Prevention System (IPS)
2. Check Point Intrusion Prevention System (IPS)
4.7
(154 Ratings)
Logo of Check Point SandBlast Network
3. Check Point SandBlast Network
4.7
(77 Ratings)
View All Alternatives

Peer Discussions

Targeted Attack Protection Reviews and Ratings

4.6

(80 Ratings)

Rating Distribution

5 Star
63%
4 Star
31%
3 Star
5%
2 Star
1%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.2

Integration & Deployment

4.4

Service & Support

4.5

Product Capabilities

4.7

Last 12 Months
Filter Reviews
Sort By:
Most helpful
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • SYSTEMS ENGINEER
    <50M USD
    Miscellaneous
    Review Source

    Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks

    5.0
    Oct 9, 2025
    My overall experience with TAP has been very positive. It provides strong, proactive protection against phishing and target email threats, while offering clear visibility into detect attacks and user risk.
  • Manager
    1B-10B USD
    IT Services
    Review Source

    TAP in action in daily life of SOC

    5.0
    Aug 25, 2025
    As a SOC team lead, I rely on ProofPoint TAP as part of our layered email security model. It is able to detect and analyze the threats our organization is facing on a regular basis. It offers strong pre- and post-delivery protection. In combination with TRAP, we can mitigate threats after they have been delivered to the email of users. Make sure your team does the necessary training related to ProofPoint products to provide maximum from what this tool can offer you. As the company's setup and threats are continuously changing, TAP and other related ProofPoint tools' settings should be adjusted accordingly. Make sure you review them on a regular basis and have a solid change management process and naming convention for custom rules and routes.
  • APPLICATION ARCHITECT
    1B-10B USD
    Consumer Goods
    Review Source

    Delivers powerful email threat protection

    4.0
    Aug 14, 2025
    Proofpoint TAP is highly effective solution for defending against advanced email based threats. The modules offers robust protection with minimal administrative overhead.
  • ENGINEER
    10B+ USD
    Energy and Utilities
    Review Source

    Real-Time Intelligence Enhances Safety with Complex Configuration Challenges

    5.0
    Sep 26, 2025
    Advanced threat detection that stops phishing and malware before it reaches users.
  • IT SECURITY ANALYST
    1B-10B USD
    Retail
    Review Source

    Product Alerts & Evidences: Shield against Malicious Threats

    5.0
    Oct 6, 2025
    Proofpoint Target Attack Protection is a critical tool to help detect, analyze and block threat actors to protect our users.
...
Showing Result 1-5 of 80

Recommended Gartner Research

  • Market Guide for Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.