Overview
Product Information on Targeted Attack Protection
What is Targeted Attack Protection?
Targeted Attack Protection Pricing
Overall experience with Targeted Attack Protection
“Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks”
“Unveiling Proofpoint's Unique Protection Against Email Threats”
About Company
Company Description
The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.
Company Details
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: Targeted Attack Protection
Deciding Factors: Targeted Attack Protection Vs. Market Average
Performance of Targeted Attack Protection Across Market Features
Targeted Attack Protection Likes & Dislikes
The reporting and alerting tools make it easy to track and respond to threats quickly, and the integration with our existing email environment has been smooth. When used alongside Proofpoint TRAP, it becomes even more effective. TAP detects and classifies malicious emails in real time, while TRAP automagically quarantines or removes those messages from user inboxes even after delivery if they're later identified as threats. This integration helps close the response gap, minimizing user exposure and reducing manual remediation workload on IT. Together, TAP and TRAP provide a layered, automated defense that strengthens overall email threat protection.
Read Full Review1. Integration with TRAP which allows us to soft delete detected threats in the delivered emails. 2. URL dynamic rewriting and sandboxing of URL is quite useful in powerful tool against various malicious email attacks. 3. Dashboard shows a good overview of users who are regularly facing various attacks, which allows to provide them with additional support or email security training.
Read Full ReviewConfiguration, integration and tuning is complex, but support was with us 100% of the way and did the brunt of the work. False positives are a given and it's no different with TAP. You can set up VIP or high-risk users, but it doesn't do any additional protection. This only allows for more additional insight and reporting and not much else.
Read Full ReviewThe time it takes to re-classify some of our vendor's email domains as not malicious sometimes takes longer than expected.
Read Full ReviewThere is a different portal for each product TAP, POD, TRAP. It would be great to have everything in one place.
Read Full ReviewTop Targeted Attack Protection Alternatives
Peer Discussions
Targeted Attack Protection Reviews and Ratings
- SYSTEMS ENGINEER<50M USDMiscellaneousReview Source
Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks
My overall experience with TAP has been very positive. It provides strong, proactive protection against phishing and target email threats, while offering clear visibility into detect attacks and user risk. - Manager1B-10B USDIT ServicesReview Source
TAP in action in daily life of SOC
As a SOC team lead, I rely on ProofPoint TAP as part of our layered email security model. It is able to detect and analyze the threats our organization is facing on a regular basis. It offers strong pre- and post-delivery protection. In combination with TRAP, we can mitigate threats after they have been delivered to the email of users. Make sure your team does the necessary training related to ProofPoint products to provide maximum from what this tool can offer you. As the company's setup and threats are continuously changing, TAP and other related ProofPoint tools' settings should be adjusted accordingly. Make sure you review them on a regular basis and have a solid change management process and naming convention for custom rules and routes. - APPLICATION ARCHITECT1B-10B USDConsumer GoodsReview Source
Delivers powerful email threat protection
Proofpoint TAP is highly effective solution for defending against advanced email based threats. The modules offers robust protection with minimal administrative overhead. - ENGINEER10B+ USDEnergy and UtilitiesReview Source
Real-Time Intelligence Enhances Safety with Complex Configuration Challenges
Advanced threat detection that stops phishing and malware before it reaches users. - IT SECURITY ANALYST1B-10B USDRetailReview Source
Product Alerts & Evidences: Shield against Malicious Threats
Proofpoint Target Attack Protection is a critical tool to help detect, analyze and block threat actors to protect our users.

