• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Overview

Product Information on Targeted Attack Protection

Updated 13th October 2025

What is Targeted Attack Protection?

Targeted Attack Protection is a software developed to identify, block, and mitigate advanced threats such as phishing, ransomware, and email-based attacks before they reach users. The software analyzes incoming messages and attachments using multiple detection techniques including machine learning, sandboxing, and threat intelligence. It provides organizations with visibility into targeted threats, offering real-time reporting and forensics to investigate and respond to incidents. Targeted Attack Protection aims to address the business problem of safeguarding sensitive information and users from sophisticated email threats by preventing unauthorized access, data loss, and service disruption.

Targeted Attack Protection Pricing

Targeted Attack Protection software uses a subscription-based pricing model, typically structured by the number of users or mailboxes covered. Different tiers offer varying levels of threat detection and response features, with pricing dependent on selected capabilities and organizational scale. Custom enterprise pricing may be available for large-scale or specialized deployments.

Overall experience with Targeted Attack Protection

SYSTEMS ENGINEER
<50M USD, Miscellaneous
FAVORABLE

“Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks”

5.0
Oct 9, 2025
My overall experience with TAP has been very positive. It provides strong, proactive protection against phishing and target email threats, while offering clear visibility into detect attacks and user risk.
IT Security Team Lead
10B - 30B USD, Retail
CRITICAL

“Unveiling Proofpoint's Unique Protection Against Email Threats”

3.0
Oct 30, 2024
We use multiple Proofpoint products to protect against email threats. There is room for improvement however, the timing to re-classify a vetted email as not malicious can take longer than expected.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Peer Discussions

Recommended Gartner Insights

  • Market Guide for Network Sandboxing (Retired)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

  1. Home
  2. /
  3. Targeted Attack Protection
Logo of Targeted Attack Protection

Targeted Attack Protection

byProofpoint
in
4.6

About Company

Company Description

Updated 7th December 2023

The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.

Company Details

Updated 26th February 2025
Company type
Private
Year Founded
2002
Head office location
Sunnyvale, United States
Number of employees
1001 - 5000
Website
https://www.proofpoint.com

Do You Manage Peer Insights at Proofpoint?

Access Vendor Portal to update and manage your profile.

Reviewer Insights for: Targeted Attack Protection
Deciding Factors: Targeted Attack Protection Vs. Market Average
Performance of Targeted Attack Protection Across Market Features

Targeted Attack Protection Likes & Dislikes

Like

The reporting and alerting tools make it easy to track and respond to threats quickly, and the integration with our existing email environment has been smooth. When used alongside Proofpoint TRAP, it becomes even more effective. TAP detects and classifies malicious emails in real time, while TRAP automagically quarantines or removes those messages from user inboxes even after delivery if they're later identified as threats. This integration helps close the response gap, minimizing user exposure and reducing manual remediation workload on IT. Together, TAP and TRAP provide a layered, automated defense that strengthens overall email threat protection.

Like

The ability to evaluate targeted embedded links within a given email.

Like

TAP allows us to be alerted when a malicious payload or link is sent to our users allowing us to take swift action.

Dislike

Configuration, integration and tuning is complex, but support was with us 100% of the way and did the brunt of the work. False positives are a given and it's no different with TAP. You can set up VIP or high-risk users, but it doesn't do any additional protection. This only allows for more additional insight and reporting and not much else.

Dislike

The time it takes to re-classify some of our vendor's email domains as not malicious sometimes takes longer than expected.

Dislike

None, The service is very high quality along with all products from Proofpoint.

Top Targeted Attack Protection Alternatives

Targeted Attack Protection Reviews and Ratings

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • SYSTEMS ENGINEER
    <50M USD
    Miscellaneous
    Review Source

    Real-Time Threat Detection and Automated Remediation Reduce Email Security Risks

    5.0
    Oct 9, 2025
    My overall experience with TAP has been very positive. It provides strong, proactive protection against phishing and target email threats, while offering clear visibility into detect attacks and user risk.
  • IT SECURITY ANALYST
    1B-10B USD
    Retail
    Review Source

    Product Alerts & Evidences: Shield against Malicious Threats

    5.0
    Oct 6, 2025
    Proofpoint Target Attack Protection is a critical tool to help detect, analyze and block threat actors to protect our users.
  • DIRECTOR
    50M-1B USD
    Banking
    Review Source

    simple dashboard, good reporting

    5.0
    Jan 21, 2026
    like the product , the intergration with mail flow, would like to see api integration for admin control
  • ENGINEER
    10B+ USD
    Energy and Utilities
    Review Source

    Real-Time Intelligence Enhances Safety with Complex Configuration Challenges

    5.0
    Sep 26, 2025
    Advanced threat detection that stops phishing and malware before it reaches users.
  • VICE PRESIDENT - END USER COMPUTING - ME
    10B+ USD
    Banking
    Review Source

    Frequent feature updates enhance this product on a consistent basis.

    5.0
    Oct 16, 2025
    Great account management even after a change in account management. Good communicators as a company.
...
Showing Result 1-5 of 80

Showing data for 80 ratings and reviews for Network Sandboxing (Retired) market. View all 80 ratings and reviews across markets for a complete picture.

4.6

(80 Ratings)

Rating Distribution

5 Star
63%
4 Star
31%
3 Star
5%
2 Star
1%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.2

Integration & Deployment

4.4

Service & Support

4.5

Product Capabilities

4.7

Logo of R80 Security Management
1. R80 Security Management
4.6
(240 Ratings)
Logo of Check Point Intrusion Prevention System (IPS)
2. Check Point Intrusion Prevention System (IPS)
4.6
(154 Ratings)
Logo of Check Point SandBlast Network
3. Check Point SandBlast Network
4.7
(77 Ratings)
View All Alternatives