• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
proofpoint
4.6
3120 Reviews (All time)
Review weighting


Browse Proofpoint Reviews

Proofpoint is present in 12 markets with 18 products. Proofpoint has 3120 reviews with an overall average rating of 4.6.

AI Usage Control

AI usage control (AI-UC) is a technology to discover the use of third-party AI and enforce the security policies of an organization. Key capabilities include enforcing granular data-sharing policies, automatically detecting and cataloging all AI tools (including shadow AI), and moderating content by filtering sensitive data in real time. AI-UC defines and enforces usage policies, inspects content for sensitive data, assesses risk, and raises alerts on anomalies. AI-UC is primarily delivered as a cloud-based service and may include multiple local inspection points. Typical users of AI Usage Control (AI-UC) are security, compliance, and IT teams, including CISOs, data privacy officers, and risk managers. Many current discovery tools treat AI applications as any other application. ignoring unique risks and integrations of AI in an organization's environment. AI usage control provides fine-grained categorization and intent-based policies, enabling safe adoption of third-party applications while mitigating security risks.

Proofpoint has 1 product in AI Usage Control market
  • Proofpoint
    4.1
    7 Reviews

Data Loss Prevention

cca-logo

Gartner defines data loss prevention (DLP) as a technical control designed to prevent data loss in order to comply with personal data regulations, prevent unintended disclosure, minimize insider risk and ensure that sensitive data is not overly accessible. DLP controls are typically applied to reduce the data risk for two states of unstructured data: data at rest and data in motion. Depending on the state of the data, DLP applies detective, preventive or corrective controls, including alerting, quarantining, blocking, redaction or access restriction.

Proofpoint has 3 products in Data Loss Prevention market
  • Adaptive Email DLP
    4.6
    25 Reviews
  • Proofpoint Enterprise Data Loss Prevention (DLP)
    4.5
    205 Reviews
  • 1 more product

Data Security Posture Management

Data security posture management (DSPM) discovers previously unknown data across on-premises data centers and cloud service providers (CSPs). It also helps categorize and classify previously unknown and discovered unstructured and structured data. As data rapidly proliferates, DSPM assesses who has access to it to determine its security posture and exposure to privacy, security and AI-usage-related risks. DSPM is delivered as software or as a service.

Proofpoint has 1 product in Data Security Posture Management market
  • Proofpoint Data Security Posture Management
    4.7
    14 Reviews

Digital Communications Governance and Archiving Solutions

Gartner defines digital communications governance and archiving (DCGA) solutions as designed to enforce corporate governance and regulatory compliance, and derive insights from an evolving number of digital communications tools utilized by organizations. For the various communications tools in use across the enterprise, DCGA solutions enable consistent policy management and enforcement, reveal new data insights, and provide reporting capabilities of their use. Organizations utilize DCGA solutions to proactively manage, monitor, collect and archive communications content. They are critical to an organizations’ efforts to meet a growing number of regulatory compliance mandates and an expanding scope of organizational communications governance and data insights. Compliance requirements include monitoring, oversight, audits and investigations for regulated industries such as financial services and health sciences. They also extend to investigation requirements of the public sector to respond to public records requests. Corporate governance requirements include employee conduct and handling of sensitive data in the use of digital communication tools.

Proofpoint has 1 product in Digital Communications Governance and Archiving Solutions market
  • Proofpoint Archive
    4.8
    118 Reviews

Email Security Platforms (Transitioning to Email Security)

Gartner defines an email security platform as a product that secures email infrastructure. Its primary purpose is the removal of malicious (phishing, social engineering, viruses) or unsolicited messages (spam, marketing). Other functions include email data protection, domain-based message authentication, reporting and conformance (DMARC), investigation, and remediation through a dedicated console. These solutions may integrate as a secure email gateway (SEG) for predelivery protection or as an integrated cloud email security (ICES) solution for postdelivery protection. Email security platforms protect an organization’s email infrastructure from social engineering, phishing, business email compromise, spam, malware attacks and data theft. These platforms are deployed independently but integrated with other network and endpoint security controls to improve the overall risk posture of the organization. They offer cybersecurity teams visibility into email-related security incidents for investigation and remediation.

Proofpoint has 3 products in Email Security Platforms (Transitioning to Email Security) market
  • Proofpoint Essentials
    4.4
    77 Reviews
  • Proofpoint Threat Protection
    4.6
    1323 Reviews
  • 1 more product

IT Security

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

Proofpoint has 3 products in IT Security market
  • Proofpoint Web Security
    4.6
    45 Reviews
  • Proofpoint Cloud App Security Broker (PCASB)
    4.4
    110 Reviews
  • 1 more product

Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) refers to a set of security practices and technologies designed to detect, investigate, and respond to threats targeting digital identities within an organization. These threats often involve compromised credentials, privilege escalation, or unauthorized access to sensitive systems. ITDR solutions work by continuously monitoring identity-related activities, analyzing behavior patterns, and identifying anomalies that may indicate malicious intent. Once a threat is detected, ITDR tools help security teams respond quickly by isolating affected accounts, enforcing multi-factor authentication, or initiating automated remediation workflows. As identity becomes a primary attack vector in modern cyber threats, ITDR plays a crucial role in strengthening an organization’s overall security posture.

Proofpoint has 1 product in Identity Threat Detection and Response (ITDR) market
  • Proofpoint Identity Threat Defense
    4.6
    23 Reviews

Insider Risk Management Solutions

Gartner defines the insider risk management (IRM) market as solutions that use advanced analytics, monitoring, and behavior-based risk models to detect, analyze and mitigate risks posed by trusted insiders within an organization. These solutions monitor the activities of employees, service partners and key suppliers to ensure their behavior aligns with corporate policies and risk tolerance levels. IRM platforms can be delivered as cloud-based services or on-premises solutions, or in hybrid forms. When effectively implemented alongside proper governance, they provide comprehensive visibility, real-time detection, and proactive intervention to safeguard against data theft, fraud and other malicious or unintentional insider threat activities.

Proofpoint has 1 product in Insider Risk Management Solutions market
  • Proofpoint Insider Threat Management
    4.6
    113 Reviews

Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge)

Network-based sandboxing is a proven technique for detecting malware and targeted attacks. Network sandboxes monitor network traffic for suspicious objects and automatically submit them to the sandbox environment, where they are analyzed and assigned malware probability scores and severity ratings. Sandboxing technology has been used for years by malware researchers at security companies and even in some large enterprises that are highly security conscious. Traditionally, using a sandbox has been an intensive effort requiring advanced skills. The malware researcher manually submits a suspicious object into the sandbox and analyzes it before flagging it as malware or not. By adding automated features to sandboxing technology (automatically submitting suspicious objects and automatically generating alerts).

Proofpoint has 1 product in Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge) market
  • Targeted Attack Protection
    4.6
    80 Reviews

Security Awareness Computer-Based Training

The SACBT market is characterized by vendor offerings that include one or more of the following capabilities: 1. Ready-to-use training and educational content. 2. Employee testing and knowledge checks. 3. Availability in multiple languages, natively or through subtitling or partial translation (in many cases, language support is diverse and localized). 4. Phishing and other social engineering attack simulations. 5. Platform and awareness analytics to help measure the efficacy of the awareness program. Training modules are available as cloud-hosted SaaS applications or on-premises deployments via client-managed learning management systems (LMSs), and also support the Sharable Content Object Reference Model (SCORM) standard, enabling integration with corporate LMSs.

Proofpoint has 1 product in Security Awareness Computer-Based Training market
  • Proofpoint ZenGuide
    4.5
    789 Reviews

Security Threat Intelligence Products and Services (Transitioning to Cyber Threat Intelligence Technologies)

The security threat intelligence products and services market refers to the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The output of these products and services aims to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce the likelihood and impact of a potential compromise. Threat intelligence (TI) products and services support the different stages of a TI process life cycle. In particular, this involves defining the aims and objectives, collecting and processing intelligence originating from various sources, analyzing and disseminating it to different stakeholders within the organization, and regularly providing feedback on the entire process. These products and services support ongoing security investigations and assist in preventing future breaches by prioritizing infrastructure hardening. TI tools and services are most commonly cloud-based products and services, but can also be delivered “as a service.”

Proofpoint has 1 product in Security Threat Intelligence Products and Services (Transitioning to Cyber Threat Intelligence Technologies) market
  • Proofpoint Emerging Threat (ET) Intelligence
    4.7
    2 Reviews

Structured Data Archiving and Application Retirement (Transitioning to Data Archiving Solutions)

The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.

Proofpoint has 1 product in Structured Data Archiving and Application Retirement (Transitioning to Data Archiving Solutions) market
  • Archive Solution (Legacy)
    3.0
    1 Review
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©