4.6
2579 Reviews (All time)
Review weighting

Browse Proofpoint Reviews

Proofpoint is present in 10 markets with 13 products. Proofpoint has 2579 reviews with an overall average rating of 4.6.

Data Loss Prevention

cca-logo

The market for DLP technology includes offerings that provide visibility into data usage and movement across an organization. It also involves dynamic enforcement of security policies based on content and context for data in use, data in motion and data at rest. DLP technology seeks to address data-related threats, including the risks of inadvertent or accidental data loss and the exposure of sensitive data, using monitoring, alerting, warning, blocking, quarantining and other remediation features.

Proofpoint has 2 products in Data Loss Prevention market

ERP and Corporate Management - Others

Reviews for 'ERP and Corporate Management - Others'

Proofpoint has 1 product in ERP and Corporate Management - Others market

Email Security (Transitioning to Email Security Platform)

Email security refers collectively to the prediction, prevention, detection and response framework used to provide attack protection and access protection for email. Email security spans gateways, email systems, user behavior, content security, and various supporting processes, services and adjacent security architecture. Effective email security requires not only the selection of the correct products, with the required capabilities and configurations, but also having the right operational procedures in place.

Proofpoint has 2 products in Email Security (Transitioning to Email Security Platform) market

Enterprise Information Archiving

Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.

Proofpoint has 1 product in Enterprise Information Archiving market

Insider Risk Management Solutions

cca-logo

Gartner defines insider risk management as a methodology that includes the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts in the organization. It includes solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. These tools then evaluate whether behavior falls within the expectations of the role and corporate risk tolerance. For CISOs and cybersecurity leaders, insider risk management refers to the use of technical solutions to solve a fundamentally human problem. Managing insider risks requires collaboration among many cross-functional partners. Components of an insider risk management methodology are policies, guidelines and investigative work that fall outside the bounds of a typical cybersecurity organization. For our purposes, the insider risk management market consists of tools and solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. It evaluates whether behavior falls within the expectations of the role and corporate risk tolerance.

Proofpoint has 1 product in Insider Risk Management Solutions market

Network Sandboxing

Network-based sandboxing is a proven technique for detecting malware and targeted attacks. Network sandboxes monitor network traffic for suspicious objects and automatically submit them to the sandbox environment, where they are analyzed and assigned malware probability scores and severity ratings. Sandboxing technology has been used for years by malware researchers at security companies and even in some large enterprises that are highly security conscious. Traditionally, using a sandbox has been an intensive effort requiring advanced skills. The malware researcher manually submits a suspicious object into the sandbox and analyzes it before flagging it as malware or not. By adding automated features to sandboxing technology (automatically submitting suspicious objects and automatically generating alerts).

Proofpoint has 1 product in Network Sandboxing market

Security Awareness Computer-Based Training

The SACBT market is characterized by vendor offerings that include one or more of the following capabilities: Ready-to-use training and educational content; Employee testing and knowledge checks; Availability in multiple languages, natively or through subtitling or partial translation (in many cases, language support is diverse and localized); Phishing and other social engineering attack simulations; Platform and awareness analytics to help measure the efficacy of the awareness program. Training modules are available as cloud-hosted SaaS applications or on-premises deployments via client-managed learning management systems (LMSs), and also support the Sharable Content Object Reference Model (SCORM) standard, enabling integration with corporate LMSs.

Proofpoint has 1 product in Security Awareness Computer-Based Training market

Security Service Edge

Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.

Proofpoint has 2 products in Security Service Edge market

Security Threat Intelligence Products and Services

The security threat intelligence products and services market refers to the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The output of these products and services aims to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce the likelihood and impact of a potential compromise. Threat intelligence (TI) products and services support the different stages of a TI process life cycle. In particular, this involves defining the aims and objectives, collecting and processing intelligence originating from various sources, analyzing and disseminating it to different stakeholders within the organization, and regularly providing feedback on the entire process. These products and services support ongoing security investigations and assist in preventing future breaches by prioritizing infrastructure hardening. TI tools and services are most commonly cloud-based products and services, but can also be delivered “as a service.”

Proofpoint has 1 product in Security Threat Intelligence Products and Services market

Structured Data Archiving and Application Retirement

The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.

Proofpoint has 1 product in Structured Data Archiving and Application Retirement market