We performed a comparison between Proofpoint Email Protection and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG)."The most valuable feature of Proofpoint Email Protection is the blocking capabilities, it blocks a lot of potential threats."
"The Phish Alarm button allows users to submit questionable emails for review and complete analysis."
"The most valuable feature is the ability to remove bad messages that were delivered, prior to being classified as unwanted."
"The most valuable features of Proofpoint Email Protection are ease of use, data loss prevention, antivirus, and spam protection."
"A one-stop shop for email protection"
"The most valuable feature of Proofpoint Email Protection is the central location dashboard for viewing all the related information for risk."
"The stability is very good."
"The solution's technical support is good. I rate the technical support a ten out of ten."
"We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment."
"Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"The server appliance is good."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us."
"Support is very helpful and responsive."
"Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"The email DLP portion could be a bit easier."
"It's scalable, but the devil's in the details — you have to know your email volumes."
"There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats."
"The solution could lower its price."
"I would want better spear phishing protection in the essentials package."
"Proofpoint Email Protection could improve by allowing more customization of the reports, such as exceptions and black-and-white lists."
"Technical support could be improved."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"We'd like the potential for better scaling."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"Stability issues manifested in terms of throughput maximization."
More Trellix Network Detection and Response Pricing and Cost Advice →
Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 46 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Proofpoint Email Protection is rated 8.4, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Fortinet FortiGate, Zscaler Internet Access and Vectra AI.
We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.