We performed a comparison between Proofpoint Email Protection and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG)."The most valuable feature of Proofpoint Email Protection is the central location dashboard for viewing all the related information for risk."
"The solution has very strong detection for most of the phishing and malicious emails received from the outside."
"Its anti-phishing functionality is the most valuable. Certainly, the biggest problem I have is phishing."
"As a cloud-based product, it can scale well."
"The solution scales quite well."
"The solution scales well."
"The most valuable feature of Proofpoint Email Protection is the TAP Dashboard. It provides more detailed information that can be used for forensic analysis. This is an advantage that other email security providers, such as Cisco, IronPort, or Microsoft do not offer in their dashboards."
"The most valuable features are the business email compromise protection and targeted attack prevention."
"The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The MVX Engine seems to be very capable against threats and the way it handles APTs is impressive."
"The installation phase was easy."
"Very functional and good for detecting malicious traffic."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"The accessibility of Proofpoint Email Protection, particularly access to product trials, could be improved. It's hard to get a trial for Proofpoint Email Protection, and many customers prefer not just to do the POC or demo but try the product out."
"The reporting section could be enhanced. I like some reports but if they could allow us to create custom reports with more flexibility it would enhance the reports more."
"The stability and UI are the two areas of the solution with certain shortcomings that need improvement."
"Proofpoint Email Protection could improve on the training. Every organization is different and to fine-tune it to block everything properly there needs to be better training. Sometimes it can block some of the information it shouldn't."
"The solution should add post-sales training."
"Integration for reporting needs to be improved, it's too complex."
"The initial setup is complex."
"There is a lot of room for Improvement in the offering, from cost to functionality. It is pretty straightforward to implement which is an advantage. However, it falls short in pricing, detection capabilities, and, most importantly, reporting and policy management."
"It is an expensive solution."
"Management of the appliance could be greatly improved."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"The product's integration capabilities are an area of concern where improvements are required."
"I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports."
More Trellix Network Detection and Response Pricing and Cost Advice →
Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 46 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Proofpoint Email Protection is rated 8.4, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI.
We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.