We performed a comparison between Proofpoint Email Protection and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG)."Proofpoint Email Protection is the best solution from the perspective of email security."
"Proofpoint Email Protection is a good product, and its most beneficial feature is the Threat Response Auto-Pull. I also like that it's an integrated email security solution."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"They have customized security rules, mature rules, anti-virus protection, as well as email authentication similar to SPF, DKIM, and DMARC."
"The Phish Alarm button allows users to submit questionable emails for review and complete analysis."
"The solution scales quite well."
"A one-stop shop for email protection"
"The solution has very strong detection for most of the phishing and malicious emails received from the outside."
"Support is very helpful and responsive."
"Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly effective in mitigating these threats."
"The product is very easy to configure."
"We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"The solution can scale."
"Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
"Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
"The solution could be improved with the addition of PLP and email encryption features."
"Proofpoint Email Protection could improve by allowing more customization of the reports, such as exceptions and black-and-white lists."
"The solution could lower its price."
"Proofpoint has a lot of false alarms."
"It's scalable, but the devil's in the details — you have to know your email volumes."
"Proofpoint Email Protection could improve by reducing the price."
"The solution's server console and cluster dashboard have been the same for four years so need to be upgraded."
"Sometimes it detects false positives."
"It is an expensive solution."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
More Trellix Network Detection and Response Pricing and Cost Advice →
Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 44 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 35 reviews. Proofpoint Email Protection is rated 8.4, while Trellix Network Detection and Response is rated 8.6. The top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI.
We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.