Proofpoint Email Protection vs Webroot Advanced Email Encryption powered by Zix comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Proofpoint Email Protection and Webroot Advanced Email Encryption powered by Zix based on real PeerSpot user reviews.

Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG).
To learn more, read our detailed Secure Email Gateway (SEG) Report (Updated: April 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Proofpoint Email Protection's advantage is that, when it's working properly, it tends to catch more threats as compared to other products.""The initial implementation is pretty easy to handle.""The most valuable feature is the option to edit the inbound security.""The most valuable feature of Proofpoint Email Protection is the TAP Dashboard. It provides more detailed information that can be used for forensic analysis. This is an advantage that other email security providers, such as Cisco, IronPort, or Microsoft do not offer in their dashboards.""The archive feature is valuable.""Its main defense is to stop malicious emails from coming through. There is a sandbox environment where you can open malicious or suspicious emails to make sure that they're not malicious, instead of taking the risk of having your employees do it. This is definitely something that everybody needs nowadays, especially with the rise in cyber attacks.""The solution is very user-friendly.""It is a very scalable solution."

More Proofpoint Email Protection Pros →

"They do a better job of determining what's real and what's not than most of the other solutions we have tried, and it's been very painless to use."

More Webroot Advanced Email Encryption powered by Zix Pros →

Cons
"We'd like to have the ability to create more customized reports.""I would want better spear phishing protection in the essentials package.""It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu.""You only receive one model in Proofpoint Email Protection and the other ones you have to purchase at a high price. There should be more available with the solution and additional models should be less expensive.""Proofpoint has a lot of false alarms.""The scalability can be improved, and the solution can be optimized.""The largest complaint that we hear from our customers is that there is no local support.""Sometimes it detects false positives."

More Proofpoint Email Protection Cons →

"They have some areas that could be improved. For example, we also use this solution for email encryption, which was clunky and could be improved, but the email security itself has been excellent."

More Webroot Advanced Email Encryption powered by Zix Cons →

Pricing and Cost Advice
  • "Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost."
  • "The price is reasonable."
  • "Proofpoint is fairly expensive."
  • "The licensing is basically $8/user."
  • "It is multiple times more expensive, which made it very much less attractive."
  • "Pricing has recently been increased and the cost is a downside"
  • "The solution charges per user per month to use it. There are not any additional fees in addition to the standard living fees."
  • "Clients pay for an annual subscription of Proofpoint Email Protection. Every client always finds it expensive."
  • More Proofpoint Email Protection Pricing and Cost Advice →

  • "In terms of pricing, I believe they provide excellent value."
  • More Webroot Advanced Email Encryption powered by Zix Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Secure Email Gateway (SEG) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product is costly. I rate the product price a seven on a scale of one to ten, where one is low price and ten is high price. When you want to change what capabilities you want in the product, you… more »
    Top Answer:The whole configuration management piece of the product requires some work, as it is one of the areas where the tool has certain shortcomings. Though it is an easy-to-install product, it might be… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    2,085
    Comparisons
    1,560
    Reviews
    23
    Average Words per Review
    454
    Rating
    8.1
    Views
    218
    Comparisons
    168
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Proofpoint Enterprise Protection, Cofense PhishMe
    Zix Email Encryption, ZixEncrypt
    Learn More
    Overview

    Proofpoint Email Protection is a machine learning email gateway that catches both known and unknown threats. Through Target Attack Protection, emails will be analyzed and potentially blocked from advanced threats while users gain visibility around these threats. The technology can also classify various types of email and can be deployed both on premises or as a cloud service. In addition, users can tag suspicious emails to help raise user awareness and track down any email quickly.

    Proofpoint Email Protection offers Advanced BEC Defense, which can precisely detect and block different types of emails, even if they don’t involve a malicious payload, such as business email compromise (BEC). Email Protection, which is powered by NexusAI, is a sophisticated detection technique developed to stop a variety of kinds of email fraud from affecting compromised accounts. It’s specifically designed to analyze message components, such as the sender’s IP address (including reputation and x-originating IP), the message header, and the message body. Using machine learning and AI, it will then determine if that message is a BEC threat.

    Benefits of Proofpoint Email Protection

    Proofpoint Email Protection is a favorite for organizations looking to utilize their cybersecurity budget accurately, and provides the user with incredible visibility. While preventing email fraud, the technology can also detect and block advanced malware as well as identifying possible risks.

    Email Protection offers many benefits, including:

    • Email warning tag - Raise user awareness and reduce the risk of possible compromises by automatically tagging suspicious emails.

    • Gain granular control of unwanted email - Gain control over low-priority emails through granular email filtering, which can pinpoint gray mail, like newsletters and bulk mail.

    • Multi-layered detection - Defend against continuous evolving threats with reputation and content analysis. Email Protection offers a dynamic classification of various emails, including malware, spam, phishing, imposter threats, and bulk email.

    • Smart search - Track down an email based on dozens of search criteria in seconds. Smart search also provides the ability to trace where emails came from.

    Reviews from Real Users

    Proofpoint Email Protection enables business continuity capabilities through their machine learning, AI-powered email gateway. With its innovative approach toward detecting, analyzing, identifying, and blocking advanced threats, users can gain unique visibility into their business data environments. Users especially like the ability to block spam, as well as the business email compromise protection.

    An anonymous reviewer who is a principal consultant at a tech company, notes, "Proofpoint is the main tool for blocking spam because it denies the connection altogether."

    Sridhar R., a security professional at Qatar Computer Services WLL, writes, "The most valuable features are the business email compromise protection and targeted attack prevention."

    Proven Content Filters

    To send an encrypted email, your employees simply create a message and hit ‘send'. Our content filters take care of the rest.

    Transparent Delivery

    When your employees receive an encrypted reply, the experience is just as easy. They simply open the encrypted email like regular email. No matter where they are or what device they use, if your customers and partners have email, they can easily receive encrypted email.

    Convenient Recipient Experience

    Our patented Best Method of Delivery ensures all messages are delivered in the most secure and easy manner possible, including transparent, pull and push methods. For pull delivery, secure web portals can be in the cloud or on-site. Also among our robust methods is secure PDF for statement delivery.

    Simplified Quarantined Messages

    If an email is quarantined, then employees, managers and IT receive notification to view the message and policy violations and can delete the email, or justify and release it for delivery.

    Sample Customers
    Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
    Erie County of Pennsylvania’s Human Services Department, Justice Federal Credit Union, STAR Financial Group, Chisago County, Minn., The National Banks of Central Texas, Kentucky Retirement Systems (KRS), Frankfort, Ky, Athletico Physical Therapy, District of Columbia Retirement Board (DCRB), CIBM Bank
    Top Industries
    REVIEWERS
    Computer Software Company15%
    Financial Services Firm15%
    Retailer12%
    Healthcare Company12%
    VISITORS READING REVIEWS
    Educational Organization25%
    Computer Software Company12%
    Financial Services Firm7%
    Manufacturing Company6%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government11%
    Financial Services Firm11%
    Healthcare Company8%
    Company Size
    REVIEWERS
    Small Business46%
    Midsize Enterprise22%
    Large Enterprise32%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise34%
    Large Enterprise46%
    VISITORS READING REVIEWS
    Small Business39%
    Midsize Enterprise17%
    Large Enterprise44%
    Buyer's Guide
    Secure Email Gateway (SEG)
    April 2024
    Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG). Updated: April 2024.
    768,578 professionals have used our research since 2012.

    Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 44 reviews while Webroot Advanced Email Encryption powered by Zix is ranked 14th in Secure Email Gateway (SEG). Proofpoint Email Protection is rated 8.4, while Webroot Advanced Email Encryption powered by Zix is rated 7.0. The top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". On the other hand, the top reviewer of Webroot Advanced Email Encryption powered by Zix writes "Inexpensive, with good email security, but the technical support could be improved". Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail, whereas Webroot Advanced Email Encryption powered by Zix is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP) and Barracuda Email Security Gateway.

    See our list of best Secure Email Gateway (SEG) vendors.

    We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.