Proofpoint Targeted Attack Protection vs Zscaler Cloud Sandbox [EOL] comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between Proofpoint Targeted Attack Protection and Zscaler Cloud Sandbox [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP).
To learn more, read our detailed Advanced Threat Protection (ATP) Report (Updated: March 2024).
768,246 professionals have used our research since 2012.
Featured Review
Ranking
Views
826
Comparisons
616
Reviews
0
Average Words per Review
0
Rating
N/A
Unranked
In Advanced Threat Protection (ATP)
Buyer's Guide
Advanced Threat Protection (ATP)
March 2024
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP). Updated: March 2024.
768,246 professionals have used our research since 2012.
Comparisons
Also Known As
Targeted Attack Protection
Learn More
Overview

More than 90% of targeted attacks start with email—and these threats are always evolving. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs. And zero-day threats, polymorphic malware, weaponized documents and phishing attacks. TAP provides adaptive controls to isolate the riskiest URL clicks. TAP also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.

Today’s appliance-based sandboxing solutions are expensive and, therefore, typically installed only in the data center. When users leave the network, they become exposed to new threats because sandbox protection can’t follow them. Traditional sandboxes usually operate out of line, allowing traffic through while inspecting suspicious files in TAP mode. If a threat is detected in the sandbox, it sends alerts, but they can arrive too late. Traditional sandboxes also lack the ability to fully inspect SSL traffic due to hardware limitations—and many malware authors are exploiting those limitations to distribute their malicious payloads. In order to provide sandbox protection, organizations have bolted sandboxing solutions onto their existing security stacks. It helps, but achieving a fully integrated threat platform across multiple products is nearly impossible.

For more details: https://www.zscaler.com/produc...

Sample Customers
Brinker Capital
Zenith Live, Azure, Carlsberg Group
Top Industries
VISITORS READING REVIEWS
Financial Services Firm17%
Computer Software Company11%
Manufacturing Company8%
Insurance Company6%
No Data Available
Company Size
VISITORS READING REVIEWS
Small Business18%
Midsize Enterprise8%
Large Enterprise73%
No Data Available
Buyer's Guide
Advanced Threat Protection (ATP)
March 2024
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP). Updated: March 2024.
768,246 professionals have used our research since 2012.

Proofpoint Targeted Attack Protection is ranked 23rd in Advanced Threat Protection (ATP) while Zscaler Cloud Sandbox [EOL] doesn't meet the minimum requirements to be ranked in Advanced Threat Protection (ATP). Proofpoint Targeted Attack Protection is rated 7.0, while Zscaler Cloud Sandbox [EOL] is rated 0.0. The top reviewer of Proofpoint Targeted Attack Protection writes "Dynamic runtime engine and good protection, but needs better support and a single console". On the other hand, Proofpoint Targeted Attack Protection is most compared with Microsoft Defender for Office 365, Avanan, IRONSCALES, Palo Alto Networks WildFire and Microsoft Defender for Identity, whereas Zscaler Cloud Sandbox [EOL] is most compared with .

See our list of best Advanced Threat Protection (ATP) vendors.

We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.