Proofpoint Threat Response Reviews

Filter by:
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Real User
Security Specialist at a tech services company with 201-500 employees
Apr 16 2019

What is most valuable?

Auto-pulling the emails and phishing are the most valuable features, plus also we can randomly pull the emails based upon our own requirements.

How has it helped my organization?

It has reduced our manual efforts to remove emails from each user's inbox, and in this case, we do not have to ask our IT department or users to do so. We can simply do it… more»

What needs improvement?

If the reporting gets improved then it would be better, but the product is running amazing as it is.

What's my experience with pricing, setup cost, and licensing?

It's quite easy to implement the solution. It takes only two to three days max, and we can run it on virtualization. It requires fewer resources. The product cost is low… more»

Which solution did I use previously and why did I switch?

As of now, there is no other product available on the market that delivers the same functionality, so we haven't switched from any other product.

What other advice do I have?

As of now, the OEM is developing new features every quarter, so I don't see or feel anything new or better is required, other than some improvements in the reporting.

Which other solutions did I evaluate?

We did try to find a solution that can automatically pull the emails, but as of now, there is no such product in the market.


User Assessments By Topic About Proofpoint Threat Response

Proofpoint Threat Response Questions

What is Proofpoint Threat Response?

No defense can stop every attack. When something does get through, Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently. Get an actionable view of threats, enrich alerts, and automate forensic collection and comparison. For verified threats, quarantine and contain users, hosts, and malicious email attachments - automatically or at the push of a button.

Proofpoint Threat Response customers

University of Waterloo, Akorn, Fenwick and West LLP