Proofpoint Threat Response Overview

What is Proofpoint Threat Response?

No defense can stop every attack. When something does get through, Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently. Get an actionable view of threats, enrich alerts, and automate forensic collection and comparison. For verified threats, quarantine and contain users, hosts, and malicious email attachments - automatically or at the push of a button.

Buyer's Guide

Download the Security Incident Response Buyer's Guide including reviews and more. Updated: May 2021

Proofpoint Threat Response Customers

University of Waterloo, Akorn, Fenwick and West LLP

Proofpoint Threat Response Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Security Specialist at a tech services company with 201-500 employees
Real User
Top 20
Has reduced our manual efforts to remove emails from each user's inbox

What is our primary use case?

Our main use case is to automatically remove and pull the malicious, phishing and spam emails from each user's mailbox. We have also integrated this with Proofpoint TAP and PPS for more feeding.

Pros and Cons

  • "It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so."
  • "If the reporting gets improved then it would be better, but the product is running amazing as it is."

What other advice do I have?

As of now, the OEM is developing new features every quarter, so I don't see or feel anything new or better is required, other than some improvements in the reporting.