Meilleures alternatives à Proofpoint Threat Response les mieux notées
Avis sur 16 Proofpoint Threat Response

La chose la plus utile est la visibilité et la protection avancée contre les logiciels malveillants. Elle offre un suivi complet des e-mails par rapport à d'autres contrôles de sécurité des e-mails Cisco. Avis collecté par et hébergé sur G2.com.
Comme je lis à propos de ce contrôle, c'est un produit basé sur le cloud, il pourrait être plus bénéfique s'il est disponible en tant que PAAS. Avis collecté par et hébergé sur G2.com.
With this system in a smaller business it gives the reassurance of knowing your systems are secure. Multiple systems are protected from threats and controlled by one interface. Avis collecté par et hébergé sur G2.com.
It did take a decent amount of time to adjust settings to the correct level of protection. Avis collecté par et hébergé sur G2.com.
Combining with other proofpoint products for responding actions Avis collecté par et hébergé sur G2.com.
supported workflow, playbook is very poor Avis collecté par et hébergé sur G2.com.
Proofpoint integrates with alot of security solutions, which is always a good thing. Avis collecté par et hébergé sur G2.com.
Lack of responsiveness from there support team. seems they might be understaffed as it takes a few days for them to respond to issues submitted. Avis collecté par et hébergé sur G2.com.
to choose just one thing is not very easy. The fact that the database which is used to prevent malware and phishing emails is amazing. The auto pull of emails into the quarantine folder helps us when time is at a crunch. Also if an email is pulled and it was not considered malicious we have the means to un-quarantine the messages. The logs are readily available for any trouble shooting you may need Avis collecté par et hébergé sur G2.com.
There are times when some emails go through which should never have been processed. Also there are times when malicious url's are not rewritten causing issues with email accounts being compromised. Avis collecté par et hébergé sur G2.com.
Consistent threat detection on large networks with multiple device types connected at any given time Avis collecté par et hébergé sur G2.com.
Finding appropriate trigger thresholds can take some time Avis collecté par et hébergé sur G2.com.