Top Rated Proofpoint Insider Threat Management Alternatives
The rules are easy to learn to configure, and set up. Each alert coupled with the screen shot tool, provides tons of context for the event that triggered the alert. Review collected by and hosted on G2.com.
The console for the tool is painful to use at scale, but to take the data from the console to a tool that makes it easier to interact with is a whole different product. Review collected by and hosted on G2.com.
47 out of 48 Total Reviews for Proofpoint Insider Threat Management
Overall Review Sentiment for Proofpoint Insider Threat Management
Log in to view review sentiment.
Proofpoint Insider Threat Protection effectively monitors internal risks using behavior analytics and machine learning. It detects unusual activities and potential data leaks, offering detailed reporting and visibility. While setup can be complex, it’s a strong choice for organizations focused on enhancing internal security. Review collected by and hosted on G2.com.
I do not anything that I do not like about this product Review collected by and hosted on G2.com.
The most helpful aspect of Proofpoint ITM is that it monitors user activity for any suspicious or unusual user behavior. This could be monitoring the users web activity for any sensitive documents being uploaded to external sites. Review collected by and hosted on G2.com.
There is nothing I dislike about the ITM product. Review collected by and hosted on G2.com.
The ability to pivot and really gain an understanding of the context behind user actions. I.e it's a great way to verify if actions did take place, coming from a Threat Intel / Insider response world, it's great at helping us understand if the actions align with TTPs we are tracking to determine with confidence if we are at threat. Review collected by and hosted on G2.com.
Data retention, within the actual platform we only gain 2 weeks worth of insight - which is not always helpful in historical investigations. Review collected by and hosted on G2.com.
PP ITM is incredibly powerful and has a huge variety of features that should be able to apply to any organization's needs. It has a great auto-update feature that allows endpoints to easily receive the latest updates seamlessly and without user interaction. The implementation was thorough and with a consultant that was very helpful. Review collected by and hosted on G2.com.
It is a little difficult to integrate with other services (such as a SIEM). We experienced two incidents that required a substantial amount of assistance from customer support, as the issues were not related to any actions taken by us and could not be resolved on our end. It took a large amount of time and caused a bit of "reputational" damage to our department as the perceived risk of the product drastically increased due to a business disruption from the above mentioned incidents with the product. Review collected by and hosted on G2.com.
Proofpoint Insider Threat Management will block user downloading file to USB or upload to cloud. It will protect company's security information. This product is easy integration and have user friendly interface. PPS always provide a excellent technicial support team to solve all issues. Review collected by and hosted on G2.com.
Proofpoint Insider Threat Management should provide a detail report for all issue immediately Review collected by and hosted on G2.com.
The best part of the ITM solutions is the predectiability of leavers before the two week resignation is sumbitted. Review collected by and hosted on G2.com.
The difficult part of this solutions is the false poisitives that are likely with unusual behevoir due to role changes and turnover. Review collected by and hosted on G2.com.

Out of the box use cases, easy to use UI, custimization Review collected by and hosted on G2.com.
Lack of support for the on prem product. Deployment methods are average Review collected by and hosted on G2.com.
Insider Threat Management (ITM) gives us visibility into the most actively attacked accounts and employees. This allows us to take quick action and apply additional controls to potential targets. Review collected by and hosted on G2.com.
Like most Proofpoint products, I would like to see a single pane of glass, if possible. Review collected by and hosted on G2.com.

It prevents the data loss and its detection tool investigates the abnormal activities. Review collected by and hosted on G2.com.
Nothing to dislike, just that the employees sometimes may feel uncomfortable or may have restrict from performing general activities. Review collected by and hosted on G2.com.