Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Top Rated Proofpoint Insider Threat Management Alternatives

Proofpoint Insider Threat Management Reviews & Product Details

Verified User in Biotechnology
AB
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

The rules are easy to learn to configure, and set up. Each alert coupled with the screen shot tool, provides tons of context for the event that triggered the alert. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

The console for the tool is painful to use at scale, but to take the data from the console to a tool that makes it easier to interact with is a whole different product. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

It is helping us know and understand when and how data is leaving our environment. This helps us control what should and should not be leaving, thereby helping us protect information that should not leave the environment. Review collected by and hosted on G2.com.

Proofpoint Insider Threat Management Overview

What is Proofpoint Insider Threat Management?

As the leading people-centric Insider Threat Management solution, Proofpoint ITM and Endpoint DLP protects against endpoint-based data loss, malicious acts, and brand damage involving insiders acting maliciously or carelessly. The product provides visibility, context, and analysis to help security teams quickly detect and prevent insider-led data breaches, while accelerating incident investigations and response to mitigate damage. Endpoint DLP, a subset of ITM, focuses on the detection and prevention of risky file activity by everyday users while ITM focuses on identifying and monitoring the riskiest users. With a single lightweight endpoint agent, you can monitor every day and risky users with one solution.

Proofpoint Insider Threat Management Details
Languages Supported
English, French, Japanese, Spanish
Show LessShow More
How do you position yourself against your competitors?

Proofpoint ITM and Endpoint DLP combines people-centric visibility with a single lightweight agent to protect against insider threats and prevent data loss. The solution is:

- Contextualized: Gain real-time insights into ‘who, what, where, when’ as well as user intent and irrefutable evidence for each incident in timeline views and screenshots.

- Comprehensive: Detect risky user behavior with a comprehensive insider threat library. Proactively hunt for threats with powerful search and filter capabilities for data explorations.

- Cloud-Native: Built for scalability, security, privacy and flexibility to deploy as SaaS or on-premise with an API-driven modern architecture.


Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,844 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
Ownership
NASDAQ: PFPT
Description

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.


LX
Overview Provided by:

Recent Proofpoint Insider Threat Management Reviews

KY
Kenny Y.Mid-Market (51-1000 emp.)
4.5 out of 5
"Protect against insider"
Proofpoint Insider Threat Protection effectively monitors internal risks using behavior analytics and machine learning. It detects unusual activiti...
JG
John G.Mid-Market (51-1000 emp.)
4.5 out of 5
"Review for PP ITM"
The ability to detect threats using CASB
Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"Defense against insider"
It is easy to use. It gives us a clean picture of what our employees actions
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Proofpoint Insider Threat Management Media

Proofpoint Insider Threat Management Demo - Configuration for ITM or Endpoint DLP
Configuration for everyday or risky users
Proofpoint Insider Threat Management Demo - Rules Engine
Create rules tailored to your environment
Proofpoint Insider Threat Management Demo - Customized Data Explorations
Leverage filter and search to customize data explorations and proactively hunt threats
Proofpoint Insider Threat Management Demo - Detailed Investigations View
Gain context and insights with a user timeline that provides details before, during and after an incident
Proofpoint Insider Threat Management Demo - Alert Manager
Manage incident workflows and history
Answer a few questions to help the Proofpoint Insider Threat Management community
Have you used Proofpoint Insider Threat Management before?
Yes

47 out of 48 Total Reviews for Proofpoint Insider Threat Management

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Proofpoint Insider Threat Management Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Proofpoint Insider Threat ManagementQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
KY
sys admin
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
(Original )Information
What do you like best about Proofpoint Insider Threat Management?

Proofpoint Insider Threat Protection effectively monitors internal risks using behavior analytics and machine learning. It detects unusual activities and potential data leaks, offering detailed reporting and visibility. While setup can be complex, it’s a strong choice for organizations focused on enhancing internal security. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

I do not anything that I do not like about this product Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

It detects unusual activities and potential data leaks, offering detailed reporting. Review collected by and hosted on G2.com.

JR
Information Security Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

The most helpful aspect of Proofpoint ITM is that it monitors user activity for any suspicious or unusual user behavior. This could be monitoring the users web activity for any sensitive documents being uploaded to external sites. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

There is nothing I dislike about the ITM product. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Proofpoint ITM is helping solve the problem of data leak, loss/compromise by monitoring users behaviors on external websites. This benefits the company by reducing the risk of being involved in an incident. Review collected by and hosted on G2.com.

Verified User in Pharmaceuticals
UP
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

The ability to pivot and really gain an understanding of the context behind user actions. I.e it's a great way to verify if actions did take place, coming from a Threat Intel / Insider response world, it's great at helping us understand if the actions align with TTPs we are tracking to determine with confidence if we are at threat. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

Data retention, within the actual platform we only gain 2 weeks worth of insight - which is not always helpful in historical investigations. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Verifying with confidence actions taking place to help coorberate Threat Intelligence. Review collected by and hosted on G2.com.

Verified User in Financial Services
AF
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

PP ITM is incredibly powerful and has a huge variety of features that should be able to apply to any organization's needs. It has a great auto-update feature that allows endpoints to easily receive the latest updates seamlessly and without user interaction. The implementation was thorough and with a consultant that was very helpful. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

It is a little difficult to integrate with other services (such as a SIEM). We experienced two incidents that required a substantial amount of assistance from customer support, as the issues were not related to any actions taken by us and could not be resolved on our end. It took a large amount of time and caused a bit of "reputational" damage to our department as the perceived risk of the product drastically increased due to a business disruption from the above mentioned incidents with the product. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

PP ITM tracks user activity (both generally and through keyword alerts) in order to prevent sensitive data from being exfiltrated. We have used this to prevent DLP on more than one occasion. Review collected by and hosted on G2.com.

JG
Systems Administrator
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
(Original )Information
What do you like best about Proofpoint Insider Threat Management?

The ability to detect threats using CASB Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

I cant think of any issues with using pp ITM Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Being able to detect threats with CASB and remidation. Review collected by and hosted on G2.com.

Verified User in Education Management
AE
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

Proofpoint Insider Threat Management will block user downloading file to USB or upload to cloud. It will protect company's security information. This product is easy integration and have user friendly interface. PPS always provide a excellent technicial support team to solve all issues. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

Proofpoint Insider Threat Management should provide a detail report for all issue immediately Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Proofpoint Insider Threat Management will block user downloading file to USB or upload to cloud. It will protect company's security information. It will save time for IT staff to monitoring any unusual activity. Review collected by and hosted on G2.com.

Verified User in Civil Engineering
AC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

The best part of the ITM solutions is the predectiability of leavers before the two week resignation is sumbitted. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

The difficult part of this solutions is the false poisitives that are likely with unusual behevoir due to role changes and turnover. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

The product has really assisted with tracking leavers at our organization ensuring they do not take sensitvie data with them. Review collected by and hosted on G2.com.

Matthew K.
MK
Cyber Security Analyst
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

Out of the box use cases, easy to use UI, custimization Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

Lack of support for the on prem product. Deployment methods are average Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Insider risk detection and response. Also allows us to have greater investigations with screenshots and user session recording Review collected by and hosted on G2.com.

Verified User in Facilities Services
EF
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

Insider Threat Management (ITM) gives us visibility into the most actively attacked accounts and employees. This allows us to take quick action and apply additional controls to potential targets. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

Like most Proofpoint products, I would like to see a single pane of glass, if possible. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

Our organization wanted insight into which employees were being targeted and/or were potential candidates for data theft and or unintential data loss. With Proofpoint Insider Threat Management, we now have that insight. Review collected by and hosted on G2.com.

Mohd Saif A.
MA
Business Development Representative
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Proofpoint Insider Threat Management?

It prevents the data loss and its detection tool investigates the abnormal activities. Review collected by and hosted on G2.com.

What do you dislike about Proofpoint Insider Threat Management?

Nothing to dislike, just that the employees sometimes may feel uncomfortable or may have restrict from performing general activities. Review collected by and hosted on G2.com.

What problems is Proofpoint Insider Threat Management solving and how is that benefiting you?

It is proving the prevention from dataloss and securing my data from various threats. Review collected by and hosted on G2.com.