Principais Alternativas de Proofpoint Threat Response Mais Bem Avaliadas
Avaliações 16 Proofpoint Threat Response

A coisa mais útil é a visibilidade e a proteção avançada contra malware. Ele oferece o rastreamento completo de e-mails em comparação com outros controles de segurança de e-mail da Cisco. Análise coletada por e hospedada no G2.com.
À medida que leio sobre este controle, é um produto baseado em nuvem, pode ser mais benéfico se estiver disponível como PAAS. Análise coletada por e hospedada no G2.com.
With this system in a smaller business it gives the reassurance of knowing your systems are secure. Multiple systems are protected from threats and controlled by one interface. Análise coletada por e hospedada no G2.com.
It did take a decent amount of time to adjust settings to the correct level of protection. Análise coletada por e hospedada no G2.com.
Proofpoint integrates with alot of security solutions, which is always a good thing. Análise coletada por e hospedada no G2.com.
Lack of responsiveness from there support team. seems they might be understaffed as it takes a few days for them to respond to issues submitted. Análise coletada por e hospedada no G2.com.
to choose just one thing is not very easy. The fact that the database which is used to prevent malware and phishing emails is amazing. The auto pull of emails into the quarantine folder helps us when time is at a crunch. Also if an email is pulled and it was not considered malicious we have the means to un-quarantine the messages. The logs are readily available for any trouble shooting you may need Análise coletada por e hospedada no G2.com.
There are times when some emails go through which should never have been processed. Also there are times when malicious url's are not rewritten causing issues with email accounts being compromised. Análise coletada por e hospedada no G2.com.
Consistent threat detection on large networks with multiple device types connected at any given time Análise coletada por e hospedada no G2.com.
Finding appropriate trigger thresholds can take some time Análise coletada por e hospedada no G2.com.