Product Avatar Image

Proofpoint

Show rating breakdown
1,318 reviews
  • 37 profiles
  • 34 categories
Average star rating
4.5
#1 in 11 categories
Grid® leader
Serving customers since
2002

Featured Products

Product Avatar Image
Proofpoint Insider Threat Management

48 reviews

Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.

Profile Filters

All Products & Services

Product Avatar Image
Proofpoint Social Media Compliance

4 reviews

Protecting your social infrastructure and ensuring compliance is critical to maximizing your social media investment

Product Avatar Image
Proofpoint Premium Threat Information Service

4 reviews

Proofpoint Premium Threat Information Service provides deeper understanding of the ongoing threat landscape and your organization's place in it, enabling you.

Product Avatar Image
Proofpoint Domain Discover For Email

3 reviews

Proofpoint Domain Discover for Email gives you the actionable intelligence to preemptively stop impostor emails before they reach your inbox.

Product Avatar Image
Proofpoint Email Data Loss Prevention (DLP)

3 reviews

Proofpoint Email DLP simplifies data loss prevention by giving you complete visibility and control of email leaving your enterprise.

Product Avatar Image
Proofpoint Archiving and Compliance

2 reviews

Proofpoint is a complete, end-to-end solution to manage information risk.

Product Avatar Image
Proofpoint Emerging Threats Intelligence

2 reviews

ET Intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after.

Product Avatar Image
Proofpoint Supervision

2 reviews

Proofpoint Intelligent Supervision helps streamline compliance. Its fully integrated with Enterprise Archive for easy capture, review and reporting

Product Avatar Image
Nexgate

1 review

Nexgate is a cloud-based service designed to help organizations discover, audit, and protect their presence and accounts across various social media platforms. By integrating seamlessly with leading social networks, Nexgate enables enterprises to manage social media risks effectively, ensuring brand protection and regulatory compliance. Its suite of tools addresses challenges such as account sprawl, unauthorized access, inappropriate content, and adherence to industry regulations. Key Features and Functionality: - Social Account Discovery: Automatically identifies and tracks all brand-affiliated social media accounts, including unauthorized or fraudulent ones. - Security and Compliance Monitoring: Utilizes over 100 pre-built data classifiers to detect and remediate security threats, compliance violations, and unacceptable content across social channels. - Automated Incident Remediation: Provides tools for logging, notifying, and deleting inappropriate content, along with advanced compliance workflows and intelligent archiving for eDiscovery support. - Account Protection: Monitors social accounts for unauthorized changes and anomalous behavior, offering mechanisms to lock down accounts in case of hacks or vandalism. - Unified Reporting and Analytics: Offers consolidated risk and incident reporting, enabling organizations to assess and improve their social media security posture. Primary Value and User Solutions: Nexgate addresses the critical need for enterprises to secure their social media infrastructure against evolving threats. By automating the detection and remediation of risks, it reduces the manual effort required to monitor and manage social media accounts. This ensures that organizations can maintain a trustworthy online presence, comply with regulatory requirements, and protect their brand reputation from potential damage caused by security breaches or compliance failures.

Product Avatar Image
Proofpoint Cloud Account Defense

1 review

With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.

Profile Name

Star Rating

947
314
40
6
11

Proofpoint Reviews

Review Filters
Profile Name
Star Rating
947
314
40
6
11
TC
Tanis C.
03/31/2026
Validated Reviewer
Review source: Organic

Time-Saving Email Defense with Intuitive Visibility

I love how Proofpoint Email Fraud Defense provides an easy method to manage our sending domains and senders. The ease of use and visibility of all our entities are great. As a small team, it saves us valuable time, allowing us to focus on other things and manage all of our other platforms. The initial setup was quite easy and quick.
Harsh K.
HK
Harsh K.
03/18/2026
Validated Reviewer
Review source: Organic

Smart AI DLP with Clear Risk Visibility and Minimal False Alarms

I love how Proofpoint Enterprise DLP uses smart AI to focus on people and their behaviors, protecting data across email, cloud apps, and endpoints. It gives us clear visibility into risks with very few false alarms, keeping everything secure without bogging down our team.
CM
Casey M.
03/13/2026
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile

Quick Alerts and Clear, Detailed Summaries for Suspicious Emails

It gives a quick email to our team of any suspicious emails and leaves us a easy to read summary and plenty of information about the incident. I like the amount of information it provides.

About

Contact

HQ Location:
Sunnyvale, CA

Social

@proofpoint

What is Proofpoint?

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Details

Year Founded
2002
Ownership
NASDAQ: PFPT