Product Avatar Image

Proofpoint

Show rating breakdown
1,319 reviews
  • 37 profiles
  • 34 categories
Average star rating
4.5
#1 in 11 categories
Grid® leader
Serving customers since
2002

Featured Products

Product Avatar Image
Proofpoint Insider Threat Management

48 reviews

Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.

Profile Filters

All Products & Services

Product Avatar Image
Proofpoint Web Domain Fraud Monitoring

1 review

Our Digital Discover solutions protect your brand and the people who trust it from suspicious and infringing social accounts, mobile apps, and domains.

Product Avatar Image
Proofpoint Mobile Security Solutions

1 review

Identify and block apps known to be malicious and those with risky behaviors that may lead to spear-phishing attacks and expose sensitive data

Product Avatar Image
Proofpoint Discover

1 review

Proofpoints e-discovery and Analytics capabilities provide greater insight for your litigation readiness strategy. That means more control with less cost and risk.

Product Avatar Image
Proofpoint Social Discover

1 review

Proofpoint Social Discover is a cloud-based solution designed to help organizations identify and monitor social media accounts associated with their brand. By scanning leading social networks, it detects both authorized and unauthorized accounts, enabling businesses to manage their social media presence effectively and mitigate potential risks. Key Features and Functionality: - Comprehensive Scanning: Automatically scans platforms like Facebook, Twitter, Google+, LinkedIn, and others to discover all brand-related accounts, including fraudulent ones. - Risk Assessment: Analyzes and prioritizes discovered accounts to identify those posing the highest risk, allowing for prompt action. - Automated Monitoring: Continuously monitors for new accounts using the brand's name or assets, providing real-time alerts when unauthorized accounts are created. - Categorization and Management: Offers tools to categorize accounts using preset or customized tags, facilitating efficient management of the brand's social media footprint. Primary Value and Problem Solved: Proofpoint Social Discover addresses the challenge of managing and securing a brand's presence across multiple social media platforms. By identifying unauthorized or fraudulent accounts, it helps prevent potential threats such as brand impersonation, phishing attacks, and the spread of malicious content. This proactive approach safeguards the organization's reputation, ensures compliance with security policies, and enhances overall social media governance.

Product Avatar Image
Proofpoint Meta

1 review

Proofpoint Meta providez the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Product Avatar Image
Proofpoint Web Security

1 review

Proofpoint Web Security services protect against advanced threats as your users browse the web. It provides you with advanced security on a highly scalable cloud-based architecture. And it delivers threat protection and access control that’s easier to manage and deploy than legacy solutions.

Product Avatar Image
Proofpoint Data Discover

0 reviews

Proofpoint Data Discover simplifies and automates PCI, PII and PHI discovery

Product Avatar Image
Proofpoint DSPM

0 reviews

Proofpoint Data Security Posture Management (DSPM) is a comprehensive solution designed to help organizations discover, classify, and protect sensitive data across cloud and hybrid environments. By leveraging advanced AI-powered, agentless scanning, it identifies valuable data in place, ensuring compliance and operational efficiency. Key Features and Functionality: - Cloud-Scale Data Discovery and Classification: Utilizes patented in-place scanning technology to accurately identify and classify sensitive data across SaaS, PaaS, IaaS, on-premises, and hybrid environments without moving the data. - Risk Prioritization and Real-Time Mitigation: Assigns monetary value to data, visualizes attack paths, and detects misconfigurations or anomalies, enabling security teams to focus on protecting critical data and reducing human-centric risks. - Integration with Data Security Tools: Enhances existing data security tools by providing detailed insights into data sensitivity, access patterns, and risk exposure, integrating seamlessly with solutions like Proofpoint DLP and Microsoft Information Protection. - Data Access Governance: Offers real-time visibility into access controls, identifying over-permissioned or dormant accounts, and enforces least-privilege principles to support a Zero Trust security model. - Continuous Compliance Monitoring and Data Hygiene: Automates compliance mapping for over 500 frameworks, tags violations, generates real-time reports, and identifies forgotten or duplicate data to reduce storage costs and enhance data protection. Primary Value and Problem Solved: Proofpoint DSPM addresses the challenges organizations face in managing data visibility, access, and compliance in increasingly complex environments. By providing comprehensive data discovery, classification, and protection, it enables security teams to proactively manage and remediate vulnerabilities, reduce the risk of data breaches, and ensure that data security practices align with internal policies and external standards. This solution empowers organizations to safeguard their most critical assets, maintain compliance, and enhance business agility.

Product Avatar Image
Proofpoint Isolation

0 reviews

Proofpoint Isolation is web isolation built with simplicity, based on intelligence from Targeted Attack Protection (TAP) Isolation. It helps lower your attack surface and provides complete browser security. Isolation integrates with TAP to provide you with adaptive controls that allow corporate email to isolate URL clicks based on the risk profile of user or URL being clicked

Profile Name

Star Rating

947
315
40
6
11

Proofpoint Reviews

Review Filters
Profile Name
Star Rating
947
315
40
6
11
RH
Robert H.
04/07/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Simple Help Desk Admin and Helpful Digests

It is simple to administer from a help desk perspective. The quarantine digests are helpful for end users to catch false positives.
TC
Tanis C.
03/31/2026
Validated Reviewer
Review source: Organic

Time-Saving Email Defense with Intuitive Visibility

I love how Proofpoint Email Fraud Defense provides an easy method to manage our sending domains and senders. The ease of use and visibility of all our entities are great. As a small team, it saves us valuable time, allowing us to focus on other things and manage all of our other platforms. The initial setup was quite easy and quick.
Harsh K.
HK
Harsh K.
03/18/2026
Validated Reviewer
Review source: Organic

Smart AI DLP with Clear Risk Visibility and Minimal False Alarms

I love how Proofpoint Enterprise DLP uses smart AI to focus on people and their behaviors, protecting data across email, cloud apps, and endpoints. It gives us clear visibility into risks with very few false alarms, keeping everything secure without bogging down our team.

About

Contact

HQ Location:
Sunnyvale, CA

Social

@proofpoint

What is Proofpoint?

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Details

Year Founded
2002
Ownership
NASDAQ: PFPT