No more typing reviews! Try our Samantha, our new voice AI agent.

Share your experience using Vade for M365

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 105,000+ reviews on PeerSpot:

Cybersecurity Engineer at Cognizant
Real User
Apr 19, 2026
Email protection has reduced phishing incidents by 90% and provides safe URL investigation
Pros and Cons
  • "Since I started using Proofpoint Email Protection, I have blocked numerous phishing emails, and while I cannot remember the exact numbers, it is more than 200 or 300."

    What is our primary use case?

    My main use case for Proofpoint Email Protection is analyzing incidents when users in the company report suspicious emails and determining the appropriate next action.

    I use Proofpoint Email Protection in situations involving spam emails or real phishing emails, which allows me to categorize and quarantine those emails from the user's inbox so that the user cannot receive the same type of email or any emails from the same sender in the future.

    What is most valuable?

    Proofpoint Email Protection provides features including URL Defense, forensics, and access to detailed information in emails, including the email body, and I can view the URLs by opening them in the isolation browser.

    The isolation browser feature helps in my daily work by allowing me to open suspicious URLs from phishing emails safely, protecting our devices from any suspicious activity linked to those URLs.

    For reporting in Proofpoint Email Protection, there is a report phish button in every email, so if users receive any suspicious emails, they can click on that and it will directly send an alert to Proofpoint, and I will receive that incident immediately after.

    Proofpoint Email Protection has positively impacted our organization by protecting us from many phishing and suspicious emails.

    What needs improvement?

    I do not think there is anything to improve in Proofpoint Email Protection as it has a very user-friendly UI and no improvements are needed at this time.

    For how long have I used the solution?

    I have been working in this field for two years, and I have been using Proofpoint Email Protection for two years.

    What do I think about the stability of the solution?

    Proofpoint Email Protection is stable.

    What do I think about the scalability of the solution?

    Proofpoint Email Protection has better scalability.

    How are customer service and support?

    The customer support for Proofpoint Email Protection is quick and very helpful.

    What other advice do I have?

    Once, a user received an email stating they had received a bonus with a request to click on a link to know the bonus amount, and after that user reported that email, I received an incident for the same matter. When I accessed Proofpoint Email Protection, I could see the URL given to the user in the email and the full email body along with all other details.

    Since I started using Proofpoint Email Protection, I have blocked numerous phishing emails, and while I cannot remember the exact numbers, it is more than 200 or 300. I have observed a 90% reduction in incidents after using Proofpoint Email Protection.

    I would rate Proofpoint Email Protection 10 out of 10 because I have been using it for two years and have worked extensively with it to understand how Proofpoint Email Protection operates. It provides all the details and information needed during investigations or any phishing attempts.

    If you are working in any SOC analysis, my advice is that it is very necessary to use Proofpoint Email Protection as your email protection tool, and it is greatly beneficial to learn how it works in the cybersecurity field.

    I rate Proofpoint Email Protection 10 out of 10 overall.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Apr 19, 2026
    Flag as inappropriate
    reviewer2817279 - PeerSpot reviewer
    Analyst at a tech vendor with 10,001+ employees
    Real User
    Apr 19, 2026
    Email security has strengthened and protects users from phishing, spoofing, and malicious content
    Pros and Cons
    • "Proofpoint Email Protection is a strong and reliable solution for defending against advanced email threats, especially phishing and targeted attacks."

      What is our primary use case?

      In our organization, we use Proofpoint Email Protection as an email gateway that tracks all external emails coming to our organization. In this way, we are protecting our organization from cyberattacks and all suspicious emails coming from external senders.

      We have had situations where we monitored logs in which suspicious emails came from spoofed senders. For example, an email appeared to be from axis.com, but it was a spoofed email. When it came into our organization, it was initially quarantined at Proofpoint Email Protection gateway, so the user did not receive it. When we checked the log, we found the actual case. We identified the spoofed sender and blocked it in Proofpoint Email Protection console. Once we blocked it in the console, that sender and domain will never get past Proofpoint Email Protection gateway.

      In day-to-day operations, we mainly use Proofpoint Email Protection to protect our organization from external senders. We developed a ZAP policy, a spam detection policy, and several other policies in Proofpoint Email Protection gateway. By using these policies, we are running the business very smoothly and maintaining and providing very safe email communication to our clients. We received considerable appreciation from Proofpoint team for this.

      How has it helped my organization?

      Proofpoint Email Protection has significantly strengthened our organization's email security posture by detecting and preventing advanced threats before they reach users.

      What is most valuable?

      Proofpoint Email Protection identifies and triggers on all emails. Even when there is a false positive case, when an external sender tries to send an email to our organization, Proofpoint Email Protection detects if it is suspicious, such as when there are bulk attachments or the email is sent to bulk recipients. Proofpoint Email Protection has helped us significantly by detecting those bulk attachment emails and quarantining them in Proofpoint Email Protection console as spam. By our client's request, when we investigate why Proofpoint Email Protection quarantined it, based on the client's requirement and their business justification, we have adjusted the spam score for that external sender. Because of that adjustment, the user received the email. Spam emails are very crucial regarding data leaks in day-to-day operations, and Proofpoint Email Protection helps us detect those spam details, which has helped us very much.

      We appreciate the external warning tag feature. When an external sender sends emails to our organization, Proofpoint Email Protection adds an external sender tag that states "Be cautious, this email was received from an external sender." This tag suggests to our recipients that they should open attachments after careful observation. It has helped our clients very much. We also appreciate the policy configuration feature, which provides numerous customization options.

      Proofpoint Email Protection protects employees from phishing, spoofing, malware, and harmful URLs all before they reach the inbox. The platform combines intelligence, automation, and ease of use, giving businesses confidence that their communication channels remain secure without slowing down operations. Proofpoint Email Protection delivers consistent accuracy while maintaining smooth business email flow. The URL Defense and Attachment Defense features provide advanced protection by analyzing and blocking harmful content in real-time. The dashboard and detailed message tracking with smart search options empower security teams with quick insights, faster investigations, and better decision-making.

      We majorly detect phishing incidents when a suspicious sender sends emails to our recipients.

      What needs improvement?

      We did not notice much room for improvement. Everything was organized and fixed smoothly. We have not detected any objections or defaults in Proofpoint Email Protection. The solution has been helping us significantly.

      Regarding features, when Proofpoint Email Protection gateway blocks false positive senders as spam due to confidence level, and when it is a false positive with a request from the user to release it from quarantine, we have to adjust the spam score for that sender to avoid this blocking and quarantining in the future. To adjust the spam score for such cases, we have to reach out to Proofpoint Email Protection community team. If spam score adjustment were available in Proofpoint Email Protection console itself, it would be helpful for us to adjust the spam score from our admin side to make business processes faster. We are requesting Proofpoint Email Protection support team to provide this capability, as the current process requires extra time. This is our only concern and not a request for improvement, as this control was introduced for our security reasons. We are providing this feedback as an update.

      What do I think about the stability of the solution?

      Operations are going smoother without any conflicts after updates in Proofpoint Email Protection console. Everything has been going well for us. We did not notice any issues in the logging section either.

      Proofpoint Email Protection is a stable and reliable solution. From an operational standpoint, we observed consistent email flow with minimal disruptions, and the platform handled high email volumes efficiently. We saw very few unplanned outages or performance issues. The features including message tracking, quarantine management, and threat dashboards work consistently, which is critical for daily security operations. Overall, Proofpoint Email Protection is a stable platform suitable for enterprise-level email security.

      What do I think about the scalability of the solution?

      Proofpoint Email Protection is highly scalable. We can handle larger email flow without significant issues. The platform handles large email volumes, supports multiple domains, and expands easily without major infrastructure changes. Since it is cloud-based, scaling is mostly configuration-driven rather than hardware-dependent.

      How are customer service and support?

      We mainly use support for spam detection and when there is a reason why emails got quarantined. In those cases, customer support offered us very good assistance. Proofpoint Email Protection support is reliable with good response times for critical issues and strong technical assistance. We are satisfied with the customer support.

      Which solution did I use previously and why did I switch?

      Previously, we used Microsoft 365 services and Office 365. The primary reason for switching to Proofpoint Email Protection was the need for more advanced threat protection. While Microsoft's native tools provide a solid baseline, we found that Proofpoint Email Protection offered stronger targeted attack protection, especially for personalization and phishing, better URL Defense with time-of-click protection, more detailed threat intelligence, and visibility into attack campaigns. We previously used Microsoft Defender for Office 365.

      We chose Proofpoint Email Protection only after transitioning from Office 365.

      How was the initial setup?

      In my role, I was not directly involved in pricing or commercial negotiations, but I have some visibility from an operational perspective. The initial configuration requires careful planning, especially around email routing, policy tuning for spam, phishing, and DLP, user onboarding, and integration with Microsoft 365. Overall, while the cost may be higher, the value comes from strong threat detection, reduced risk, and centralized management.

      What other advice do I have?

      I have worked with Unified Admin Console and Threat Protection Workbench primarily in managing email security operations, especially in a Proofpoint Email Protection and Microsoft 365 environment. From my experience, the unified console is quite effective because it centralizes visibility across different security layers including email threats, user activity, and policy management. This makes it easier to investigate incidents without switching between multiple tools. Threat Protection Workbench is particularly useful for analyzing phishing or malware campaigns. The interface is generally user-friendly once you are familiar with it. However, initially, it can feel quite complex due to the amount of data and filtering options available. Sometimes fine-tuning searches or correlating events across multiple alerts can take extra time. Overall, it is a powerful tool for proactive threat hunting and incident response, and with experience, it becomes much more efficient to use.

      I have worked on security controls for cloud apps and file-sharing services, mainly with Microsoft 365 and email security environments. I have implemented and monitored policies around safe sharing and access controls, such as restricting external sharing and malware and phishing protection for files and links. This includes URL and attachment scanning for files shared via email or collaboration tools. In terms of impact, it significantly improved our security posture. We were able to reduce data leakage risk through controlled sharing and detect and block malicious files before they reach users, and respond faster to incidents using centralized monitoring.

      My advice would be to approach Proofpoint Email Protection implementation with proper planning and clear security objectives, especially regarding policies for phishing, spam, and DLP. Proper tuning at the start reduces false positives later. It is important to continuously monitor and fine-tune policies based on evolving threats and user behavior. Overall, Proofpoint Email Protection is a strong solution, but its effectiveness depends on how well it is configured and managed by the organization.

      As a business relationship, our organization's relationship with Proofpoint Email Protection is purely as a customer. We use the platform for email security operations, but we are not a partner. My involvement has been on the operational side, monitoring, managing policies, and handling incidents rather than vendor relationships. We are only a customer.

      Proofpoint Email Protection is a strong and reliable solution for defending against advanced email threats, especially phishing and targeted attacks. The strengths of Proofpoint Email Protection include advanced threat detection capabilities, strong visibility into email-based attacks, and effective tools for investigation and response. An important point is that its effectiveness depends on proper configuration and continuous tuning, along with user awareness. When implemented and managed well, it significantly strengthens an organization's email security posture. I have given this solution an overall rating of nine out of ten.

      Which deployment model are you using for this solution?

      Hybrid Cloud

      If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

      Other
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      Last updated: Apr 19, 2026
      Flag as inappropriate