Try our new research platform with insights from 80,000+ expert users

Cofense Platform vs Proofpoint Threat Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 11, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cofense Platform
Ranking in Security Incident Response
12th
Average Rating
0.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Email Security (52nd), Threat Intelligence Platforms (TIP) (53rd), Security Awareness Training (43rd)
Proofpoint Threat Response
Ranking in Security Incident Response
2nd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2025, in the Security Incident Response category, the mindshare of Cofense Platform is 2.4%, down from 5.4% compared to the previous year. The mindshare of Proofpoint Threat Response is 10.4%, down from 13.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Incident Response Market Share Distribution
ProductMarket Share (%)
Proofpoint Threat Response10.4%
Cofense Platform2.4%
Other87.2%
Security Incident Response
 

Featured Reviews

MohamedShaker - PeerSpot reviewer
Sales Team Leader at ITVikings
Secures the business for customers quickly and accurately
It secures the business for the customers. For instance, if any phishing emails come into the environment and employees see it, we direct the email to Triage. The Triage system will investigate it through AI technology to see if it's a phishing email or not. If it is a phishing email, it will quarantine it and erase it from the environment.
reviewer2460363 - PeerSpot reviewer
Chief Engineer at a healthcare company with 10,001+ employees
Automatically remove threats from mailboxes once identified, reducing manual intervention but on-premise version doesn't scale well for large companies
Auto pull and auto restore are valuable features. Auto restore isn't quite what it should be, but it's a lot better than someone having to manually release mail back to everyone. If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules. Anytime Advanced Threat Protection finds something that was allowed to go through, either a URL or attachment, it will send out a signal, and Threat Response will automatically pull all of that out of the mail files. The automation is the big thing for us. Integration capabilities: There's an API, but most of it is around how you handle incidents. We're also not using the whole Threat Response suite, just the subset. So, we've never had to or could integrate anything else. We're limited to the Exchange portion only. The whole Threat Response should be labeled as a SOAR tool. The portion we have, I would call it "SOAR-lite." I know there are a couple of others that offer a SOAR-lite, but we're just starting to look at them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"For instance, if any phishing emails come into the environment and employees see it, we direct the email to Triage. The Triage system will investigate it through AI technology to see if it's a phishing email or not. If it is a phishing email, it will quarantine it and erase it from the environment."
"It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so."
"The platform's most valuable include the ability to check emails and block potential spam."
"If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules."
"Support is very responsive."
"The best part of Proofpoint Threat Response is the Auto-Pull feature. Being able to pull an email back from a user's mailbox is very useful, yet I have noticed that not a lot of organizations use this kind of feature."
 

Cons

"If they continue improving and enhancing this solution, it could be even faster and more accurate."
"The on-premise version doesn't scale well for large companies."
"Has some quirks."
"The interface within Threat Response could be made simpler."
"The platform's technical support services and pricing need improvement."
"If the reporting gets improved then it would be better, but the product is running amazing as it is."
 

Pricing and Cost Advice

Information not available
"It's quite affordable to have it with this much functionality and ease to administrate."
"The way most big companies work with Proofpoint is that they try to tie everything into an enterprise license. I can't comment on the actual costs, however I do know that alternative solutions such as Abnormal Security can be much more expensive than Proofpoint Threat Response."
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
879,310 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
13%
Financial Services Firm
10%
Insurance Company
9%
Healthcare Company
13%
Manufacturing Company
13%
Financial Services Firm
13%
Energy/Utilities Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Proofpoint Threat Response?
I have a vague idea because I don't know what others are charging. But we felt that putting up with the pains and having to spend more time keeping it running than we expected is still better than ...
What needs improvement with Proofpoint Threat Response?
The platform's technical support services and pricing need improvement.
What is your primary use case for Proofpoint Threat Response?
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails.
 

Also Known As

Cofense Intelligence, PhishMe Intelligence, Intelligence ThreatHQ, Cofense Triage, Cofense LMS
No data available
 

Overview

 

Sample Customers

Jackson Health System
University of Waterloo, Akorn, Fenwick and West LLP
Find out what your peers are saying about ServiceNow, Proofpoint, Trellix and others in Security Incident Response. Updated: December 2025.
879,310 professionals have used our research since 2012.