Try our new research platform with insights from 80,000+ expert users

Cymulate vs Proofpoint Email Protection comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cymulate
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
6
Ranking in other categories
Threat Intelligence Platforms (TIP) (9th), Breach and Attack Simulation (BAS) (2nd), Attack Surface Management (ASM) (9th), Continuous Threat Exposure Management (CTEM) (2nd)
Proofpoint Email Protection
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Email Security (2nd), Advanced Threat Protection (ATP) (4th), Digital Risk Protection (3rd), Office 365 Protection (1st), Secure Email Gateway (SEG) (2nd)
 

Featured Reviews

SB
Security Architec at Shikun & Binui
Support and integration enhance security posture over three years
I don't know if there's something that could be improved. They surprise me. As I mentioned, I returned a month ago. I haven't fully investigated the complete system yet. I must say that we have been with them for around three years. This is amazing because throughout these three years, they have supported us every week. We meet weekly to review results and fix issues together. Apart from occasional days off, this weekly support has been consistent for three years. It's remarkable because many products are sold and then the product teams forget about you, but this isn't the case with Cymulate.
IS
Threat Hunter at a manufacturing company with 10,001+ employees
Email protection has reduced phishing workload and keeps unwanted messages out of inboxes
A few things about how Proofpoint Email Protection can be improved include implementing artificial intelligence within their platform to start really understanding the organization that is using their product, what sort of emails they are expecting and if the emails that are being expected should be let in and if the emails that are not being expected should not be let in. I'll give you a further example for this. If someone just tries to send an email from a Gmail address, which is a free public service email service provider, then because anyone in the world can create a Gmail account, I think it is nice and good for Proofpoint Email Protection to actually first check and do a reality check if we have received an email from this address and look at the intent of the email to really see what the email is trying to do and then classify based on that. I still see there is a lack. Hence why I started this conversation with AI and hoping that Proofpoint Email Protection will bring AI in and to really start analyzing these emails, the intent, and whether they really fit the customer organization. We are a manufacturing company, so whether it really fits that profile. I would say if we can get a better user experience from Proofpoint Email Protection products, that would be good. For example, other service providers that provide secure email gateway have the functionality where you can split promotional and bulk email and have them sent to a separate folder. I think if we can have that sort of feature, that would be great where Proofpoint Email Protection just keeps the important emails in the inbox folder and move everything else that is not really business related into a promotional, spam, bulk folder. This is an improvement that I would really like to see. I give it an eight because I am expecting a lot more from Proofpoint Email Protection, more automations, more understanding of who their customer is, what sort of business they do, and what sort of email they are supposed to be receiving and letting through. I think the day when I really have only 1% of work to do and 99% is automated by whatever automation services Proofpoint Email Protection uses would be ideal. I think I have covered any other improvements needed for Proofpoint Email Protection pretty well right from AI to splitting emails based on priorities. I think I have given some pretty broad and good examples.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reporting capabilities are very good."
"The most valuable feature for us is the zero-day."
"The security validation feature helps my organization in assessing our security posture."
"With Cymulate, the best features are the capacity to test the EDR or malware, anti-malware solution."
"Cymulate has positively impacted our organization by helping us to take care of the efficacy and reviewing the policies and configuration."
"Cymulate is easy to set up, install, and configure."
"The power, flexibility, configurability, and Proofpoint Email Protection's professional services were some of the biggest selling points for me at the time and the things that I benefited from the most."
"Compared to other products, Proofpoint's real-time threat intelligence makes it less noisy; they collect and share threat information effectively, which benefits all customers."
"It is a very scalable solution."
"That is why I can consider Proofpoint Email Protection as a number one vendor for email security."
"Proofpoint Email Protection is stable enough and does its job of virus, malware, and email scam detection. Setting it up is not too complicated."
"The solution has very strong detection for most of the phishing and malicious emails received from the outside."
"The Tap and Trap features. They are the best features."
"The stability is very good."
 

Cons

"We have had some trouble with the agents."
"The reporting process requires significant improvement as it often takes longer than expected and the quality is lacking."
"I will be honest, we have it, but in the last year, I didn't maintain the system until a month ago."
"The product must provide consultancy for initial setup."
"The way Cymulate works for EDR could be improved, as it drops payload and requires action from the EDR console for remediation, which can block the whole process of Cymulate execution."
"The cost can be quite high, and it impacts scalability as more simulations require additional expenses."
"One major threat is QR code phishing, along with TOAD (Telephone-Oriented Attack Delivery). TOAD attacks don't include links, URLs, or attachments in emails. Instead, attackers try to trick you into calling them, often by offering something enticing like a 50% discount on football matches."
"The high cost of the product is an area of concern where improvements are required."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"The solution could lower its price."
"Proofpoint Email Protection's interface is confusing and could be improved."
"Proofpoint Email Protection could improve by allowing more customization of the reports, such as exceptions and black-and-white lists."
"I would want better spear phishing protection in the essentials package."
"It became very expensive due to the nature of local circumstances, and I may advise Proofpoint to adjust marketing solutions based on each country."
 

Pricing and Cost Advice

"Cymulate's services are expensive."
"The product is affordable."
"The solution charges per user per month to use it. There are not any additional fees in addition to the standard living fees."
"The solution uses a licensing model that is reasonable compared to other products."
"It is expensive."
"Proofpoint Email Protection has comparable pricing."
"The licensing model for Proofpoint Email Protection is simple. It's based on the number of users. Price-wise, Proofpoint Email Protection is a five out of ten because it's a pretty expensive solution."
"Proofpoint is fairly expensive."
"I rate the price of Proofpoint Email Protection a four out of five."
"The price is reasonable."
report
Use our free recommendation engine to learn which Digital Risk Protection solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Manufacturing Company
9%
Comms Service Provider
6%
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Large Enterprise3
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise16
Large Enterprise21
 

Questions from the Community

What do you like most about Cymulate?
The most valuable feature for us is the zero-day.
What is your experience regarding pricing and costs for Cymulate?
I don't know if it's expensive. It depends on the modules that you want, or the time, because they give you a tenant. A tenant for you.
What needs improvement with Cymulate?
I don't know if that helped with quick decision making for my security team because I am the security team and you must have a dedicated team to work with this tool. I don't use the analytics modul...
What is your experience regarding pricing and costs for Proofpoint Email Protection?
In terms of pricing, it is okay compared to others. I would say it is normal. Additional costs do come in, but it enhances security.
What needs improvement with Proofpoint Email Protection?
I have not seen specific outcomes or metrics since implementing Proofpoint Email Protection, such as a reduction in phishing incidents or improved response time. Proofpoint Email Protection can imp...
 

Also Known As

No data available
Proofpoint Enterprise Protection, Proofpoint Digital Protection
 

Overview

 

Sample Customers

Euronext, YMCA, Telit, Nemours 
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
Find out what your peers are saying about Cymulate vs. Proofpoint Email Protection and other solutions. Updated: December 2025.
881,733 professionals have used our research since 2012.