Proofpoint Targeted Attack Protection vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Proofpoint Targeted Attack Protection and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in ATP (Advanced Threat Protection).
To learn more, read our detailed ATP (Advanced Threat Protection) Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has a dynamic runtime engine, which gives it an advantage over Prisma that has a static engine. In Prisma, we have to do additional malware analysis, which is not required in Proofpoint."

More Proofpoint Targeted Attack Protection Pros →

"FireEye Email Security is easy to use.""What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use.""The initial setup is simple.""The auto-remediation feature is valuable.""We can control this solution from the cloud and are able to access it from wherever we are.""We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration.""The product protects my email.""The product helps reduce the number of malicious emails reaching the user's inbox."

More Trellix Collaboration Security Pros →

Cons
"We are using the TRAP console that has a Linux-based UI, which is not user-friendly. The TAP console looks very advanced. Currently, we are maintaining three different consoles, and it is sometimes hard to switch between them or try to grab the data."

More Proofpoint Targeted Attack Protection Cons →

"If they want to be the primary or best solution, they need to have better email management features.""The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier.""The custom tailoring is limited.""The solution must provide features to scan QR codes for threats.""FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed.""The spam detection feature could be better.""Sometimes especially zero-day spam emails can be passed to the user's inbox."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
Information Not Available
  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ATP (Advanced Threat Protection) solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
    Top Answer:In the next release, I'd like to see them provide more integration features.
    Top Answer:Our primary use case for this solution is as a layer of advanced security for emails. FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
    Ranking
    Views
    871
    Comparisons
    640
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    17th
    out of 107 in Email Security
    Views
    2,389
    Comparisons
    1,979
    Reviews
    3
    Average Words per Review
    350
    Rating
    8.7
    Comparisons
    Also Known As
    Targeted Attack Protection
    FireEye Email Security
    Learn More
    Trellix
    Video Not Available
    Overview

    More than 90% of targeted attacks start with email—and these threats are always evolving. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs. And zero-day threats, polymorphic malware, weaponized documents and phishing attacks. TAP provides adaptive controls to isolate the riskiest URL clicks. TAP also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Brinker Capital
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company11%
    Manufacturing Company8%
    Insurance Company6%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company13%
    Government8%
    Manufacturing Company8%
    Company Size
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise8%
    Large Enterprise74%
    REVIEWERS
    Small Business42%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    ATP (Advanced Threat Protection)
    March 2024
    Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in ATP (Advanced Threat Protection). Updated: March 2024.
    765,386 professionals have used our research since 2012.

    Proofpoint Targeted Attack Protection is ranked 23rd in ATP (Advanced Threat Protection) while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. Proofpoint Targeted Attack Protection is rated 7.0, while Trellix Collaboration Security is rated 8.6. The top reviewer of Proofpoint Targeted Attack Protection writes "Dynamic runtime engine and good protection, but needs better support and a single console". On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". Proofpoint Targeted Attack Protection is most compared with Microsoft Defender for Office 365, Avanan, IRONSCALES, Palo Alto Networks WildFire and VMRay, whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Defender for Office 365 and Microsoft Exchange Online Protection (EOP).

    We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.