"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"The good part is that you don't have to configure it, which is very convenient."
"Microsoft Defender for Office 365 is a stable solution."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"The server appliance is good."
"Very functional and good for detecting malicious traffic."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The most valuable feature is the network security module."
"It's detection of true positives are great, as it's cloud based it's very scalable and stable."
"The solution scales quite well."
"Proofpoint is the main tool for blocking spam because it denies the connection altogether."
"Proofpoint Email Protection's initial installation is straightforward. It took us less than a day to complete the implementation."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"The initial implementation is pretty easy to handle."
"The most valuable features are the business email compromise protection and targeted attack prevention."
"The setup was easy."
"The custom alerts have to improve a lot."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"We need a separate license and we don't know how to get the license that is required."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"Configuration requires going to a lot of places rather than just accessing one tab."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"Technical support could be improved."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"It is very expensive, the price could be better."
"Technical packaging could be improved."
"Integration for reporting needs to be improved, it's too complex."
"The incident reporting on offer needs to be improved. It's lacking right now. It should be on the platform somewhere."
"You only receive one model in Proofpoint Email Protection and the other ones you have to purchase at a high price. There should be more available with the solution and additional models should be less expensive."
"It's scalable, but the devil's in the details — you have to know your email volumes."
"Proofpoint Email Protection's interface is confusing and could be improved."
"We find the cost to be prohibitive."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"They do not have an on-demand scan for the internal viruses and internal users, and they don't have a scan for the exchange server against viruses and spam as Symantec does."
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Proofpoint Email Protection is a machine learning email gateway that catches both known and unknown threats. Through Target Attack Protection, emails will be analyzed and potentially blocked from advanced threats while users gain visibility around these threats. The technology can also classify various types of email and can be deployed both on premises or as a cloud service. In addition, users can tag suspicious emails to help raise user awareness and track down any email quickly.
Proofpoint Email Protection offers Advanced BEC Defense, which can precisely detect and block different types of emails, even if they don’t involve a malicious payload, such as business email compromise (BEC). Email Protection, which is powered by NexusAI, is a sophisticated detection technique developed to stop a variety of kinds of email fraud from affecting compromised accounts. It’s specifically designed to analyze message components, such as the sender’s IP address (including reputation and x-originating IP), the message header, and the message body. Using machine learning and AI, it will then determine if that message is a BEC threat.
Benefits of Proofpoint Email Protection
Proofpoint Email Protection is a favorite for organizations looking to utilize their cybersecurity budget accurately, and provides the user with incredible visibility. While preventing email fraud, the technology can also detect and block advanced malware as well as identifying possible risks.
Email Protection offers many benefits, including:
Reviews from Real Users
Proofpoint Email Protection enables business continuity capabilities through their machine learning, AI-powered email gateway. With its innovative approach toward detecting, analyzing, identifying, and blocking advanced threats, users can gain unique visibility into their business data environments. Users especially like the ability to block spam, as well as the business email compromise protection.
An anonymous reviewer who is a principal consultant at a tech company, notes, "Proofpoint is the main tool for blocking spam because it denies the connection altogether."
Sridhar R., a security professional at Qatar Computer Services WLL, writes, "The most valuable features are the business email compromise protection and targeted attack prevention."
FireEye Network Security is ranked 7th in ATP (Advanced Threat Protection) with 6 reviews while Proofpoint Email Protection is ranked 1st in Email Security with 16 reviews. FireEye Network Security is rated 8.8, while Proofpoint Email Protection is rated 8.6. The top reviewer of FireEye Network Security writes "A reliable and complete network protection solution that protects from signature-based and signature-less attacks and has powerful logging". On the other hand, the top reviewer of Proofpoint Email Protection writes "Flexible, very secure, and offers excellent technical support". FireEye Network Security is most compared with Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiSandbox, Cisco Stealthwatch and Cisco ASA Firewall, whereas Proofpoint Email Protection is most compared with Palo Alto Networks WildFire, Microsoft Exchange Online Protection, Cisco Secure Email, Fortinet FortiMail and IRONSCALES.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.