Try our new research platform with insights from 80,000+ expert users

NetWitness Platform vs Proofpoint Email Protection comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

NetWitness Platform
Average Rating
7.4
Reviews Sentiment
7.4
Number of Reviews
37
Ranking in other categories
Log Management (37th), Security Information and Event Management (SIEM) (29th)
Proofpoint Email Protection
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
52
Ranking in other categories
Email Security (2nd), Security Awareness Training (2nd), Digital Risk Protection (3rd), Office 365 Protection (2nd), Secure Email Gateway (SEG) (3rd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. NetWitness Platform is designed for Log Management and holds a mindshare of 0.3%, down 0.4% compared to last year.
Proofpoint Email Protection, on the other hand, focuses on Secure Email Gateway (SEG), holds 21.6% mindshare, up 18.7% since last year.
Log Management
Secure Email Gateway (SEG)
 

Featured Reviews

MOTASHIM Al Razi - PeerSpot reviewer
It is a stable solution, but they should make the user interface easier to understand
The solution's initial setup takes work. We have to organize multiple paths and many features. The deployment process takes less than a week. But it takes a month to complete if we want to make the solution smarter by integrating it with various devices. I rate the process as a six out of ten.
AhmedRamadan - PeerSpot reviewer
Optimize email security with effective sandboxing and auto Pull for quarantine
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365 Proofpoint offers a complete solution for email security with features like DLP, email archiving, and encryption. The most valuable…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that we can create our own connectors for any application, and NetWitness provides the training and tools to do it."
"The most valuable feature is the security that it provides."
"It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before."
"Performance and reporting are very good."
"Setting up NetWitness is straightforward. There are multiple connectors, including standard and specialized connectors. One purpose of the connectors is the enhanced capability integrate the custom applications. NetWitness comes with E6 appliances and application images that we use for the initial configurations and for the OS stack information. From there, you can consider the correlation rules, integrate the different log sources, and easily create correlation rules and backlog reports."
"Incident management is its most valuable feature."
"I can have enterprise security, email security, next generation firewall security log, HIDS and NIDS logs, etc. all on the same dashboard. It makes it easy to pinpoint or correlate our server to this. I can find out if there is lateral movement. This is the biggest advantage of this solution."
"Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements."
"The stability is very good."
"The solution has very strong detection for most of the phishing and malicious emails received from the outside."
"Proofpoint Email Protection offers an additional layer of protection compared to other brands like Microsoft, Mimecast, and Barracuda. While these major companies excel at detecting malicious attachments, the solution goes further by analyzing the context of emails, allowing for more nuanced decision-making."
"The most valuable feature of Proofpoint Email Protection is the central location dashboard for viewing all the related information for risk."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"Its main defense is to stop malicious emails from coming through. There is a sandbox environment where you can open malicious or suspicious emails to make sure that they're not malicious, instead of taking the risk of having your employees do it. This is definitely something that everybody needs nowadays, especially with the rise in cyber attacks."
"It's very good at identifying threats."
"The tool has improved our workflow by ensuring people receive only the emails they need for work rather than being inundated with hundreds or thousands of unnecessary emails daily."
 

Cons

"RSA NetWitness Logs and Packets can improve the threat level aspect, it is lacking compared to other solutions. Whenever any hacking activity or any other threat factor occurred they used to provide the coverages very fast when comparing RSA NetWitness Logs and Packets. I heard the other three solutions, from a discussion with my team members who had experience in other solutions, they used to say that. Whenever any issues happened across the globe RSA NetWitness Logs and Packets are a little bit slow improving those detection mechanisms."
"Sometimes, it gives me static when integrating Windows-based systems. It should produce a precise log of sorts as to where the problem is. For example, a few days ago because of the McAfee application firewall, I couldn't get access to the particular Windows machine. So, my team and I had to figure out by ourselves that there was a virus responsible for the obstacle. This solution should trigger a meaningful log or message indicating the reason the user or implementer can't get into the machine."
"The initial setup is very complex and should be simplified."
"It is not so easy to customize this product."
"Security needs improvement."
"More customizability is required, which is something that they need to improve on."
"Nowadays, their support is a little subpar compared to other solutions. I rate RSA support six out of 10."
"I'd like to see improvement in its ease of use. It's basically unusable. It's overly complex."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"We find the cost to be prohibitive."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"The solution could lower its price."
"I want Security Awareness Training in there as a package deal. A lot of companies are starting to value email security a little bit more and take it a little bit more seriously, and the great product that we link together with a lot of these sales is a training product called Security Awareness Training. It is an upsell that we do with Proofpoint, and it is definitely something that I recommend everybody with email security to look into. It would be great if Security Awareness Training is included with the email security."
"It became very expensive due to the nature of local circumstances, and I may advise Proofpoint to adjust marketing solutions based on each country."
"We'd like to have the ability to create more customized reports."
"The flexibility of the solution can be improved."
 

Pricing and Cost Advice

"In comparison to other SIEM solutions such as Splunk, NetWitness is less costly."
"Compared to the competition, the is price is not that high."
"There is a licensing fee and the customer can choose whether he wishes this to be subscription-based or perpetual."
"It is cheap."
"This is a pricey solution; it's not cheap."
"Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day."
"The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs)."
"We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment."
"The licensing model for Proofpoint Email Protection is simple. It's based on the number of users. Price-wise, Proofpoint Email Protection is a five out of ten because it's a pretty expensive solution."
"The licensing is basically $8/user."
"The solution uses a licensing model that is reasonable compared to other products."
"In general, the pricing is competitive."
"They are competitively priced, but I have been forced to get quotes for other solutions now because they haven't been responding to requests to do the work that we would like them to do."
"The licensing cost of Proofpoint Email Protection is a lot higher than other solutions, such as Barracuda."
"I rate the product price a seven on a scale of one to ten, where one is low price and ten is high price."
"Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
860,745 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
17%
Manufacturing Company
5%
Government
5%
Computer Software Company
14%
Financial Services Firm
10%
Educational Organization
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about NetWitness Platform?
The product's initial setup phase was not at all difficult.
What is your experience regarding pricing and costs for NetWitness Platform?
The pricing is comparable to others, and I consider the cost to be intermediate. Specific cost details are unknown to me.
What needs improvement with NetWitness Platform?
There is currently no need for improvement in the SIEM ( /categories/security-information-and-event-management-siem ), though there could be potential enhancements by integrating with AI.
What is your experience regarding pricing and costs for Proofpoint Email Protection?
In terms of pricing, it is okay compared to others. I would say it is normal. Additional costs do come in, but it enhances security.
What needs improvement with Proofpoint Email Protection?
It became very expensive due to the nature of local circumstances, and I may advise Proofpoint to adjust marketing solutions based on each country.
 

Also Known As

RSA Security Analytics
Proofpoint Enterprise Protection, Cofense PhishMe, Proofpoint Digital Protection
 

Overview

 

Sample Customers

Los Angeles World Airports, Reply
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
Find out what your peers are saying about Wazuh, Splunk, Datadog and others in Log Management. Updated: July 2025.
860,745 professionals have used our research since 2012.