


Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP).
The service generates a low rate of false positives, reducing the overhead of managing false positive events.
The ideal situation would be to have all these portals combined into one unified dashboard.
The time required for email investigations and responses has changed with Proofpoint Email Protection's visibility and automation.
If you implement these kinds of solutions in your security stack, the first beneficial thing will be that you will not suffer any malware, and you will not face attacks, which ultimately leads to financial benefit.
There is a lack of SLA adherence, and third-party partners do not provide prompt responses.
We have had some open tickets for months, maybe half a year, and there is no real answer.
The service response times are aligned with standards, responding within a few hours based on the problem's criticality.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
Even the engineers have been helpful, and if we open a case, they get back to us right away.
We always contact them if we need support, whether it's for setting up features or technical support, which is very responsive.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
Wildfire is highly scalable.
Palo Alto Networks WildFire is scalable, and I give it a nine for scalability.
The on-premises version is expensive to scale as it might need an additional device to be installed in the setup.
Proofpoint is scalable for multi-site organizations with thousands of users.
The solution provides a graphical representation and dashboard view showing how many threats are getting blocked on a daily and monthly basis.
Proofpoint Email Protection is considered to be highly scalable, designed for large enterprises, with a cloud-based architecture that offers an enormous number of options, including multi-organization support and high-volume email handling.
It performs filtering, malware blocking, and scanning.
The solution is scalable and stable.
If Proofpoint Email Protection has an outage, we are either not receiving emails or not blocking the right threats.
Regarding the stability and performance of Proofpoint Email Protection, I have not experienced any crashes, downtimes, or performance issues.
Proofpoint Email Protection is very stable and reliable, as it remains accessible at all times without issues, ensuring that data is available in real time.
It should be easier to establish the Palo Alto Networks WildFire cluster between the devices.
The dashboard should provide better visibility, especially in showing how many files are sent to Wildfire and their findings.
It is a very good product.
The older legacy user interface just took a little to work with, and the new unified interface, as it was able to do more and more of the functionality of the old one, the product just got easier and easier to use.
In addition to the UI improvements, I would appreciate an increase in the speed of the tasks being processed on the pod.
There are pros and cons to that, but I would suggest maintaining a good balance between security protection and operational impact.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
I would rate it an eight out of ten in terms of affordability.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Given my other experience with other vendors, I think they are a bit on the high end and a bit on the pricey end for the email security functionality that we were using.
Although it is a bit costly compared to Mimecast, Defender, and Cofense Vision, it is efficient and strong in security, so I do not mind the cost because I will not reduce my security risk.
Integrating Palo Alto Networks WildFire with various security protocols similar to a firewall has significantly improved the overall threat detection capabilities in our organization.
The most valuable feature of Wildfire is its sandboxing capability for examining suspicious files or locations.
The integration and working with third-party solutions was very seamless and smooth.
Without Proofpoint Email Protection, most of these emails would have come through, slipped through Exchange, gotten into the user's mailbox, and created a lot of trouble for the organization.
Proofpoint Email Protection has positively impacted my organization by ensuring we are not at risk of a breach through email.
TAP alerts, where Proofpoint Email Protection scans emails and sends alerts, provide the ability to review suspicious emails and validate them in a sandbox environment.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| Palo Alto Networks WildFire | 7.5% |
| Proofpoint Email Protection | 5.3% |
| Trellix Network Detection and Response | 3.5% |
| Other | 83.7% |


| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 16 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 24 |
| Large Enterprise | 43 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Palo Alto Networks WildFire is a highly effective cloud-based advanced threat protection (ATP) solution that organizations in a wide variety of fields trust to help them keep safe from digital threats. It is designed to enable businesses to confront even the most evasive threats and resolve them. It combines many techniques to maximize the level of threat protection available to users.
Palo Alto Networks WildFire Benefits
Some of the ways that organizations can benefit by choosing to deploy WildFire include:
Proactive real-time threat prevention. Organizations that utilize WildFire can take a proactive approach to their network security. Wildfire’s security scanning software is supported by powerful automation that enables it to run 180 times faster than other similar solutions. It also leverages machine learning to spot and address two times more malware monthly than its competitors. Users can solve issues as they arise, which prevents them from suffering severe harm.
A holistic approach to security. WildFire leverages many of the security features and characteristics that can be found in some of the most effective security solutions in a way that provides users with a powerful protective blanket. It combines such things as machine learning, dynamic and static analysis, and a custom-built analysis environment, and enables users to cover many different potential avenues of attack. In this way, organizations can easily detect and prevent even the most sophisticated threats from harming them.
Reduce overhead costs. Using WildFire cuts the expenses that a business incurs. Its architecture is based in the cloud and, as a result, users do not have to purchase hardware to run it. Additionally, those users do not have to pay anything more than a product subscription fee. They can scale it up as they wish and incur no additional costs.
Palo Alto Networks WildFire Features
Some of the many features WildFire offers include:
Third-party integrations. WildFire gives users access to integrations that can enable them to combine Wildfire’s security suite with outside tools. If an organization thinks that they are missing something, they can easily use Wildfire’s third-party integrations to bolster their capabilities. These integrations can connect to many different types of tools, like security information or event management systems.
URL filtering. Organizations can use a URL filtering feature to safeguard themselves against known threats. When this feature is active, it will scan for traffic coming from specific URLs that are known to be malicious. This keeps them one step ahead of those threats that they know about.
Deep analytics. Wildfire comes with the ability to provide users with a detailed analysis of any threat that it finds across all of their network environments. It gives users insight into everything from their natures to the actions that they have performed.
Reviews from Real Users
WildFire is a solution that stands out when compared to its primary competitors. Two major advantages that it offers are the high speeds at which it can analyze network traffic for threats and the accuracy with which it can pick out genuine threats from false positives.
Ahmad Z., the principal consultant at Securelytics, writes, “The analysis is very fast. The intermittent is a millisecond and has a speedy response time.”
Christopher B., the senior systems administrator at a government agency, says, “It gives a more accurate assessment of a virus in terms of whether it's truly a virus, malware, or a false positive. We have some legacy software that could pop up as being something that is malware. WildFire goes through and inspects it, and then it comes back and lets us know if it's a false positive. Usually, when it finds out that it's not a virus, it lets us know that it's benign, and it can exclude it from that scan, which means I don't even have to worry about that one popping up anymore.”
Proofpoint Email Protection provides powerful filtering against spam, phishing, and malware, leveraging effective threat detection and blocking capabilities. This solution integrates smoothly with platforms like Office 365, offering a user-friendly dashboard for seamless operations.
Proofpoint Email Protection focuses on email security, ensuring protection against phishing, malware, and spam. It includes features like URL scanning, anti-phishing, anti-virus protection, and sandboxing for comprehensive threat analysis. Its advanced analytics through TAP and TRAP, along with strong integration abilities, make it appealing for handling email threats. While scalability and ease of deployment are advantages, challenges such as integration in complex environments, the cost, and limited local support require attention. Enhancements in search functionality, email encryption, and improved phishing detection are also needed.
What are the key features of Proofpoint Email Protection?
What benefits and ROI should users look for in reviews?
Industries adopting Proofpoint Email Protection include finance, healthcare, and education sectors, which benefit from its robust email security measures. Educational institutions prioritize safe communication for staff and students, while healthcare organizations focus on protecting sensitive patient data. Financial services benefit from preventing data breaches and fraud through advanced threats management.
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.