No more typing reviews! Try our Samantha, our new voice AI agent.

Proofpoint Email Protection Primary Use Case

AshishKochhar - PeerSpot reviewer
AshishKochhar
Information Technology Team Lead at a manufacturing company with 201-500 employees

We are currently planning to purchase Proofpoint Email Protection further for TRAP and endpoint security, as we already have TAP implemented.

In my company, I primarily use Proofpoint Email Protection for advanced protection against today's threats. This includes email filtering for malicious content, email encryption, threat protection, and filtering out spam and phishing emails. Additionally, I conduct security simulations for employees and sometimes conduct IT security training.

View full review »
Vivek-Jaiswal - PeerSpot reviewer
Vivek-Jaiswal
Information security analyst at a tech vendor with 10,001+ employees

I am managing the entire Proofpoint Email Protection Email Security applications for one of the largest healthcare industries. The organization uses this tool to protect their entire infrastructure based on email security. Proofpoint Email Protection is one of the leading tools for email security protection, utilizing advanced AI-driven and machine learning technology to review all emails.

Proofpoint Email Protection performs very deep investigation on all incoming emails. It scans through multiple Proofpoint cloud applications such as TAP, TRAP, Email Fraud Defense, a customer support portal, and Proofpoint Security Awareness tool, supporting six to seven applications total. All these applications are cooperated and cloud-native, working together to determine whether an email is actually malicious or not. It is very easy to perform sandboxing of the incoming email, conduct investigations, and run checks on multiple sender intelligence and email firewall rules to easily identify incoming emails. Based on the decision, emails can be allowed, sent, or quarantined at the gateway level.

Proofpoint Email Protection can easily integrate with Office 365 cloud application and should be easy to integrate with Exchange on-prem as well, with both working simultaneously. User sync is easy, SSO configuration is straightforward, and managing all incoming domains on the Proofpoint cluster is simple. Most organizations are moving forward with Proofpoint Email Protection because of these capabilities as it is one solution for many problems.

We generally use this service directly from the vendor. We discuss the requirement and enterprise level design, considering how large, small, or medium the organization is. Based on that assessment, any customer decides whether to go ahead with licensing all features or limited functionality. For big or broader organizations, Proofpoint Email Protection is really helpful because they can utilize all applications for protecting emails. However, for low-size or mid-level organizations, it can be challenging in terms of cost, management, and resource utilization, which could be a problem for low-level enterprises.

View full review »
IS
reviewer5781394
Threat Hunter at a manufacturing company with 10,001+ employees

I pretty much summarize and cover everything about my main use case or how I use Proofpoint Email Protection.

If I look at the statistics of our daily inbound email, I can gladly say that one of the best features Proofpoint Email Protection offers is that approximately 60 to 65% of the emails that are being targeted to my organization are being blocked. All of the spam, the junk, the bulk, the low reputation, the unwanted emails, and those that have bad intention with viruses are all stopped at the gate. I think this is one of the best use cases that I can call out with Proofpoint Email Protection. The subsequent best use case would be Clear and TRAP, which helps to reduce the time we spend on investigating every email that gets reported from the end user. Lastly, TAP ATO gives us a bit of peace of mind to monitor logins and tell us when there is a suspicious login that we should be aware of.

Before, what would happen in the past is every single email that gets reported, we would have to reply and triage those emails individually. I would look at the email and then have to reply to the reporter and tell them whether this is good or bad, and why. The entire process was manual. With TRAP and Clear working hand in hand together, I have automated analysis. If there is a manual review required, we have pre-configured workflows on Proofpoint Email Protection. All we have to do is trigger the workflow based on what we feel the classification of the reported email is. The percentage is still not up to par. We were expecting more automated classification or automated dispositions from Proofpoint Email Protection. Nevertheless, the good thing is we are not triaging every single email individually and not typing out the reply individually as well. That is a good feature to call out, but I would expect a little more enhancement from Proofpoint Email Protection in the future.

We have seen a reduction in phishing incidents with Proofpoint Email Protection, but not fully. It is not 100%. There are still cracks within the walls of Proofpoint Email Protection that let this type of email in for various reasons. Either the content is sitting behind a password protected page or document. We do see a reduction. I unfortunately cannot put a statistic to it yet, but there is reduction, and this could even be a little better.

View full review »
Buyer's Guide
Proofpoint Email Protection
March 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.
Steve Bradbury - PeerSpot reviewer
Steve Bradbury
Consultant at Exelixis Inc

I initially brought Proofpoint Email Protection in to stop spam back in the early days when it was mostly just an annoying thing. As the threat landscape expanded to include malware and phishing campaigns, I rode along with their expanded services for those. It covers basically anything email protection related that is used by bad actors as initial access brokers. They have also expanded their services to include URL protection and sandboxing of attachments.

They have expanded their areas in the back end like threat response, pulling emails out that are bad, and giving our security operations centers more insights into what is going on in the email. They have expanded from their initial footprint of email into a broader space for cybersecurity.

Currently, I have Proofpoint Email Protection deployed primarily in the cloud with POD, Proofpoint on Demand. Most organizations where I have been working have it in their POD on Demand, which is a cloud service. They also have other services related to that which are in various places such as AWS. They do not hide the fact that these are cloud and SaaS services, but that is where most of this work is done.

In my organization, the approximate number of users using Proofpoint Email Protection includes 300,000 users from one major organization I retired from, and now I am working with another organization that has about 4,000 users.

View full review »
reviewer2808051 - PeerSpot reviewer
reviewer2808051
Analyst at a manufacturing company with 10,001+ employees

I use Proofpoint Email Protection as a standard solution that offers email protection primarily to block phishing and check for malware that might be contained within emails or other suspicious content, which is clarified and categorized. Suspicious content inside the emails does not necessarily have to be attachments but can include links that have been fired in a sandbox. There has been protection in the background about spoofing and some spoofed domains. Mostly, we have not directly used the authentication because it is a recent addition. We are using a different vendor now, but we have been preparing for DMARC, DKIM, SPF, and such cases. No AI analysis has been implemented; primarily, we are handling the email protection itself.

View full review »
Kevin Flores - PeerSpot reviewer
Kevin Flores
Specialist Engineer, S Sr at Globant

I last used Proofpoint Email Protection in February of 2025. I have been working in my current field with Proofpoint Email Protection for approximately two to three years. I use Proofpoint Email Protection as an email protection service. In my previous company, we used several other email protection services including Viper email security, Mimecast email security, and Zix protection. However, based on my opinion and feedback, I really love Proofpoint Email Protection. Proofpoint Email Protection is intuitive for administrative people and is easier to handle than other services. It is stronger than other services and is easier to configure and apply settings for anti-spam, anti-spoofing, and other tools that the service offers. In my opinion, it was an awesome tool and my favorite to use with the multiple customers that I had in the past.

View full review »
reviewer2805597 - PeerSpot reviewer
reviewer2805597
TDR Analyst at a tech vendor with 10,001+ employees

My main use case for Proofpoint Email Protection is to detect phishing emails or suspicious spam emails incoming to our organization. I will do this with the help of the event names or SPF, DKIM, or DMARC protocols.

When we receive a phishing email, there are two things to check. When I try to ingest the logs from the email gateway, Proofpoint, to Splunk or any SIEM tool that we are using, most of the phishing-related events will be categorized under TI mail data, which is Threat Intel Mail Data. That is the specific event name that I will be looking for. There are some other fields such as spam score and phish score. The higher the spam and phish score, the greater the phishing activity or spam activity may be happening in a user's email inbox. Based on these conditions or fields, I usually try to adjust the use case to detect phishing and spam.

View full review »
Alex Alexandre - PeerSpot reviewer
Alex Alexandre
System Administrator at INSIGHT CREDIT UNION

My usual use cases for Proofpoint Email Protection involve my day-to-day email protection and DLP. Proofpoint Email Protection has DLP built-in, and we use the encryption side. Additionally, Proofpoint Email Protection has a large file send feature, which we use as well.

View full review »
SB
Swati Bellary
Senior Analyst/Software Engineer at LTIMindtree

We monitor false positive and false negative cases, and we work on disclaimer, external tagging, TRAP Recall, and TRAP Dashboards.

The best features in Proofpoint Email Protection that I prefer are TRAP Recall, mainly for handling TRAP-related issues.

Email protection and spam detection, along with allow lists, block lists, and whitelisting legitimate domains, are additional features we utilize.

We handle both on-premises and cloud deployments.

We work with SOC analysts on internal infrastructure that depends upon people-centered threats such as phishing, malware, and credential theft. We use behavior-based intelligence to stop malicious content from reaching users. Proofpoint Email Protection reduces noise and improves high-fidelity alerts, prioritizing threat response quickly through integration with SOAR and SIEM tools. This provides better visibility and automated response, allowing analysts to focus on manual email threats.

View full review »
OO
Olufemi Oyinkansola
Senior Security Engineer at Cloudflare

As a customer of Proofpoint Email Protection, my company uses it. Many of the use cases for Proofpoint Email Protection involve thwarting a lot of email threats, such as phishing, smishing, and many other variants. Proofpoint Email Protection is very email-based, and recently we started doing a lot of custom blocks on it where we implement some YARA rules or other custom patterns to block suspicious payloads from getting into our environment, so our use case is heavily on the email side.

View full review »
DD
David Dicus
Information Security Architect at Loews Hotels

Our main use case for Proofpoint Email Protection is using the whole suite of services, including CASB, DLP, URL protection, email security, and other components.

I have configured 365 email to filter all emails through Proofpoint Email Security, and we have alerts set up for any critical or high severity incidents, receiving alerts for business email compromise and phishing attacks. We also conduct phishing training, which are some of the day-to-day tasks that we use it for.

View full review »
Pavan Ingaleshwar - PeerSpot reviewer
Pavan Ingaleshwar
SOC Analyst at ISECURION

I have been using Proofpoint Email Protection as a part of our security operation workflow for monitoring and analyzing email-based threats across the organizations. Previously, I managed four clients, and I have been using Proofpoint Email Protection for two of them. Proofpoint Email Protection plays a very critical role in detecting phishing campaigns and malicious attachments and suspicious URLs before they reach the end users. One of the strongest aspects that I have noticed in Proofpoint Email Protection is its phishing and URL defense capability, content it triggres when user interact with any suspisous emails or links or attachments. 

I have used Proofpoint Email Protection for more than two years. In my previous organization, I used Proofpoint Email Protection for approx 2 years.

In my environment, we primarily used the TAP (Targeted Attack Protection) cloud deployment.

View full review »
AbhishekKumar21 - PeerSpot reviewer
AbhishekKumar21
Senior Security Engineer at DCIPHERS IT SOLUTIONS (P) LTD

I started working with Proofpoint Email Protection one year ago. Before that, I was working as a DLP guy in Data Loss Prevention. When I changed my companies, my current company is more focused towards Proofpoint Email Security. I got to know about email security and started learning. Now I am in a state where I am able to implement the tool, and I know how the policies are being processed and how it is getting done.

Proofpoint Email Protection has certain two modes. The first one is Core Email Protection. I am currently using the P0 bundle, which is offering Core Email Protection with SEG, which is Secure Email Gateway. Apart from that, TAP, which is Targeted Attack Protection, includes URL Defense and Attachment Defense. Apart from that, we have Threat Protection and Cloud Threat Protection. These certain things I have been using.

I am using Core Email Protection.

Proofpoint is for the enterprise customer, and they are focused only on the cloud solution. Some of the solutions are providing on-premises as well, but for email security, they specifically work on the cloud portals.

Our company is working rigorously with Proofpoint as a partner, where we are pitching this solution to the customers that we are handling, positioning the product of email security from Proofpoint. That is why we are more into it.

View full review »
Ravishankar KumarPatel - PeerSpot reviewer
Ravishankar KumarPatel
Solution Architect Cybersecurity at a computer software company with 5,001-10,000 employees

From a solution architect perspective, I do not have day-to-day operational exposure to Proofpoint Email Protection, but I have conducted multiple demos, design discussions, and solution evaluations focused on email threat protection.

I primarily work with the SaaS deployment model, typically procured through authorized vendors rather than directly from Proofpoint. The environments I support range from 20,000 to 70,000 users, where Proofpoint integrates tightly with SOC operations.

When integrated with a SOC, Proofpoint provides consolidated phishing alerts that are easy for L1 analysts to understand and act upon. Analysts can quickly validate indicators (e.g., via VirusTotal), enrich alerts, and build SOAR automations around phishing response.

View full review »
Jay Jayasinghe - PeerSpot reviewer
Jay Jayasinghe
Cyber Security Engineer at IT Naturally

As a security engineer, I use Proofpoint Email Protection because it has been implemented for one of our larger customers. I work for an MSP, and we have a large customer, a major European airline, whose entire email security is currently managed with Proofpoint Email Protection. We are subscribed to multiple products including Email Protection, EFD, and Threat Protection. The use case is mainly to control mail flow to and out of the domain. The majority of the use case is to prevent malicious emails from getting through emails by filtering emails using latest threat intel and sender reputation. As a daily breakdown, we fine-tune rules and release emails from quarantine using Targeted Attack Prevention or other Threat Intelligence.

View full review »
SP
G Siva Prasad
Principal Consultant at Infosys

We are the integrator for Proofpoint Email Protection, and for one of our customers, we support the solution. As my organization has a large customer base, we support our clients widely, working as a consultant and integrator for Proofpoint Email Protection products. We assist customers in adapting Proofpoint Email Protection solutions, including email protection and authentication aspects, with email protection being the primary solution. We perform all end-to-end deployments for our customers.

The usual use cases for Proofpoint Email Protection that I work with mostly include defining inbound and outbound policies and fine-tuning email protection rules. We focus on email hygiene, mail delivery issues, defining mail policies, and creating rules based on specific conditions. We also address URL Defense, Attachment Defense, anti-spam, anti-phishing capabilities, and ATP features, while troubleshooting issues such as malware definitions and URL rewrite options, particularly related to Business Email Compromise. Additionally, we work with email authentication protocols such as SPF, DKIM, DMARC, DLP scenarios, and email encryption modules, as all aspects present in Proofpoint Email Protection on Demand instance are addressed.

Customers usually prefer the deployment of Proofpoint Email Protection on cloud solutions, specifically, Proofpoint Email Protection on Demand instance, which is easy to access and administer. However, for certain features such as TRAP, an on-premises solution may be necessary, as it reduces administrative overhead.

View full review »
reviewer2809023 - PeerSpot reviewer
reviewer2809023
Cyber Security Engineer at a financial services firm with 10,001+ employees

Proofpoint Email Protection serves multiple purposes for our organization. We use it as an antispam solution, and while I am a user with some insight into the configuration rather than the administrator, my team helps the admins configure it to function as an antispam system. However, we primarily use it for detecting malicious emails that pass through the antispam layer.

The antispam layer is realized through the Email Protection section. We use the TAP dashboard extensively, along with the Threat Response part and the Report Suspicious Email button, which is a complementary product of Proofpoint known as the phishing button. We utilize all of these tools together.

View full review »
KA
Kris Andrews
Cyber Security Engineer at a manufacturing company with 10,001+ employees

Proofpoint Email Protection is strictly used for email protection in our organization. Approximately 2,500 users are using Proofpoint Email Protection. The usage varies across our environment since we have users who share computers in our stores as well as corporate users, so Proofpoint Email Protection is deployed across multiple different environments within the company.

View full review »
RS
Rohini Singh
Cyber Security Engineer Sme at Tata Consultancy

In my environment, I am using Proofpoint Email Protection for advanced email threat protection. For malware, spam, and virus protection, we are using their email protection module and security module. I determine all policy routes, and all DKIM, DNS, and DMARC records are being managed by Proofpoint for us at the moment. Proofpoint Email Protection is our primary email server gateway for inbound and outbound communication. The MX is pointing to Proofpoint, and Proofpoint Email Protection is acting as the first point of contact for anything coming from outside to our internal users.

I purchased Proofpoint Email Protection through marketplaces. For a couple of years, I completely relying on Microsoft Exchange before adopting Proofpoint Email Protection. After that, I conducted many POCs with Proofpoint and then we recognized Proofpoint and started with Proofpoint on-premise, then I moved to Proofpoint on Demand, and I secured their TAP module, which is the advanced threat protection module. I then moved on to their threat response auto-pull module, and I also opted for the email fraud defense module. I currently have Proofpoint secure email relay, which we are using, and we gradually purchased their license for approximately 3,000 users for their security education platform, which is the Zen-Guide platform. All their modules are connected to each other and communicate very nicely with each other. If a threat is detected after it is delivered to the user's mailbox, Proofpoint Email Protection will still be able to detect it and the threat response will auto-pull it from the user's mailbox, which is a unique feature that I found absent in Microsoft. I have had a very good relationship with Proofpoint Email Protection over the last four years using almost all their available modules and products, and I am talking about using their adaptive email DLP in the future.

View full review »
MP
Manash Pathak
Securuty solution architect at a tech vendor with 10,001+ employees

I describe a few use cases for Proofpoint Email Protection by using all the platform capabilities such as Email EFD, Email Fraud Defense, Proofpoint CTR, Cloud Threat Response, Secure Email Relay, and also solutions like TAP, Targeted Attack Protection. I work with all the flavors that Proofpoint Email Protection has.

View full review »
reviewer2807556 - PeerSpot reviewer
reviewer2807556
Senior Security Engineer at a tech services company with 10,001+ employees

Proofpoint Email Protection is used for email security, threat protection, and email fraud defense, including SPF, DKIM, and DMARC protection.

View full review »
Gowtham Selvaraj - PeerSpot reviewer
Gowtham Selvaraj
Senior Solution Delivery Lead Cybersecurity at International Olympic Committee – IOC

I use Proofpoint Email Protection as an email gateway, and we mainly use this for the email gateway only.

View full review »
reviewer2805150 - PeerSpot reviewer
reviewer2805150
IT Director at a financial services firm with 10,001+ employees

My main use case for Proofpoint Email Protection is for protecting email and email security to prevent business email compromise and malicious email from reaching our users. Proofpoint Email Protection helps in stopping malicious emails from getting to our users, such as phishing emails and emails with malicious attachments. Proofpoint Email Protection does quarantine multiple malicious emails in our environment, and an example would be an email recently with a malicious website asking the user to log in; Proofpoint was able to detect that the URL was malicious and block and discard the email.

View full review »
reviewer2800347 - PeerSpot reviewer
reviewer2800347
Sr Security Engineer at a comms service provider with 201-500 employees

My use case with Proofpoint Email Protection was primarily as a secure email gateway, and all of those sound like they describe the same thing. I know Proofpoint Email Protection has a big product portfolio, and we had other products that filled some of the other services that they also offered.

View full review »
ME
Maher Elsherbini
System Administrator at Tutt Bryant Group
My main use case for Proofpoint Email Protection is to protect our company emails from suspicious attacks as it serves as an email security gateway. View full review »
reviewer2805183 - PeerSpot reviewer
reviewer2805183
Cyber Security Analyst at a government with 201-500 employees

My main use case for Proofpoint Email Protection is email defense. A specific example of how I use Proofpoint Email Protection for email defense is through malicious email detection, phishing detection, and malicious email removal.

View full review »
reviewer2805303 - PeerSpot reviewer
reviewer2805303
Information Security Analyst at a government with 11-50 employees

My main use case for Proofpoint Email Protection is to block malicious or suspicious emails as per my role. Proofpoint Email Protection is our email filtering tool and we do our DMARC using Proofpoint Email Protection as well. So basically it's our email security tool overall.

I use Proofpoint Email Protection almost every day. As a security analyst, I'm responsible for investigating suspicious emails that the staff report. Once I investigate the email and determine that the sender is suspicious or malicious, I take their email address, or even the domain and block it in Proofpoint Email Protection so that they cannot send any further email.

For me that's my main use case, my day-to-day thing.

View full review »
reviewer2809749 - PeerSpot reviewer
reviewer2809749
Cyber Analyst at a construction company with 501-1,000 employees

My main use case for Proofpoint Email Protection is stopping phishing emails.

View full review »
Adrian Clements - PeerSpot reviewer
Adrian Clements
Cyber engineer at Fortescue

Proofpoint Email Protection is primarily used for anti-spam purposes. As other companies receive a lot of malware, phishing emails, and unwanted bulk email, Proofpoint Email Protection stops unwanted email from getting through to mailboxes.

View full review »
reviewer2807463 - PeerSpot reviewer
reviewer2807463
Security Specialist at a leisure / travel company with 10,001+ employees

My main use case for Proofpoint Email Protection is to monitor our email gateway and apply the necessary spam filters and virus protection, as well as controls on phishing-related emails.

Proofpoint Email Protection helps to control the large volume of spam and phishing-related emails that come through the gateway, allowing us as human analysts to see through and cut through the noise.

View full review »
Andres H. - PeerSpot reviewer
Andres H.
Infrastructure Analyst at a consultancy with 51-200 employees

Proofpoint Email Protection is used to set up filters to review and filter out threats from emails, managing security posture and inbox security.

Additionally, it helps create rules and policies to filter out potentially malicious emails, thus defending the environment and reducing risks to users.

View full review »
reviewer2807226 - PeerSpot reviewer
reviewer2807226
Cybersecurity Trainer at a healthcare company with 10,001+ employees

My main use case for Proofpoint Email Protection is email filtering; we use it for TRAP and Clear, and I use it for Zen Guide.

I use Proofpoint Email Protection for email filtering by using Zen Guide for simulated phishing campaigns, and I use email protection to see where people have reported spam or phishing emails and have a look at those messages to see what people are reporting.

Regarding my main use case with Proofpoint Email Protection, I just use it to see what people are reporting, and people in my team then use it for investigation.

View full review »
reviewer2805609 - PeerSpot reviewer
reviewer2805609
Security Analyst at a media company with 1,001-5,000 employees

My main use case for Proofpoint Email Protection is as the SEG. I use Proofpoint Email Protection as the main gateway for our organization, serving as the main email gateway.

View full review »
reviewer2500410 - PeerSpot reviewer
reviewer2500410
Senior Cybersecurity Specialist at a retailer with 10,001+ employees

I have about three years of experience with Proofpoint products.

I gained experience with this product while working in the retail industry.

We deploy it in the cloud.

View full review »
reviewer2805666 - PeerSpot reviewer
reviewer2805666
Cyber Security Analyst at a mining and metals company with 1,001-5,000 employees

My main use case for Proofpoint Email Protection is email security to help achieve better results compared to what we currently have with Microsoft Defender.

A specific example of how I use Proofpoint Email Protection for email security compared to Microsoft Defender is that we were finding many false positives with Microsoft Defender and inconsistent results where it would let one email through and mark another email as spam or phishing. It was quite inconsistent. With Proofpoint Email Protection, it was very consistent and blocked the email for all recipients, unlike Defender.

In addition to my main use case with Proofpoint Email Protection, we also use the report phishing button from Proofpoint Email Protection, and it has been great.

View full review »
reviewer2803581 - PeerSpot reviewer
reviewer2803581
Cybersecurity Expert at a tech vendor with 10,001+ employees

My main use case for Proofpoint Email Protection is corporate email protection.

For corporate email protection, we are using Proofpoint Email Protection by having email on the cloud through Azure and we are using the solution to protect our email so that we are not receiving malicious emails.

I have concerns mostly related to ransomware attacks in addition to my previous use case.

View full review »
reviewer2805114 - PeerSpot reviewer
reviewer2805114
Infrastructure Engineer at a government with 1,001-5,000 employees

My main use case for Proofpoint Email Protection is email protection and policy setup. For email protection and setting up policies, especially for encryption, we use encrypted emails to send out and the URL Defense feature. These are policies that we set up, along with safe attachments for any attachment protection.

View full review »
SA
Sophie Alexander
Release lead at a financial services firm with 10,001+ employees

My main use case for Proofpoint Email Protection is DMARC and DKIM, which assists me in ensuring that emails are delivered and not tampered with.

I have been using Proofpoint Email Protection for multiple years, predominantly for DKIM and DMARC.

At this stage, I do not have anything else to add about my main use case or how I use Proofpoint Email Protection.

View full review »
reviewer2809476 - PeerSpot reviewer
reviewer2809476
Technical Account Manager at a computer software company with 11-50 employees

My use case for Proofpoint Email Protection is email security and threat protection.

View full review »
JF
Jason Frazer
GRC Analyst at a manufacturing company with 5,001-10,000 employees

My main use case for Proofpoint Email Protection is to protect the mailbox.

A specific example of how I'm using Proofpoint Email Protection to protect users' mailboxes is that when users click malicious links, if it goes through, then Proofpoint TRAP will take it out, which addresses those types of threats.

View full review »
ES
Erman Sen
Manager, IT Director at Cakmak Avukatlik Ortakligi

Email security is the primary use case for which our clients mainly used Proofpoint Email Protection.

We have used it for email security.

View full review »
Avigyanam Borah - PeerSpot reviewer
Avigyanam Borah
SOC Analyst at Colortokens

My main use case for Proofpoint Email Protection is to handle phishing emails.

When an email comes from a spoofed email or domain, we get alerted, and we check the domain and attachments flowing from that email. Proofpoint directly redirects any suspicious emails to us as an alert, allowing us to check the authentication paths such as SPF, DKIM, and DMARC, and we also analyze the suspicious IPs or domains.

Another use case with Proofpoint TAP involves checking if the URL in the email is blocked or re-injected by Proofpoint. If blocked, it redirects to a sandbox environment to keep users safe from attacks. Re-injected URLs mean the user is protected when they unknowingly click on malicious content.

View full review »
reviewer2808108 - PeerSpot reviewer
reviewer2808108
Cyber Security Analyst at a government with 201-500 employees

My main use case for Proofpoint Email Protection is email defense, monitoring of malware, and protection. I use Proofpoint Email Protection for monitoring malware or protecting patient information to analyze incoming mail, and I also use it for its DMARC capability.

View full review »
AhmedRamadan - PeerSpot reviewer
AhmedRamadan
Products and solutions director at ITVikings

Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365.

View full review »
AS
reviewer97525344
Security Presales Engineer at a tech services company with 1,001-5,000 employees

We use the solution to stop email attacks, such as credential phishing, impersonation, and some forms of spear phishing. It also helps prevent attacks that bypass email authentication protocols like SPF and DMARC.

View full review »
reviewer2306271 - PeerSpot reviewer
reviewer2306271
MEP at a pharma/biotech company with 10,001+ employees

I am an administrator. I manage it as an admin for each and every inbound and outbound email.

View full review »
reviewer1977171 - PeerSpot reviewer
reviewer1977171
Logistics Manager at a educational organization with 501-1,000 employees
I use Proofpoint Email Protection to filter and scan doubtful emails. The solution screens emails, quarantines suspicious ones, and only sends through legitimate emails. View full review »
Pranay Gurrapu - PeerSpot reviewer
Pranay Gurrapu
Cyber Security Engineer at News Corp

We use it for user queries. For example, if a user flags that they're not receiving emails from a particular sender, we investigate where it got blocked in Proofpoint, if it was delivered successfully, or if it was quarantined. 

We also onboard new domains, adding SPF and DKIM records to the DNS records so that all incoming mail is processed by Proofpoint before reaching the internal network.

View full review »
VV
Virgilio Vensamoye
Network Manager at ALACHUA COUNTY ITS

Our main use case for the solution is email protection. It filters incoming emails, particularly those from spammy origins. While it's not perfect, it effectively filters out about 99.5% of all spam, making it a great product for us.

View full review »
Stephen Whitehouse - PeerSpot reviewer
Stephen Whitehouse
Group Head of IT at Frontline Ltd

The product serves as my company's enterprise email security platform. Everything related to the emails in my company comes through Proofpoint Email Protection.

View full review »
SimonClark - PeerSpot reviewer
SimonClark
Cyber Security Advisor - Director at Fort Net UK

I use the product for email protection and staff awareness training. 

View full review »
EG
Enayat-Galsulkar
Senior Information Security Consultant at Dimah Capital

The solution is used for email protection. It protects us from malicious attacks. It has sandboxing, archiving, email retrieval, and quarantine features.

View full review »
ArvindSharma2 - PeerSpot reviewer
ArvindSharma2
Security Operations Lead at ChargePoint

The primary use case of Proofpoint Email Protection is to ensure email security for both incoming and outgoing emails.

View full review »
Santhosh Kandadi - PeerSpot reviewer
Santhosh Kandadi
Assistant Vice President at Synchrony

I use Proofpoint Email Protection as an email protection system.

View full review »
CoreyWilson - PeerSpot reviewer
CoreyWilson
Director of Infrastructure and Security at Halifax Health

We use most of Proofpoint Email Protection's features including email phishing protection, TAP (Targeted Attack Protection), TRAP (Threat Response Auto-Pull), URL rewrites, and sandboxing. It is currently used in a hybrid environment and we have just deployed a patch for the latest version.

View full review »
RM
reviewer86589
Senior Information Security Analyst at a healthcare company with 1-10 employees

Our organization is large and has multiple entities that use the solution. 

Our department includes two senior information security analysts and two network analysts. We use the solution and as our main security filter for 90% of emails. Emails come into the domain, hit the gateway firsthand, and the solution filters for spam, phishing, malware, and virus attachments. 

The TAP service integrates with the PPS API connection and analyzes every bit of email that goes through the system. Troublesome domains are blocked automatically without needing to be analyzed. If a specific email address is not blocked, the email gets released. TAP still analyzes the email, identifies whether it is a threat, and details its attributes such as the IP address, subject and content, and URL name. 

All metadata for a threat email is sent from TAP to TRAP which goes back to the user's mailbox and automatically pulls the email so that it disappears. TRAP also identifies if the email has been distributed, even to 10,000 users, and attempts to pull back all instances. TRAP can pull internal emails but not external emails because it does not have access to external systems. 

View full review »
reviewer1624176 - PeerSpot reviewer
reviewer1624176
Global Account Manager at a computer software company with 51-200 employees

It serves as an added layer above your email gateway.

View full review »
ManishKumar18 - PeerSpot reviewer
ManishKumar18
Manager Technology - Advanced Analytics and Data Management at Mashreq

The product looks at the emails that we receive. If there are any suspicious emails with attachments or strange content, it will detect that and give us an alert on a dashboard. From there, we can pick up the alert, and then we can review and take action to mitigate any risk.

View full review »
ManishKumar18 - PeerSpot reviewer
ManishKumar18
Manager Technology - Advanced Analytics and Data Management at Mashreq

I have been using Proofpoint Email Protection for the emails that we receive to determine if there is any suspicious attachment or content. It will detect and give us an alert on our dashboard. From there we can pick up the alerts and review and take action to mitigate the risk.

View full review »
Larry Etzler - PeerSpot reviewer
Larry Etzler
CEO at JL Computers

I am using Proofpoint Email Protection for blocking out spam and malware from the emails. Proofpoint Email Protection is linked to our Microsoft Office365

View full review »
DavidGriffiths - PeerSpot reviewer
DavidGriffiths
CTO at DSM Technology Consultants, LLC

Proofpoint Email Protection is used to protect your entire email.

View full review »
reviewer2322027 - PeerSpot reviewer
reviewer2322027
Senior Information Security Engineer at a energy/utilities company with 201-500 employees

We use the solution to filter out spam from our end users, block malicious attacks, and add banners to the emails if they're from suspicious senders. 

If there's a suspicious link, we'll have a URL to open it in a browser.

View full review »
Michael Maertzdorf - PeerSpot reviewer
Michael Maertzdorf
IT System Administrator at Data 4 Information Technology B.V.

We use Proofpoint Email Protection mostly for email filtering, spam, and phishing.

View full review »
Suhel Khan - PeerSpot reviewer
Suhel Khan
Senior Consultant (SIEM Admin) at IBM

The solution is primarily used for email protection. However, it is not as good as EDR. It is good at handling privacy.

View full review »
Melvin Ong - PeerSpot reviewer
Melvin Ong
Country Manager at PT Symcaw Solutions Indonesia

I use the solution to protect email. It's primarily used for security purposes. 

View full review »
Agnieszka Gabrysiak - PeerSpot reviewer
Agnieszka Gabrysiak
Marketing Manager at Veronym

The solution protects our mailboxes from phishing and scanning.

View full review »
Gerald Ashokan - PeerSpot reviewer
Gerald Ashokan
Global Account Executive at Tata Consultancy

Proofpoint Email Protection is used as an email security platform to detect all kinds of malware, viruses, and unethical acts being done through email solicitations.

View full review »
Anita Brüggemann - PeerSpot reviewer
Anita Brüggemann
System Administrator at emco Bautechnik GmbH

We use it for our email flow. We use it for our daily operations. For example, it helps in dropping spam and phishing emails.

View full review »
Anuraj Nair - PeerSpot reviewer
Anuraj Nair
Presales Engineer at SNSIN
SR
Sheikh Rehan
Data Security Engineer at a tech services company with 11-50 employees

Our primary use case is the encryption tooling of email security. Emails sent externally are automatically encrypted as is all the information included. There are some DLP related options available in Proofpoint, which we enabled with the help of classifying the emails, like internal, external, private, public, sharing. That's our main use. We are customers of Proofpoint.

View full review »
reviewer1550484 - PeerSpot reviewer
reviewer1550484
Chief Information Officer at a consumer goods company with 51-200 employees

I am the CIO, I have consultants.

We use Proofpoint Email Protection to filter out malicious emails.

View full review »
reviewer1515735 - PeerSpot reviewer
reviewer1515735
Information Technology Help Desk Technician at a consumer goods company with 51-200 employees

We use it as a corporate or as an exchange email filter to protect, to stop any executables from coming through email, and to halt phishing scams. Basically, the product is for email security. We use it for our network.

Also, if a user thinks that they didn't get an email, we can access the Proofpoint dashboard and go find missing mail that either people didn't get so we can rerelease it to them. Or if it did get quarantined, we can release and approve a sender.

You can blacklist and whitelist sender lists. If you are getting phishing scams that get through the filter, you can end up shutting those down. You can actually block the entire domain so that domain can never email you ever again. 

If there is an external email outside of your network or your company, you can whitelist them if it's an unknown sender, so you don't ever have to worry about missing their emails. 

View full review »
LB
Luis Brown
Chief Information Security Officer at a university with 1,001-5,000 employees

We use it in front of Office 365 for anti-phishing, anti-malware, and threat protection.

View full review »
CK
Chawapat Kongdumrongkiat
Product Consultant at M.Tech

Many customers in Thailand have issues with phishing. Most email security systems can detect spam and viruses, but not many can detect phishing as well as Proofpoint Email Protection does. Therefore, the main use case is to prevent phishing.

View full review »
reviewer1319712 - PeerSpot reviewer
reviewer1319712
Systems Engineer at a tech services company with 11-50 employees

Our company uses the solution for a customer's email security. 

Three years ago, the solution opened offices in Saudia Arabia. Previously, you could only deal with distributors. 

We were introduced to the solution and conducted proof of value and concept for one customer. We implemented one year ago and the customer is happy with the solution. 

Our customer has 5,000 users across a big company with many branches. 

View full review »
CK
Chawapat Kongdumrongkiat
Product Consultant at M.Tech

Most customers interested in Proofpoint Email Protection have problems with spam, or their email security solution cannot detect phishing or spam, so they want to replace it with Proofpoint Email Protection.

View full review »
reviewer1977531 - PeerSpot reviewer
reviewer1977531
Analyst

We primarily use the solution for email protection. 

View full review »
LL
LeticiaLezama
General contador at Dicofra

We use Proofpoint Email Protection for machine learning and artificial intelligence engine.

View full review »
reviewer1759677 - PeerSpot reviewer
reviewer1759677
Information Technology Security Risk Manager at a healthcare company with 1,001-5,000 employees

Our primary use case of Proofpoint Email Protection is focused around data loss prevention (DLP). To protect against spam, viruses, incoming and outgoing mail.

View full review »
it_user1711266 - PeerSpot reviewer
it_user1711266
Dipl.Ing.

My primary use case for this solution is for email security.

View full review »
reviewer1501215 - PeerSpot reviewer
reviewer1501215
Principal Consultant at a tech services company with 201-500 employees

We use this solution as a firewall for our email environment; it's basically a reputation-based service. It denies the connection from known bad sites. That's the biggest protection they have when you go to the antivirus and anti-spam modules. They even have an encryption piece in it.

View full review »
it_user1309926 - PeerSpot reviewer
it_user1309926
Head of IT Department at a construction company with 1,001-5,000 employees

Our primary use case for Proofpoint Email Protection is for email security, to secure all the inbound and outbound emails.

View full review »
it_user1620072 - PeerSpot reviewer
it_user1620072
Works

We primarily use the solution for a variety of services. It's mostly related to email. 

View full review »
it_user1272951 - PeerSpot reviewer
it_user1272951
Security Professional at Qatar Computer Services WLL

We are service providers who recommend products for our customers. Our customer's license expired and we suggested Proofpoint Email Protection.

Our customers are enterprise companies.

View full review »
reviewer1458411 - PeerSpot reviewer
reviewer1458411
Network Security Engineer at a tech services company with 11-50 employees

We are system integrators and this is a product that we implement for our customers.

View full review »
reviewer1050960 - PeerSpot reviewer
reviewer1050960
CISO at a retailer with 1,001-5,000 employees

We primarily use the solution to block malicious email and spam in bulk.

View full review »
reviewer1261605 - PeerSpot reviewer
reviewer1261605
Director at a tech services company with 51-200 employees

Proofpoint is number one in terms of market share worldwide. We recommend it to clients because of its rich features. It offers a lot of choices. We primarily use the solution because of its rich features in email protection. It also provides protection for the cloud. It provides backup targeted attack protection features as well.

View full review »
KW
Ken Wottge
Information Security Officer at UC San Diego Health System

We use Proofpoint for advanced email protection from a number of threats, including phishing and account spoofing.

View full review »
Ronny Nazareno - PeerSpot reviewer
Ronny Nazareno
Cyber Security Engineer at MAINT

When we define keywords, the solution evaluates the keywords, generates reports, and gathers the information

View full review »
Buyer's Guide
Proofpoint Email Protection
March 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.