What is our primary use case?
Proofpoint Email Protection serves multiple purposes for our organization. We use it as an antispam solution, and while I am a user with some insight into the configuration rather than the administrator, my team helps the admins configure it to function as an antispam system. However, we primarily use it for detecting malicious emails that pass through the antispam layer.
The antispam layer is realized through the Email Protection section. We use the TAP dashboard extensively, along with the Threat Response part and the Report Suspicious Email button, which is a complementary product of Proofpoint known as the phishing button. We utilize all of these tools together.
How has it helped my organization?
Using Proofpoint Email Protection has successfully reduced the volume of emails that we need to review. It performs exceptionally well as both an antispam solution and as a layer that functions after the antispam when a user recognizes something suspicious or when it automatically detects something it previously allowed and notifies us on the platform. Everything is centralized, and the reaction time from there is very fast. The time to analyze an event overall is significantly reduced compared to before.
Regarding the time to respond to threats, it has improved with Proofpoint Email Protection's visibility and automation. The platform offers a centralized dashboard that allows us to select filters for all emails according to our constraints in that moment and manage many emails simultaneously. We had this capability before with Cisco, so the reaction time has improved as well.
What is most valuable?
The best features in Proofpoint Email Protection that I appreciate most are the capabilities to manage reports from users very effectively. When a user receives an email they believe is malicious and clicks on Report Suspicious Emails, the platform demonstrates very strong and granular capabilities to manage all these emails automatically, or if desired, we can also conduct further manual review. This is a very powerful tool from this perspective.
Proofpoint Email Protection has influenced the quantity of threats that our organization needs to protect against. We have largely covered this point already because Proofpoint functions as an excellent antispam filter and, combined with the closed-loop email analyzer that integrates the analyzer from the phishing button, the Threat Response, and the auto-pull capability, it automatically manages clusters of emails. The result is obvious.
What needs improvement?
Regarding improvements or enhancements in Proofpoint Email Protection, I find the platform somewhat chaotic. It has too many different sections that perform the same function, which is very confusing. If someone does not use the platform every day, which is normal for a SOC analyst because there may be rotation within the team and analysts do not always perform the same tasks, this is common in a Security Operation Center team. I would prefer the platform to be somewhat more simplified.
If asked about missing features in Proofpoint Email Protection, I believe the platform is generally good overall. Small improvements are always possible. The platform may lack some intuitive elements, which is consistent with the chaotic aspect I mentioned earlier. For instance, when opening an email on the platform that Proofpoint indicates is malicious, the platform states that this is a malicious URL or malware, but the question arises of how one knows this. Security analysts need much more technical details about the actual threat, and the platform does not provide such details. I do not know if this is because our company is very large and has both on-call and on-premise components, which might not work as well in such complex environments.
For instance, we often have difficulties retrieving emails when the platform indicates an email contains malware but we cannot retrieve it automatically with the trap. We must retrieve it manually and analyze it, but the platform often does not allow us to do this. We must proceed in other ways, such as contacting a forensic team and requesting extractions. Small improvements that could ease the analyst's life could be made.
Buyer's Guide
Proofpoint Email Protection
March 2026
Learn what your peers think about Proofpoint Email Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,011 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with Proofpoint Email Protection since our organization adopted it in the last year. We are relatively new to the platform and have been using it for approximately six to seven months.
What do I think about the stability of the solution?
Regarding the stability and performance of Proofpoint Email Protection, I have not experienced any crashes, downtimes, or performance issues. When there are temporary problems with the platform, we always receive communication from Proofpoint. I believe they are reliable from this perspective.
What do I think about the scalability of the solution?
Proofpoint Email Protection is truly scalable. As I mentioned, our organization is quite large, actually a group of companies, and we have adopted it for most of the companies. It works really throughout. Scalability is one of the positive points.
How are customer service and support?
I would evaluate the customer service and technical support team of Proofpoint Email Protection as reasonable. I was not directly involved but was involved in some email threats when we contacted support. I did not have much direct interaction with support, though it was more during the setup phase of the product. Since we have been using it for a few months, we found a feature called email deduplication that should work in a certain way but is not working. We asked for information, but the information never arrived to us. I do not know if this was an isolated episode. I have not had many interactions with support. I am familiar with support teams in general from other software companies I use, and often support teams are not particularly brilliant. I see something similar in Proofpoint as well.
Which solution did I use previously and why did I switch?
Prior to adopting Proofpoint Email Protection, we used Cisco ESA, which is the antispam solution from Cisco. We had it for approximately four to five years before transitioning to Proofpoint.
How was the initial setup?
The experience with the initial setup process of Proofpoint Email Protection was mainly with the administrator of the platform. We were involved only in certain points where decisions depended on us. I honestly do not know how the setup process went.
What about the implementation team?
I was not involved in the evaluation process for Proofpoint Email Protection because our organization is very structured, and for all these aspects, we have a dedicated team. We have a team for procurement, a team that scouts for solutions, a team that configures the solutions, and then we are often simply users. Regarding whether we had an internal team working or used any integrator, resellers, or consultants for the deployment of Proofpoint Email Protection, I do not have that information.
Which other solutions did I evaluate?
We decided to switch to Proofpoint Email Protection because we were not satisfied with Cisco. It appeared to be an old platform and somewhat chaotic. Proofpoint is also somewhat chaotic, but Cisco was significantly more chaotic than Proofpoint. Additionally, it did not function as well as an antispam filter.
What other advice do I have?
Proofpoint Email Protection's scope and range of threat protection capabilities address modern security challenges effectively as it performs very well for the email layer. We use it for that purpose. As far as I know, the platform also includes capabilities for phishing website takedowns, though we do not currently use that feature. Proofpoint actually covers the email layer comprehensively for the cybersecurity aspect, from antispam to the takedown of phishing websites to proactive research of internal threats on the email layer. It performs well, but it is limited to the email layer.
Regarding the level of visibility that Proofpoint Email Protection provides into people-based risk within our organization, in the Threat Protection Workbench there is a section for examining risks associated with people. We mostly focus on threats and look at this from that perspective. These are two sides of the same medal. We can look from one perspective or the other and end up with more or less the same finding. We actually use the threats part in the Threat Protection Workbench, which is also found in the TAP dashboard. That part is really effective because it automatically scans emails inside the company to find suspicious things that it did not previously identify.
Regarding messaging security for protection across cloud apps and file sharing services, we do not use that feature.
Based on my experience with Proofpoint Email Protection so far, I would recommend it as a tool because we are satisfied with it.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.