Our main use case is to automatically remove and pull the malicious, phishing and spam emails from each user's mailbox. We have also integrated this with Proofpoint TAP and PPS for more feeding.
Proofpoint Threat Response is the #7 ranked solution in top Security Incident Response tools. PeerSpot users give Proofpoint Threat Response an average rating of 8.0 out of 10. Proofpoint Threat Response is most commonly compared to Palo Alto Networks Cortex XSOAR: Proofpoint Threat Response vs Palo Alto Networks Cortex XSOAR. Proofpoint Threat Response is popular among the large enterprise segment, accounting for 69% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 18% of all views.
Proofpoint Threat Response OverviewUNIXBusinessApplication
Proofpoint Threat Response OverviewUNIXBusinessApplicationPrice:
Download the Security Incident Response Buyer's Guide including reviews and more. Updated: November 2022
What is Proofpoint Threat Response?
No defense can stop every attack. When something does get through, Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently. Get an actionable view of threats, enrich alerts, and automate forensic collection and comparison. For verified threats, quarantine and contain users, hosts, and malicious email attachments - automatically or at the push of a button.
Proofpoint Threat Response Customers
University of Waterloo, Akorn, Fenwick and West LLP
Proofpoint Threat Response Video