Our company is a direct partner of Proofpoint and not an end-user. Since I don't have too much experience with usage, I don't think I can speak to it as well as a typical user. We work with Email Protection and Targeted Attack Protection. We handle the on-premises deployment model. I'd rate the solution ten out of ten. I'm very happy with it, and even one year after implementation I haven't had any issues with it or had any customers who were displeased with the solution.
We're simply customers of the solution. We don't have a business relationship with the company. I'm not sure which version of the solution we are using. The advice that I would give to other companies who are considering using the solution is to really test the systems, even for outlandish attacks, to see if it will hold up. For me personally, I actually have two Proofpoint accounts. I have a Proofpoint account for something completely unrelated to B&H and I was able to prove that's almost anything you think of you can do, although it might not say in the documentation or the people at Proofpoint might not think of that scenario, however, it's still a way to achieve almost everything you were trying to achieve with your email filter. The flexibility is unbelievable. And you could get very creative. You just need to be very careful to not mess it up. However, you could get extremely creative to accommodate real case scenarios. Overall, I'd rate the solution nine out of ten.
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote!
If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brief voter registration form, review the list of nominees and vote. Get your colleagues to vote, too!
Dear PeerSpot community members,
This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.
Check them out!
See what your peers are discussing at the moment!
What were your main pain points during the SIEM product purchase process?
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
I agree with many of these observations.
A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.
As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.
Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.
Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
Phishing is the starting point of most cyberattacks. When sending malicious messages or creating a clone site, attackers use psychological techniques and social engineering tools, so protecting against such campaigns is not an easy task for information security professionals.
To protect against phishing attacks, you can use different tools built into browsers and mail servers, as well as “ov...
On Saturday, May 8, 2021, major media outlets reported that Colonial Pipeline, whose fuel pipeline network supplies gasoline, jet fuel, and other petroleum necessities to over 50 million Americans, had suffered a ransomware attack and shut down its pipeline as a precaution. The disruption in supply sent gasoline prices rising over the weekend, with financial markets on edge in anticipation of e...
These attacks are inevitable and organizations need to plan for fast and secure recovery. It's no longer necessary to take days or weeks to reimage hundreds or endpoints. Solutions are available that can restore systems to pre-attack condition in minutes.