Introducing G2.ai, the future of software buying.Try now

Compare Darktrace / EMAIL and Proofpoint Core Email Protection

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Darktrace / EMAIL
Darktrace / EMAIL
Star Rating
(12)4.0 out of 5
Market Segments
Mid-Market (81.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Darktrace / EMAIL
Proofpoint Core Email Protection
Proofpoint Core Email Protection
Star Rating
(582)4.6 out of 5
Market Segments
Enterprise (66.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial 0 Mailbox Per Year
Learn more about Proofpoint Core Email Protection
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Proofpoint Core Email Protection excels in user satisfaction, boasting a high overall score that reflects its effectiveness in email filtering and threat management. Users appreciate features like the ability to quarantine spam emails and the immediate impact on risk reduction.
  • Users say that Darktrace / EMAIL offers a unique advantage with its machine learning capabilities, which allow it to adapt to specific environments. Reviewers highlight its fast performance and clear visibility into email actions, making it easy to track whether emails were held or modified.
  • According to verified reviews, Proofpoint Core Email Protection stands out for its comprehensive threat detail and information available for investigation, which users find invaluable for remediation efforts. This level of detail contributes to its high satisfaction ratings.
  • Reviewers mention that while Darktrace / EMAIL is praised for its AI detection and low false positive rates, it has a smaller user base and fewer reviews, which may limit insights into its long-term reliability compared to Proofpoint's extensive feedback.
  • Users highlight that Proofpoint's ease of use and setup are significant advantages, with many finding the onboarding process intuitive and straightforward. This contrasts with Darktrace, where some users noted a steeper learning curve despite its powerful features.
  • G2 reviewers indicate that Proofpoint Core Email Protection provides superior support quality, with users rating it highly for responsiveness and helpfulness. In comparison, Darktrace's support is still rated well but does not reach the same level of user satisfaction.
Pricing
Entry-Level Pricing
Darktrace / EMAIL
No pricing available
Proofpoint Core Email Protection
Proofpoint Core Email Protection
Free Trial
0 Mailbox Per Year
Learn more about Proofpoint Core Email Protection
Free Trial
Darktrace / EMAIL
No trial information available
Proofpoint Core Email Protection
Free Trial is available
Ratings
Meets Requirements
8.1
8
9.3
275
Ease of Use
7.5
8
8.5
514
Ease of Setup
9.0
5
8.3
457
Ease of Admin
9.0
5
8.5
243
Quality of Support
8.5
8
8.8
271
Has the product been a good partner in doing business?
9.3
5
9.2
239
Product Direction (% positive)
8.3
7
9.2
263
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Intrusion Detection and Prevention Systems (IDPS)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Agentic AI - Intrusion Detection and Prevention Systems (IDPS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
147
Administration
Not enough data
8.9
125
|
Verified
Not enough data
9.1
129
|
Verified
Not enough data
9.0
122
|
Verified
Not enough data
8.4
83
|
Verified
Maintenance
Not enough data
8.8
125
|
Verified
Not enough data
9.2
139
|
Verified
Not enough data
9.0
125
Not enough data
8.2
100
|
Verified
Security
Not enough data
9.3
140
|
Verified
Not enough data
8.8
113
Not enough data
9.4
136
|
Verified
Not enough data
9.1
98
|
Verified
Not enough data
9.1
102
|
Verified
Not enough data
8.6
86
|
Verified
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Security - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Performance - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
AI Automation - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Traffic Analysis (NTA)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Activity Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Intelligent Email ProtectionHide 12 FeaturesShow 12 Features
8.3
6
9.0
98
Administration
8.6
6
9.1
84
8.3
6
8.7
91
8.6
6
9.0
90
7.3
5
8.9
86
Detection
7.0
5
8.5
79
8.3
5
8.9
84
9.0
5
9.1
93
Protection
9.3
5
9.2
90
8.0
5
9.1
93
8.7
5
9.2
95
Agentic AI - Intelligent Email Protection
Not enough data
9.3
10
Not enough data
9.3
10
Not enough data
8.9
117
Functionality
Not enough data
9.3
112
|
Verified
Not enough data
9.3
112
|
Verified
Not enough data
9.2
111
|
Verified
Not enough data
8.9
112
|
Verified
Not enough data
9.2
114
|
Verified
Not enough data
8.9
106
|
Verified
Not enough data
9.0
111
Not enough data
8.3
91
|
Verified
Not enough data
8.5
111
|
Verified
Not enough data
8.6
49
Agentic AI - Secure Email Gateway
Not enough data
8.7
23
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Platform Features
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Automation Capabilities
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.7
22
Encryption Techniques - Email Encryption
Not enough data
9.0
21
Not enough data
9.0
21
Not enough data
9.3
20
Authentication, Verification, and Access Controls - Email Encryption
Not enough data
8.9
20
Not enough data
8.4
20
Not enough data
8.5
20
Not enough data
8.5
20
Security Enhancements and Auditing - Email Encryption
Not enough data
8.7
21
Not enough data
8.7
21
Not enough data
8.6
21
Not enough data
8.5
21
Integration, Compatibility, and Usability - Email Encryption
Not enough data
8.6
22
Not enough data
8.3
20
Not enough data
8.7
21
Not enough data
8.1
20
Not enough data
8.9
16
Agentic AI - Email Anti-spam Features
Not enough data
8.9
16
Not enough data
8.9
16
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Information
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Personalization
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Categories
Categories
Shared Categories
Darktrace / EMAIL
Darktrace / EMAIL
Proofpoint Core Email Protection
Proofpoint Core Email Protection
Darktrace / EMAIL and Proofpoint Core Email Protection are categorized as Intelligent Email Protection, Cloud Email Security, Email Anti-spam, and Email Encryption
Reviews
Reviewers' Company Size
Darktrace / EMAIL
Darktrace / EMAIL
Small-Business(50 or fewer emp.)
18.2%
Mid-Market(51-1000 emp.)
81.8%
Enterprise(> 1000 emp.)
0%
Proofpoint Core Email Protection
Proofpoint Core Email Protection
Small-Business(50 or fewer emp.)
4.0%
Mid-Market(51-1000 emp.)
29.8%
Enterprise(> 1000 emp.)
66.1%
Reviewers' Industry
Darktrace / EMAIL
Darktrace / EMAIL
Telecommunications
18.2%
Financial Services
18.2%
Manufacturing
9.1%
Warehousing
9.1%
Oil & Energy
9.1%
Other
36.4%
Proofpoint Core Email Protection
Proofpoint Core Email Protection
Financial Services
9.3%
Hospital & Health Care
8.6%
Information Technology and Services
6.8%
Retail
5.3%
Manufacturing
4.2%
Other
65.8%
Alternatives
Darktrace / EMAIL
Darktrace / EMAIL Alternatives
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Add Mimecast Advanced Email Security
Abnormal AI
Abnormal AI
Add Abnormal AI
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Add Check Point Harmony Email & Collaboration
Wiz
Wiz
Add Wiz
Proofpoint Core Email Protection
Proofpoint Core Email Protection Alternatives
Paubox
Paubox
Add Paubox
SpamTitan Email Security
SpamTitan Email Security
Add SpamTitan Email Security
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Add Mimecast Advanced Email Security
Symantec Email Security.Cloud
Symantec Email Security.Cloud
Add Symantec Email Security.Cloud
Discussions
Darktrace / EMAIL
Darktrace / EMAIL Discussions
Monty the Mongoose crying
Darktrace / EMAIL has no discussions with answers
Proofpoint Core Email Protection
Proofpoint Core Email Protection Discussions
What is the best way to allow users to safely release quarantined emails to their inbox ?
3 Comments
Merry M.
MM
Hi Kadeem, this is Merry from G2. Sorry to hear you're having these difficulties. Perhaps you have the "Require Admin Privileges to Release" setting on? When...Read more
How is it possible to limit the quaratine folder. I still have too many mails quarantined.
2 Comments
Merry M.
MM
Hi Patrick - this is Merry from G2. Sounds like you get at ton of emails per day! Proofpoint has a ton of tutorials on their YouTube channel & several videos...Read more
Is there a road map to enhance the Smart Search feature?
1 Comment
NC
The Smartserarch tool, is seen more as a troubleshooting tool, the actions you want to do are inside the quarantine folders. But in my opinion, putting some...Read more