You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Proofpoint
How would you rate your experience with Proofpoint Insider Threat...?
Silent Deploy
As reported in 14 Proofpoint Insider Threat Management reviews.
Silently deploys on endpoints without alerting users.
Detect Data Movement
As reported in 15 Proofpoint Insider Threat Management reviews.
Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.
File and Application Activity
Based on 16 Proofpoint Insider Threat Management reviews.
Tracks activities taken on files or in applications, including save, print, or delete actions.
Trigger Alerts
This feature was mentioned in 16 Proofpoint Insider Threat Management reviews.
Sends alerts to administrators when users take insider threat actions .
Searchable Evidence
Maintains active and historical evidence in a searchable format.
Risk Scoring
Provides risk scoring for suspicious activity.
Screen Recording
Records video or screenshots of endpoint sessions.
Keystroke Logging
Logs keystrokes of users.
Sentiment Analysis
Based on 15 Proofpoint Insider Threat Management reviews.
Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers.