Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Proofpoint

Show rating breakdown
1,312 reviews
  • 37 profiles
  • 34 categories
Average star rating
4.5
#1 in 14 categories
Grid® leader
Serving customers since
2002

Featured Products

Product Avatar Image
Proofpoint Insider Threat Management

48 reviews

Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.

Profile Filters

All Products & Services

Product Avatar Image
Proofpoint Email Encryption

17 reviews

With Proofpoint Email Encryption, messages and attachments are automatically encrypted with complete transparency. Users don't need to manually encrypt their email to send and receive messages securely—it just happens in the background. Email Encryption simplifies secure communications and leaves you in control.

Product Avatar Image
Proofpoint Threat Response

17 reviews

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Product Avatar Image
ProofPoint Secure Share Administration

17 reviews

We provide the most effective security & compliance solutions to respond to cyber attacks in every channel including email, web, the cloud, and social media

Product Avatar Image
Proofpoint Sendmail Open Source

15 reviews

Open source email server and solutions from Proofpoint

Product Avatar Image
Proofpoint Enterprise Archive

12 reviews

Proofpoint Enterprise Archive solutions provide automated social media content supervision, remediation, and record retention - all from a common interface.

Product Avatar Image
Proofpoint Email Fraud Defense

12 reviews

Proofpoint Email Fraud Defense gives you the visibility, tools, and services to authorize legitimate email and block fraudulent messages before they reach the inbox.

Product Avatar Image
Proofpoint Cloud App Security Broker

11 reviews

Proofpoint Cloud App Security Broker (PCASB) helps you secure applications such as Microsoft Office 365, Googles G Suite, Box, and more.

Product Avatar Image
Proofpoint Mail Routing Agent

9 reviews

Proofpoint Mail Routing Agent (MRA) provides secure, scalable, reliable email routing and management for even the most complex email infrastructures.

Product Avatar Image
Proofpoint Digital Compliance

6 reviews

Our Digital Compliance solutions provide automated social media content supervision, remediation, and record retention - all from a common interface

Profile Name

Star Rating

941
314
40
6
11

Proofpoint Reviews

Review Filters
Profile Name
Star Rating
941
314
40
6
11
MC
Matthew C.
01/27/2026
Validated Reviewer
Verified Current User
Review source: G2 invite

Powerful Tool

Once the engineers got us set up, we have pretty much "set and forget it". Their customer support is also spot on any time we need to be reminded how to set up exceptions.
Maher N.
MN
Maher N.
IT Project Manager at Interlinked
12/21/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Extensive Training Library Makes Security Awareness Easy

The most helpful thing about the proof point security awareness is that the library of training and the various training of phishing campaigns
Verified User in Consumer Services
AC
Verified User in Consumer Services
12/17/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Proofpoint good

it is a good tool for email filtering that helps to avoid a lot of spam and can apply automation

About

Contact

HQ Location:
Sunnyvale, CA

Social

@proofpoint

What is Proofpoint?

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Details

Year Founded
2002
Ownership
NASDAQ: PFPT