Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Proofpoint

Show rating breakdown
1,312 reviews
  • 37 profiles
  • 34 categories
Average star rating
4.5
#1 in 14 categories
Grid® leader
Serving customers since
2002

Featured Products

Product Avatar Image
Proofpoint Insider Threat Management

48 reviews

Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.

Profile Filters

All Products & Services

Product Avatar Image
Proofpoint Core Email Protection

582 reviews

Proofpoint Core Email Protection stops malware and non-malware threats such as impostor email.

Product Avatar Image
Proofpoint Security Awareness Training

333 reviews

Proofpoint Security Awareness Training solutions engage your end users and arm them against real-world cyber attacks, using personalized training based on our industry-leading threat intelligence. We offer a variety of assessments, training, and email reporting and analysis tools to deliver the right training to the right people at the right time. Customers using our solutions have reduced successful phishing attacks and malware infections by up to 90%.

Product Avatar Image
Proofpoint Enterprise Data Loss Prevention (DLP)

55 reviews

Proofpoint Enterprise Data Loss Prevention (DLP) protects your organization against data loss that originates with your people. It brings together our solutions for email, cloud and endpoint DLP. The product combines content, behavior and threat telemetry from these channels to address the full spectrum of peoplecentric data-loss scenarios.

Product Avatar Image
Proofpoint Insider Threat Management

48 reviews

Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.

Product Avatar Image
Proofpoint Adaptive Email Security

45 reviews

Proofpoint Adaptive Email Security intelligently prevents advanced threats and protects against data loss to strengthen email security and build a smarter security culture.

Product Avatar Image
Proofpoint Targeted Attack Protection For Email

38 reviews

Proofpoint Targeted Attack Protection (TAP) stays ahead of today's attackers with an innovative approach that detects, analyzes, and blocks advanced threats before they reach the inbox.

Product Avatar Image
Proofpoint Threat Response Auto-Pull

24 reviews

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators to move malicious or unwanted messages to quarantine, after delivery. It follows forwarded mail and distribution lists and creates an auditable activity trail.

Product Avatar Image
Proofpoint Essentials for Small Business

22 reviews

Proofpoint Essentials for Small Business is a cloud-based enterprise-class security for small and medium enterprises with email security, continuity, archiving, and social-media protection.

Product Avatar Image
Proofpoint Digital Protection

21 reviews

Our Digital Protection solutions provide real-time security for branded social media accounts and employee social media programs across all major social networks.

Profile Name

Star Rating

941
314
40
6
11

Proofpoint Reviews

Review Filters
Profile Name
Star Rating
941
314
40
6
11
Maher N.
MN
Maher N.
IT Project Manager at Interlinked
12/21/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Extensive Training Library Makes Security Awareness Easy

The most helpful thing about the proof point security awareness is that the library of training and the various training of phishing campaigns
Verified User in Consumer Services
AC
Verified User in Consumer Services
12/17/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Proofpoint good

it is a good tool for email filtering that helps to avoid a lot of spam and can apply automation
Bikash G.
BG
Bikash G.
Senior Manager
12/07/2025
Validated Reviewer
Review source: Organic

Outstanding Security and Support with User-Friendly Design

This product stands out for its excellence, user-friendly design, and robust technology. It provides a comprehensive array of security features and is backed by outstanding support.

About

Contact

HQ Location:
Sunnyvale, CA

Social

@proofpoint

What is Proofpoint?

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Details

Year Founded
2002
Ownership
NASDAQ: PFPT