Proofpoint ITM Logo
Proofpoint ITM Logo
Proofpoint

Proofpoint ITM

Composite Score
8.2 /10
CX Score
8.6 /10
Category
Proofpoint ITM
8.2 /10

What is Proofpoint ITM?

As the leading people-centric Insider Threat Management (ITM) solution, Proofpoint’s ITM protects against data loss and brand damage involving insiders acting maliciously, negligently, or unknowingly. Proofpoint correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data breaches, and accelerate security incident response.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Proofpoint ITM Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

91 Likeliness to Recommend

100 Plan to Renew

100 Satisfaction of Cost Relative to Value


Emotional Footprint Overview

Chart with 5 data points.
The chart has 1 X axis displaying categories.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
{y}
{name}

Emotional Footprint Overview

Product Experience:
100%
Negotiation and Contract:
100%
Conflict Resolution:
100%
Strategy & Innovation:
92%
Service Experience:
100%

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+98 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Proofpoint ITM?

Chart

Bar chart with 10 data series.
The chart has 1 X axis displaying values. Range: -0.5 to 0.5.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
0% Negative
0% Neutral
100% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Feature Ratings

Average 91

Forensic Investigation Capability

100

Integration

100

Alerts and Responses

95

Behavioral Triggers

95

Risk Scoring

95

Machine Learning

90

Vulnerability Scanning

90

User Privacy

90

User Threat Detection

90

Logging and Monitoring

90

Data Loss Prevention

90

Vendor Capability Ratings

Average 95

Ease of Data Integration

100

Usability and Intuitiveness

100

Quality of Features

100

Business Value Created

100

Product Strategy and Rate of Improvement

95

Ease of Implementation

95

Availability and Quality of Training

95

Ease of Customization

95

Ease of IT Administration

90

Vendor Support

90

Breadth of Features

85

Proofpoint ITM Reviews

SMARANIKA H.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Initial Implementation
Validated Review
Verified Reviewer

Submitted Feb 2024

Extensive monitoring capabilities

Likeliness to Recommend

9 /10

What differentiates Proofpoint ITM from other similar products?

Extensive Monitoring: Captures and analyzes user activity across various endpoints, applications, and networks. Advanced Threat Detection: Employs machine learning, behavioral analysis, and anomaly detection to identify suspicious activities. Data Loss Prevention (DLP): Prevents sensitive data exfiltration through content-aware and contextual policies. User and Entity Behavior Analytics (UEBA): Analyzes user and entity behavior patterns to identify potential insider threats. Investigation Tools: Provides tools for investigating potential incidents and gathering evidence. Cloud-Based Delivery: Offers scalability and ease of deployment.

What is your favorite aspect of this product?

Endpoint Monitoring: Monitors user activity on endpoints, including file access, network traffic, and application usage. Network Monitoring: Monitors network traffic for suspicious activity indicative of insider threats. Email Monitoring: Monitors email activity for data exfiltration attempts and other suspicious behavior. User Activity Monitoring: Tracks user activity across various platforms and applications to identify anomalies. User and Entity Behavior Analytics (UEBA): Analyzes user and entity behavior patterns to identify potential insider threats.

What do you dislike most about this product?

Cost: Compared to some competitors, Proofpoint ITM might have a higher price point, especially for larger organizations. Implementation Complexity: Setting up and configuring the solution can be complex, requiring technical expertise. False Positives: Extensive monitoring might lead to false positives that require manual investigation, impacting operational efficiency. Privacy Concerns: Monitoring user activity raises privacy concerns, requiring careful policy and implementation to maintain compliance. Limited Customization: While offering flexibility, advanced users might desire more in-depth customization options.

Pros

  • Helps Innovate
  • Reliable
  • Performance Enhancing
  • Enables Productivity