91制片厂

Latest 91制片厂


This content is currently locked.

Your current 91制片厂 subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-703-340-1171 (International)
Proofpoint ITM Logo
Proofpoint ITM Logo
Proofpoint

Proofpoint ITM

Composite Score
8.0 /10
CX Score
8.5 /10
Category
Proofpoint ITM
8.0 /10

What is Proofpoint ITM?

As the leading people-centric Insider Threat Management (ITM) solution, Proofpoint鈥檚 ITM protects against data loss and brand damage involving insiders acting maliciously, negligently, or unknowingly. Proofpoint correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data breaches, and accelerate security incident response.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Proofpoint ITM Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

91 Likeliness to Recommend

100 Plan to Renew

96 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+99 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Proofpoint ITM?

0% Negative
0% Neutral
100% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Feature Ratings

Average 87

Behavioral Triggers

96

Forensic Investigation Capability

96

Risk Scoring

91

Integration

91

Vulnerability Scanning

87

Alerts and Responses

87

Logging and Monitoring

87

Data Loss Prevention

87

Machine Learning

83

User Privacy

83

Policy Enforcement

83

Vendor Capability Ratings

Average 85

Quality of Features

96

Ease of Implementation

91

Ease of Data Integration

91

Usability and Intuitiveness

90

Ease of IT Administration

87

Breadth of Features

84

Business Value Created

83

Product Strategy and Rate of Improvement

79

Ease of Customization

78

Availability and Quality of Training

78

Vendor Support

74

Proofpoint ITM Reviews

SMARANIKA H.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Initial Implementation
Validated Review
Verified Reviewer

Submitted Feb 2024

Extensive monitoring capabilities

Likeliness to Recommend

9 /10

What differentiates Proofpoint ITM from other similar products?

Extensive Monitoring: Captures and analyzes user activity across various endpoints, applications, and networks. Advanced Threat Detection: Employs machine learning, behavioral analysis, and anomaly detection to identify suspicious activities. Data Loss Prevention (DLP): Prevents sensitive data exfiltration through content-aware and contextual policies. User and Entity Behavior Analytics (UEBA): Analyzes user and entity behavior patterns to identify potential insider threats. Investigation Tools: Provides tools for investigating potential incidents and gathering evidence. Cloud-Based Delivery: Offers scalability and ease of deployment.

What is your favorite aspect of this product?

Endpoint Monitoring: Monitors user activity on endpoints, including file access, network traffic, and application usage. Network Monitoring: Monitors network traffic for suspicious activity indicative of insider threats. Email Monitoring: Monitors email activity for data exfiltration attempts and other suspicious behavior. User Activity Monitoring: Tracks user activity across various platforms and applications to identify anomalies. User and Entity Behavior Analytics (UEBA): Analyzes user and entity behavior patterns to identify potential insider threats.

What do you dislike most about this product?

Cost: Compared to some competitors, Proofpoint ITM might have a higher price point, especially for larger organizations. Implementation Complexity: Setting up and configuring the solution can be complex, requiring technical expertise. False Positives: Extensive monitoring might lead to false positives that require manual investigation, impacting operational efficiency. Privacy Concerns: Monitoring user activity raises privacy concerns, requiring careful policy and implementation to maintain compliance. Limited Customization: While offering flexibility, advanced users might desire more in-depth customization options.

Pros

  • Helps Innovate
  • Reliable
  • Performance Enhancing
  • Enables Productivity
Visit our IT鈥檚 Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171