“Proofpoint helped us perform a spam audit, which gave us quantitative data on exactly how much spam we were receiving. That data played a critical role in helping management understand how necessary it was to invest in anti-spam technology. It also helped eliminate any risk or uncertainty from the purchasing process.”
“With Proofpoint Essentials, securing email is not a treasure hunt anymore. The conversation is past basic tracking questions and is now about what we do with it. Our efforts have become much more fruitful since implementing Proofpoint Essentials.”
"We knew we had a growing spam issue but the precise scope of the problem was not apparent until we had the Proofpoint Messaging Security Gateway in place. Only then did we have the benchmarking and reporting tools to determine that upward of 50% of our 15,000-20,000 daily message volume was junk."
“Since deploying Proofpoint, we haven’t had a lot of noise. It has blocked a lot of spam and a lot of phish, and other unwanted emails.”
“We needed not only the tool set and the auditing capabilities for our email security, but guidance from somebody who understood it. With Proofpoint, we get both. This gives us confidence when speaking to our business stakeholders.”
“Proofpoint has enabled us to get ahead of some threat campaigns very early and thwart them before they could go any further. Our lead SOC analyst just told me how glad he was that we were able to catch a recent threat early, because we could have easily been among the many victims of a ransomware attack.”
“With Proofpoint, we can deliver security training that is aligned with our different environments and cultures. We can also stay up to date with the latest email protection capabilities. As a result, we can protect our environment and grow and sustain our knowledge.”
“To my knowledge, since we put in the Proofpoint suite we’ve never been breached, and we’ve never had anything run amok inside our network. With Proofpoint, I have peace of mind in knowing the solution is doing a really good job stopping the latest threats.”
“Before we deployed Proofpoint, BEC attacks were fairly common in our organization, and were noted at the board level. Since our investment in a Proofpoint gateway in front of our email, we have substantially reduced them in a way that is visible to our CEO.”
“Like many similar institutions, the university has seen a drastic rise in phishing attacks across the board. Proofpoint has helped us greatly improve our email security by increasing our visibility and blocking capabilities. And given that more than 90% of malware is distributed via email, Proofpoint has proven to be a vital resource and toolset for us.”
“We are confident that Proofpoint is considerably more accurate and efficient than our previous system at discovering and real blocking email threats. The time we spend validating email is now a fraction of what it was. Proofpoint is a much more automated system, which allows us to spend our time more effectively.”
“Proofpoint Email Protection is great, and the quarterly checkups and level of engagement we have with the company are also key. I get questions from my manager from time to time, and having someone available that I can call and talk to is important.”
“Proofpoint simply delivers better email security. It captures more problems, it’s more automated, and it provides a much more integrated solution. The way Proofpoint Security Awareness Training integrates with Proofpoint Targeted Attack Protection and Proofpoint Threat Response Auto-Pull gives us a powerful technical solution and an improved process for risk reduction.”
“Getting our email domains to ‘reject’ policy was something that I’ve wanted to do for years, and having a solution in Proofpoint Email Fraud Defense that enabled us to do that in a relatively quick time was great. I was really happy with the process.”
“We were able to deploy a very complex set of technologies in a very short time. This is thanks to the expert skills of the Proofpoint Professional Services team. Not only are they experts in DLP, but they have an in-depth knowledge of how virtualization and network technologies operate, which has been valuable in helping us plan and operate our program.”