Listing Thumbnail

    Proofpoint Security

     Info
    Sold by: Proofpoint 
    Deployed on AWS
    Vendor Insights
    The leader in Human-Centric cybersecurity. 87 of the Fortune 100 trust Proofpoint to stop human-targeted attacks, safeguard their data and make their people more resilient. It prevents today's advanced email attacks, provides actionable visibility, and automated remediation that effectively stops threats while increasing your operational efficiencies. Proofpoint helps organizations break the attack chain by protecting data, investigating insiders, and blocking cloud threats. Our platform addresses the full spectrum of data loss scenarios by providing a holistic view across channels in a cloud-native interface and combining content, behavior, and threat telemetry.
    4.6

    Overview

    Play video

    'Proofpoint People Protection Platform' is an AI-driven solution that protects your people from modern email and cloud-based threats. The solution provides actionable visibility to help you understand your attack surface - who is most attacked, what threats are targeting them, and which suppliers pose the greatest risk. These insights enable you to prioritize risk mitigation controls.

    Proofpoint empowers you to effectively protect against multiple threats - phishing, credential theft, ransomware, BEC, cloud account takeover, and compromised supplier accounts. By stopping more email security threats before they enter your organization, security teams have fewer incidents to manually triage and manage. Automated remediation enables consistent, scalable incident response to sophisticated email attacks - thereby increasing the operational effectiveness of your security teams.

    'Proofpoint Information Protection Platform' prevents data loss and insider threats posed by careless, compromised and malicious employees by providing contextualized insights into content, behavior, and threats from a single cloud-native console, saving time and operational costs. As a result, organizations can defend their data, minimize financial risk and achieve operational efficiencies.

    With Proofpoint, organizations can correlate user activity and threat insights with data movement to prevent and respond to data loss incidents and insider threats in real time. Security teams can gain a holistic view of user interaction across cloud, email, endpoint, and web in a centralized dashboard. Proofpoint protects user privacy by anonymizing user data, masking content snippets and managing regional data residency.

    Learn more about Proofpoint packages: https://www.proofpoint.com/us/products/packages 

    For pricing plans above 500 users, please reach out to: aws-sales@proofpoint.com 

    We recommend purchasing Proofpoint solutions via Private Offers. Please contact us at: <www.proofpoint.com/awsmarketplace >

    Highlights

    • Unparalleled Efficacy & Visibility - Detect more threats more accurately; Know who is being attacked and how.
    • Unified Context - Gain context between data, behavior and threats. Understand user interaction across cloud, email, endpoint, and web.
    • Operational Efficiency - Reduce your team's workload; Streamline investigations while maintaining user privacy.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Proofpoint Security

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    People Protection
    500 users: Core (P0) email security package
    $96,000.00
    Information Protection
    500 users: DLP Transform (incl. endpoint DLP, cloud DLP, SaaS isolation, ITM)
    $176,000.00

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Pre-sales email support is offered Monday-Friday during normal business hours (aws-sales@proofpoint.com ) EMEA: +44 141 471 9131 | APAC: +61 1800 450 452 | US: +1 408 752 5432

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Proofpoint
    By Check Point Software Technologies

    Accolades

     Info
    Top
    10
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    AI-Driven Threat Detection
    Utilizes artificial intelligence to detect and prevent advanced email attacks, phishing, credential theft, ransomware, business email compromise, and cloud account takeover threats.
    Unified Cross-Channel Visibility
    Provides centralized dashboard with holistic view of user interaction and threat telemetry across cloud, email, endpoint, and web channels in a cloud-native interface.
    Automated Incident Response
    Enables automated remediation and consistent, scalable incident response to sophisticated email attacks with reduced manual triage requirements.
    Behavioral and Content Analysis
    Correlates user activity, behavior patterns, and content analysis with threat intelligence and data movement to identify and prevent data loss and insider threats in real time.
    Data Protection and Privacy Controls
    Implements anonymization of user data, content snippet masking, and regional data residency management to protect user privacy while defending against data loss scenarios.
    Multi-Platform Email and Collaboration Security
    Defense-in-depth security for Microsoft 365 and G-Suite, extending to collaboration environments including file sharing, chat, Slack, and Microsoft Teams
    Advanced Threat Detection and Sandboxing
    Advanced sandboxing and active-content analysis to scan files for malicious content and prevent phishing and malware propagation
    Data Loss Prevention with Context-Aware Policies
    Identification of confidential information with context-aware policy enforcement to prevent unauthorized data leakage of PCI, HIPAA, PII, and other protected content
    Comprehensive Email Scanning
    Scanning of inbound, outbound, and internal email traffic with threat quarantine capabilities before user download
    Cloud-Native Deployment
    One-click, cloud-enabled deployment without requiring proxy, appliance, or endpoint agent installation
    AI-Powered Threat Detection and Response
    Leverages AI engine to detect and block phishing, malware, ransomware, spear phishing, spam, and account takeover threats with both cloud email gateway and API-based inbox defense mechanisms.
    DMARC Authentication and Reporting
    Provides DMARC reporting with granular visibility and analysis of SPF/DKIM/DMARC configurations to prevent email domain fraud and spoofing while minimizing false positives.
    Post-Delivery Threat Hunting and Incident Response
    Enables threat hunting and incident response capabilities with automated malicious message removal and customizable response playbooks for post-delivery threat management.
    Anomalous Behavior Detection for Account Takeover Prevention
    Detects anomalous email behavior to identify compromised accounts and automatically removes fraudulent emails and malicious payloads sent from compromised accounts.
    Dual-Layer Email Protection Architecture
    Combines cloud email gateway and API-based inbox defense to provide pre- and post-delivery email security across multiple protection layers.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    595 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    76%
    23%
    1%
    0%
    1%
    3 AWS reviews
    |
    592 external reviews
    External reviews are from G2  and PeerSpot .
    reviewer2213301

    Email protection has reduced phishing incidents and keeps inboxes clean and secure

    Reviewed on Mar 03, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Proofpoint Enterprise DLP  is email filtering for both spam and malicious attachments and phishing.

    What is most valuable?

    The volume of things that it catches that are important is high. The benefit so far has been that we haven't had any serious compromises as a result of phishing attempts or malicious attachments that came through.

    It certainly keeps our users' inboxes clean.

    The fact that we haven't had any serious security incidents related to malicious attachments is a testament to the solution's impact on our organization positively.

    It saves us a good amount of time, which has impacted our team's workload and our organization's security posture overall.

    In my experience, the best feature of Proofpoint Enterprise DLP  is quarantine management, and the thoroughness of the solution is appreciated.

    What needs improvement?

    I have no complaints about how Proofpoint Enterprise DLP  can be improved.

    For how long have I used the solution?

    I have been using Proofpoint Enterprise DLP  for at least 10 years.

    What do I think about the stability of the solution?

    Proofpoint Enterprise DLP is stable.

    What do I think about the scalability of the solution?

    The scalability of Proofpoint Enterprise DLP hasn't been an issue so far.

    How are customer service and support?

    Customer service has been good so far, but I haven't had to address customer support for any issues.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution.

    How was the initial setup?

    I was not involved with the pricing, setup cost, or licensing. I am involved with managing the solution.

    What was our ROI?

    We have seen a return on investment from using Proofpoint Enterprise DLP, by virtue of how few incidents we have had related to email compromise.

    Which other solutions did I evaluate?

    I don't recall if I evaluated other options before choosing Proofpoint Enterprise DLP.

    What other advice do I have?

    If one is looking for a bulletproof solution, then Proofpoint Enterprise DLP is the answer.

    I feel confident enough in the solution's effectiveness in detecting and preventing threats through the analysis of email content and user behavior that I would choose to keep it, even if we switch to Microsoft E5 licenses, and we have had no incidents to speak of related to malicious attachments or malware infections.

    I don't really see the unified platform aspect of Proofpoint Enterprise DLP as unified. It's an additional layer, and we are okay with that additional layer of security.

    Jeff M.

    Bulletproof Email Security, Easy Setup

    Reviewed on Mar 02, 2026
    Review provided by G2
    What do you like best about the product?
    I use Proofpoint Core Email Protection to protect all incoming emails, and it does a great job of eliminating spam, phishing, viruses, and impersonation emails along with malicious links. I really appreciate the complete software package that makes our email much more secure. I also like that it allows for phishing simulations to test our users, which saves us from having to buy a separate software package. Setting up Proofpoint Core Email Protection was very easy, which was a big plus for us.
    What do you dislike about the product?
    Nothing
    What problems is the product solving and how is that benefiting you?
    I use Proofpoint Core Email Protection to protect all incoming emails. It eliminates spam, phishing, viruses, and impersonation emails, as well as malicious links.
    reviewer2805579

    Data protection has strengthened email monitoring and prevents sensitive information leaks

    Reviewed on Feb 28, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Proofpoint Enterprise DLP  is helping us monitor who is doing what and who is sharing data over emails, whether within the organization or outside the organization. The most primary use case is securing our data and ensuring customer confidential information is not shared outside the organization.

    One classic example is tracking whether any PII information, such as Aadhaar card numbers, account numbers, employee IDs, or professional email addresses in India, are being shared outside the organization.

    Proofpoint Enterprise DLP  provides many out-of-the-box use cases and best practices which help us utilize those and, to some extent, edit them as per our requirements to segregate the data.

    What is most valuable?

    Data recovery and classification is valuable, as it classifies where sensitive data such as PII information, IP, or financial data lives and helps classify it according to the data segregation or data category it falls into.

    It has helped us tremendously to ensure our esteemed customers that whatever data our SMEs, security practice team, or SecOps team uses or may access from their customer data is being kept safe with us and is not being shared across the organization or outside the organization. That is one of the assurances we can give to customers while relying on Proofpoint Enterprise DLP .

    I have examples where a few team members or employees mistakenly, or maybe intentionally, shared customer data over email, and those were caught by Proofpoint Enterprise DLP . This triggers an alert to our security team, and they immediately investigate those emails and the data. That helps us educate our employees and set up awareness trainings for them so that they are aware of which data can be shared over email and which should not be.

    What needs improvement?

    Currently, it seems to have all the features enabled. However, if Proofpoint could create some custom or out-of-the-box dashboards which help the organization, or CIO or CISO-level people, to get a view of how much data is being shared within a week or month, they could plan internal trainings or speak to their cybersecurity teams to improve the security posture or the use cases they have deployed.

    Custom or out-of-the-box dashboards for CIO or CXO level people would help more.

    For how long have I used the solution?

    I have been in cybersecurity for ten years since 2016.

    What do I think about the stability of the solution?

    Proofpoint Enterprise DLP is quite stable. I have not seen any downtime or anything of that nature.

    What do I think about the scalability of the solution?

    Proofpoint Enterprise DLP is scalable and configurable and can support any kind of infrastructure and any kind of networks. Scalability-wise, Proofpoint Enterprise DLP is fine.

    How are customer service and support?

    Customer support is excellent. They provide support as per the SLAs they have, depending upon the situation and depending upon the case we open with them. Support is perfectly fine.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We are using Proofpoint Enterprise DLP currently. We did not work on another solution and migrate to Proofpoint.

    How was the initial setup?

    Integrations, support, and other things are easy to use, more user-friendly and architect-friendly. I do not have anything to add.

    What about the implementation team?

    We do have a partnership or alliance team who help us in setting up, initiating discussions, or taking them to the final stage or the solutioning stage.

    What was our ROI?

    The return on the investment is in securing the organization data, training the people, and making sure that the data which lies with our organization or our department is safe.

    What's my experience with pricing, setup cost, and licensing?

    The market value or market standard which Proofpoint holds means the cost is as per the services they offer. The licensing model is perfectly fine.

    Which other solutions did I evaluate?

    We did not explore other options because we know what kind of services or assurance Proofpoint gave customers, so we chose Proofpoint directly.

    What other advice do I have?

    Based on our experience and my experience, I usually prefer to recommend Proofpoint Enterprise DLP to customers and friends who are working in other organizations. I convince them with the level of services or level of assurance we are getting from Proofpoint Enterprise DLP. I share my experience with them to encourage them to opt for Proofpoint Enterprise DLP. I would rate this product a nine out of ten.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Andrew Lachica

    Visibility into sensitive email patterns has improved while policy templates still need work

    Reviewed on Feb 28, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Proofpoint Enterprise DLP  is to protect sensitive information such as Canadian IDs, such as SIN.

    A specific example of how I use Proofpoint Enterprise DLP  to protect information such as Canadian IDs or SIN is when Proofpoint detects an email that is being sent externally and there's information containing SIN. Proofpoint performs automated encryption for the email.

    I have plans to use Proofpoint Enterprise DLP  to prohibit corporate emails from getting leaked out to people's personal email.

    What is most valuable?

    I'm not sure yet what the best features of Proofpoint Enterprise DLP  are.

    Detailed reporting and automated encryption stand out to me among the features mentioned, such as automated encryption, advanced content detection, unified policy management, and detailed reporting.

    Detailed reporting and automated encryption have helped me because, since our DLP is on monitoring mode, the reporting helps us check how many users are currently sending emails with sensitive information.

    Proofpoint Enterprise DLP has had a positive impact on my organization by providing benefits for visibility at this time.

    The visibility I get is mainly about seeing users who send sensitive data.

    What needs improvement?

    I think Proofpoint Enterprise DLP could be improved by including templates.

    My main suggestion for needed improvements is the inclusion of DLP template policies which cater to the Canadian landscape.

    For how long have I used the solution?

    I have been working in my company since 2014.

    What do I think about the stability of the solution?

    Proofpoint Enterprise DLP is stable.

    What do I think about the scalability of the solution?

    I have no comment on the scalability of Proofpoint Enterprise DLP.

    How are customer service and support?

    The customer support for Proofpoint Enterprise DLP is very good.

    I would rate the customer support a 10 on a scale of 1 to 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution for DLP.

    How was the initial setup?

    Proofpoint Enterprise DLP is deployed in my organization using Proofpoint Cloud.

    What was our ROI?

    I have not seen a return on investment with Proofpoint Enterprise DLP as we are still on monitoring mode.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing Proofpoint Enterprise DLP.

    What other advice do I have?

    The effectiveness of Proofpoint Enterprise DLP helps us learn the behavior of a user over time, allowing us to distinguish if the user is committing certain scenarios that are not beneficial for the company.

    The unified platform aspect of Proofpoint Enterprise DLP is important for my organization, but we still don't have that.

    My advice to others looking into using Proofpoint Enterprise DLP is that they should evaluate it thoroughly.

    reviewer2805540

    Adaptive protection has prevented data leaks and reduces manual effort for sensitive email handling

    Reviewed on Feb 27, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Proofpoint Enterprise DLP  is to block business data from getting misused, for example, in case of a phishing email or when there are cloud applications that need to be protected, and for compliance purposes.

    A specific example of how I have used Proofpoint Enterprise DLP  to block business data or protect cloud applications involves integrating with SOAR  tools like ServiceNow , which helps in speeding up the investigation and response times, generates a threat summary to provide automated summaries of complex threats, and protects teams or, for example, Zoom calls using secure collaboration tools by scanning malicious content, URLs, and file sharing.

    What is most valuable?

    The best features Proofpoint Enterprise DLP  offers so far have been related to SOAR  tools and the summary. The adaptive email feature helps in identifying if a user is sending sensitive information to the wrong recipient, which is a good example I would like to highlight, along with the ability to identify unique custom identifiers for my business and to obtain specific account numbers or internal ID formats.

    The adaptive email feature helps me in tracking and automatically identifying if a user is sending sensitive information to the wrong recipient and provides real-time warning banners to nudge users when they are about to make a mistake or reduce accidental data loss.

    Proofpoint Enterprise DLP  has positively impacted my organization by tracking emails and preventing data leaks.

    What needs improvement?

    Proofpoint Enterprise DLP is currently very good. It could become more user-friendly for someone who is not from the DLP field and could also help someone from a finance domain by integrating it with other domains as well.

    For how long have I used the solution?

    I have been using Proofpoint Enterprise DLP for one year. With my previous employer, I used it frequently. Here , it is not as frequent because my current organization does not have extensive usage, but for my own projects and a business I am doing, I use it.

    What do I think about the stability of the solution?

    Proofpoint Enterprise DLP is stable.

    What do I think about the scalability of the solution?

    The scalability is pretty decent and able to scale almost everything for the purpose it serves.

    How are customer service and support?

    Customer support is good with a quick response and great feedback. On a scale of one to ten, I would rate the customer support around an eight because they have been very helpful whenever the need arose.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used a different solution, but I cannot disclose this due to confidentiality.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing was straightforward. Pricing was relatively higher, but it was still worth it.

    What about the implementation team?

    I have seen a return on investment. Fewer employees are needed now, and the team has been reduced in number, so time and money have both been saved.

    What was our ROI?

    I have seen a return on investment. Fewer employees are needed now, and the team has been reduced in number, so time and money have both been saved.

    Which other solutions did I evaluate?

    I evaluated other options before choosing Proofpoint Enterprise DLP, but I cannot disclose the options.

    What other advice do I have?

    The technology and tool are very useful for my organization, and I do not have many complaints about it.

    Proofpoint Enterprise DLP will help me in identifying data leaks and ensuring that sensitive information stays within the organization.

    Adaptive information protection has influenced my organization's approach to data security to a great extent, and most of the data remains secure.

    The unified platform aspect of Proofpoint Enterprise DLP is very important for my organization because it is sensitive to data leaks, and I deal with data-sensitive information.

    Monitoring problematic copilot use is a good opportunity to explore.

    My advice to others looking into using Proofpoint Enterprise DLP is to know the tool first and then explore other options and compare. Proofpoint is definitely the best.

    View all reviews