Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Proofpoint Security

Proofpoint

Reviews from AWS customer

3 AWS reviews

External reviews

592 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    reviewer2805579

Data protection has strengthened email monitoring and prevents sensitive information leaks

  • February 28, 2026
  • Review from a verified AWS customer

What is our primary use case?

Proofpoint Enterprise DLP is helping us monitor who is doing what and who is sharing data over emails, whether within the organization or outside the organization. The most primary use case is securing our data and ensuring customer confidential information is not shared outside the organization.

One classic example is tracking whether any PII information, such as Aadhaar card numbers, account numbers, employee IDs, or professional email addresses in India, are being shared outside the organization.

Proofpoint Enterprise DLP provides many out-of-the-box use cases and best practices which help us utilize those and, to some extent, edit them as per our requirements to segregate the data.

What is most valuable?

Data recovery and classification is valuable, as it classifies where sensitive data such as PII information, IP, or financial data lives and helps classify it according to the data segregation or data category it falls into.

It has helped us tremendously to ensure our esteemed customers that whatever data our SMEs, security practice team, or SecOps team uses or may access from their customer data is being kept safe with us and is not being shared across the organization or outside the organization. That is one of the assurances we can give to customers while relying on Proofpoint Enterprise DLP.

I have examples where a few team members or employees mistakenly, or maybe intentionally, shared customer data over email, and those were caught by Proofpoint Enterprise DLP. This triggers an alert to our security team, and they immediately investigate those emails and the data. That helps us educate our employees and set up awareness trainings for them so that they are aware of which data can be shared over email and which should not be.

What needs improvement?

Currently, it seems to have all the features enabled. However, if Proofpoint could create some custom or out-of-the-box dashboards which help the organization, or CIO or CISO-level people, to get a view of how much data is being shared within a week or month, they could plan internal trainings or speak to their cybersecurity teams to improve the security posture or the use cases they have deployed.

Custom or out-of-the-box dashboards for CIO or CXO level people would help more.

For how long have I used the solution?

I have been in cybersecurity for ten years since 2016.

What do I think about the stability of the solution?

Proofpoint Enterprise DLP is quite stable. I have not seen any downtime or anything of that nature.

What do I think about the scalability of the solution?

Proofpoint Enterprise DLP is scalable and configurable and can support any kind of infrastructure and any kind of networks. Scalability-wise, Proofpoint Enterprise DLP is fine.

How are customer service and support?

Customer support is excellent. They provide support as per the SLAs they have, depending upon the situation and depending upon the case we open with them. Support is perfectly fine.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using Proofpoint Enterprise DLP currently. We did not work on another solution and migrate to Proofpoint.

How was the initial setup?

Integrations, support, and other things are easy to use, more user-friendly and architect-friendly. I do not have anything to add.

What about the implementation team?

We do have a partnership or alliance team who help us in setting up, initiating discussions, or taking them to the final stage or the solutioning stage.

What was our ROI?

The return on the investment is in securing the organization data, training the people, and making sure that the data which lies with our organization or our department is safe.

What's my experience with pricing, setup cost, and licensing?

The market value or market standard which Proofpoint holds means the cost is as per the services they offer. The licensing model is perfectly fine.

Which other solutions did I evaluate?

We did not explore other options because we know what kind of services or assurance Proofpoint gave customers, so we chose Proofpoint directly.

What other advice do I have?

Based on our experience and my experience, I usually prefer to recommend Proofpoint Enterprise DLP to customers and friends who are working in other organizations. I convince them with the level of services or level of assurance we are getting from Proofpoint Enterprise DLP. I share my experience with them to encourage them to opt for Proofpoint Enterprise DLP. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2805540

Adaptive protection has prevented data leaks and reduces manual effort for sensitive email handling

  • February 27, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Proofpoint Enterprise DLP is to block business data from getting misused, for example, in case of a phishing email or when there are cloud applications that need to be protected, and for compliance purposes.

A specific example of how I have used Proofpoint Enterprise DLP to block business data or protect cloud applications involves integrating with SOAR tools like ServiceNow, which helps in speeding up the investigation and response times, generates a threat summary to provide automated summaries of complex threats, and protects teams or, for example, Zoom calls using secure collaboration tools by scanning malicious content, URLs, and file sharing.

What is most valuable?

The best features Proofpoint Enterprise DLP offers so far have been related to SOAR tools and the summary. The adaptive email feature helps in identifying if a user is sending sensitive information to the wrong recipient, which is a good example I would like to highlight, along with the ability to identify unique custom identifiers for my business and to obtain specific account numbers or internal ID formats.

The adaptive email feature helps me in tracking and automatically identifying if a user is sending sensitive information to the wrong recipient and provides real-time warning banners to nudge users when they are about to make a mistake or reduce accidental data loss.

Proofpoint Enterprise DLP has positively impacted my organization by tracking emails and preventing data leaks.

What needs improvement?

Proofpoint Enterprise DLP is currently very good. It could become more user-friendly for someone who is not from the DLP field and could also help someone from a finance domain by integrating it with other domains as well.

For how long have I used the solution?

I have been using Proofpoint Enterprise DLP for one year. With my previous employer, I used it frequently. Here, it is not as frequent because my current organization does not have extensive usage, but for my own projects and a business I am doing, I use it.

What do I think about the stability of the solution?

Proofpoint Enterprise DLP is stable.

What do I think about the scalability of the solution?

The scalability is pretty decent and able to scale almost everything for the purpose it serves.

How are customer service and support?

Customer support is good with a quick response and great feedback. On a scale of one to ten, I would rate the customer support around an eight because they have been very helpful whenever the need arose.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used a different solution, but I cannot disclose this due to confidentiality.

How was the initial setup?

My experience with pricing, setup cost, and licensing was straightforward. Pricing was relatively higher, but it was still worth it.

What about the implementation team?

I have seen a return on investment. Fewer employees are needed now, and the team has been reduced in number, so time and money have both been saved.

What was our ROI?

I have seen a return on investment. Fewer employees are needed now, and the team has been reduced in number, so time and money have both been saved.

Which other solutions did I evaluate?

I evaluated other options before choosing Proofpoint Enterprise DLP, but I cannot disclose the options.

What other advice do I have?

The technology and tool are very useful for my organization, and I do not have many complaints about it.

Proofpoint Enterprise DLP will help me in identifying data leaks and ensuring that sensitive information stays within the organization.

Adaptive information protection has influenced my organization's approach to data security to a great extent, and most of the data remains secure.

The unified platform aspect of Proofpoint Enterprise DLP is very important for my organization because it is sensitive to data leaks, and I deal with data-sensitive information.

Monitoring problematic copilot use is a good opportunity to explore.

My advice to others looking into using Proofpoint Enterprise DLP is to know the tool first and then explore other options and compare. Proofpoint is definitely the best.


    Fernando

Data protection has stopped insider leaks and now secures confidential information daily

  • February 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Proofpoint Enterprise DLP is monitoring and protecting my company's data, including preventing accidental leaks and monitoring insider threats.

Currently, when making a policy with Proofpoint Enterprise DLP, I create different policies. Recently, there was a leakage incident where an insider threat tried to send confidential data to someone who does not belong to the company, and we caught it. We received an alert in the system, and we apprehended the individual.

I believe every service that Proofpoint Enterprise DLP provides is useful for my company. Policy creation is the particular feature I rely on the most with Proofpoint Enterprise DLP.

What is most valuable?

The unified platform aspect of Proofpoint Enterprise DLP is really important for our company because it protects confidential data. Adaptive information protection with Proofpoint Enterprise DLP has changed how we handle sensitive data and respond to threats, allowing us to block sensitive data if it is being shared with external persons.

As an analyst, using Proofpoint Enterprise DLP is very easy. Any beginner can learn the features because the user interface is very easy to understand and work with. I really love Proofpoint Enterprise DLP.

The dashboard of Proofpoint Enterprise DLP is great, and I really love it.

What needs improvement?

Integrating an AI agent along with human oversight could improve Proofpoint Enterprise DLP.

For how long have I used the solution?

I have been working for about a year in my current field.

What do I think about the stability of the solution?

Proofpoint Enterprise DLP was flexible and stable, and I did not have issues with downtime or reliability.

What do I think about the scalability of the solution?

The scalability of Proofpoint Enterprise DLP is good, and it can handle growth and changing needs easily.

How are customer service and support?

The customer support for Proofpoint Enterprise DLP is very responsive and helpful. I would rate the customer support of Proofpoint Enterprise DLP a ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a different solution, and I am not sure because I was a fresher and have only worked on Proofpoint Enterprise DLP.

I did not evaluate other options before choosing Proofpoint Enterprise DLP.

How was the initial setup?

Using Proofpoint Enterprise DLP has definitely secured my company and its data. I cannot think of any specific outcomes or changes I have noticed.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing was straightforward, and I did not face any challenges.

What other advice do I have?

Without a doubt, you can just go for Proofpoint Enterprise DLP because it is flexible and any newcomer can really explore it. It is very easy to learn and interesting as well.

I rate this product a nine out of ten.


    reviewer2805108

Email defenses have blocked thousands of targeted threats and protect sensitive data daily

  • February 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

I have been using Proofpoint Enterprise DLP at my company for the last two or three years. When I joined, the organization was already using Proofpoint. I really appreciate it for the email security and their TRAP module and TAP dashboard, which provide pre-delivery or post-delivery protection. I value the post-delivery protection and all of the modules that Proofpoint provides.

Currently, I am using Proofpoint Enterprise DLP specifically for email security. I am planning to explore whether we can use it for data security, as I was not previously aware of that capability. In today's session, I learned about how we can use Proofpoint Enterprise DLP for data security, but currently, we are using it for email security only. We use it to find sensitive data in email and to restrict that sensitive data from being forwarded to external email accounts, thus providing email security.

Basically, I am using Proofpoint Enterprise DLP from the email security perspective. I use it to find sensitive data to ensure that no SIN numbers, credit card information, or other sensitive information is shared with external parties or unauthorized users. We have created rules in our email system so that users cannot forward company email to personal email accounts. This type of security has been implemented in Proofpoint.

I recommend using Proofpoint Enterprise DLP for email security because we have already successfully used it for that purpose. I would also want to use it for data security to have a better experience. My experience with email security has been really good, as it blocks thousands of emails, whether they are Business Email Compromise, confidential credential compromise threats, telephone-oriented attack delivery, or ransomware attacks. It protects us from thousands of attacks, and I really recommend this tool to others.

What is most valuable?

First, I really appreciate the dashboard. Proofpoint Enterprise DLP dashboard clearly provides me with a proper explanation of whether a user clicked a malicious link or not and how many emails we have received. If we see one alert that a user clicked on a malicious link and the malicious email was delivered to the user's inbox, we can check in the dashboard how many total malicious emails have been delivered in our environment. Another feature I appreciate is that if a malicious email is delivered to the user's inbox, Proofpoint Enterprise DLP TRAP dashboard, if in the sandbox environment the email is later considered as malicious, Proofpoint Enterprise DLP TRAP pulls that email from the user's inbox if the user has not opened that email and deletes that email from the user's inbox. I really value that quality. Additionally, we can use Proofpoint Enterprise DLP TRAP dashboard to quarantine the email from the user's inbox if the user reports an email. Another feature I appreciate is that sometimes if a user clicks a malicious link, we have the option in Proofpoint Enterprise DLP to automatically disable that user's account. We do not need to worry if a user clicked a malicious link at night, as Proofpoint Enterprise DLP automatically disables that account.

I have already explained the Proofpoint Enterprise DLP Protection Server, Proofpoint Enterprise DLP TRAP module, and Proofpoint Enterprise DLP TAP dashboard, and how we can have a unified view if a user clicked any link and how many emails are currently delivered in our account if those emails are malicious, how we can pull that email from the user's inbox, and how we can automatically disable that account if the account gets compromised. I really value these features.

Personally, I believe that Proofpoint Enterprise DLP really adds value among all of the security tools we are currently using in our organization. This is my honest opinion because I really appreciate the support that Proofpoint Enterprise DLP provides and how many malicious emails are blocked by Proofpoint Enterprise DLP, such as Business Email Compromise attack, telephone-oriented attack delivery, and other ransomware attacks. Proofpoint Enterprise DLP categorizes these emails and blocks them automatically in the sandbox environment. I really find it valuable and I believe that during the day, we block thousands of emails, which keeps our organization secure.

Frankly speaking, I currently do not remember the specific metrics, but I know that when I provide a report to my senior management from the last thirty days or a quarterly report, I categorize how many Business Email Compromise attacks, how many telephone-oriented attacks, and how many ransomware attacks have occurred. From the data from the last ninety days, there are approximately three thousand five hundred to three thousand seven hundred emails blocked that are Business Email Compromise attacks that are automatically blocked by Proofpoint Enterprise DLP.

I have not worked directly with a Proofpoint Enterprise DLP support engineer account manager. My manager has worked with that. Proofpoint Enterprise DLP definitely has a higher cost compared to other email security tools, but some good solutions come at a cost. The cost value corresponds with their functionality, but the cost is definitely more compared to other tools.

What needs improvement?

I would now like to use Proofpoint Enterprise DLP for data security. Since we are currently using it for email security only, I would like to expand to data security. In today's session, I learned that Proofpoint Enterprise DLP can be used for data security and for human-centric AI. I would like to use that module in our organization if possible.

The user interface is quite good and the dashboard is really good. Regarding the support that Proofpoint Enterprise DLP provides, that is already good. I would want to know if we can use it for data security and for Active Directory accounts. For example, if someone tries to log in suspiciously, that account should be automatically disabled. Additionally, if we can use Proofpoint Enterprise DLP data security on the file server, and if users try to encrypt the files, it will detect that and generate an alert, that would be helpful.

I have already explained that I have had a very good experience with Proofpoint Enterprise DLP. I am satisfied with the customer support and with the email security. I am also satisfied with the dashboard.

For how long have I used the solution?

I have been working at the Town of Milton since last year.

What do I think about the stability of the solution?

Regarding the effectiveness of Proofpoint Enterprise DLP, it is really good in cases of email security and analyzing user behavior. If an email is delivered to the user's inbox, I can check whether the user clicked a link or not. I can check in Proofpoint Enterprise DLP TAP dashboard whether the user clicked a malicious link or not and whether there is an effect on the user system by clicking the malicious link. It also automatically blocks that sender if the sender is malicious. I really value that feature.

What do I think about the scalability of the solution?

Proofpoint Enterprise DLP's scalability is good and we do not have any issues with that.

How are customer service and support?

The unified platform is really important to find the root cause of the issue, such as how the problem arises, when the user clicked a link, how many users received the malicious email, and what the impact is. To find the root cause and to analyze the attack pattern on how it is entering our environment is really helpful with a unified view.

I am not aware of the Autolearn classifier because perhaps my other team members are working on that. They are the ones configuring Proofpoint Enterprise DLP servers. I do not have any information about this. I am basically checking the alerts and how the email is delivered to the user's inbox.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I do not have any information about previous solutions because I have been working in the organization for the last year, and when I joined, the organization was already using Proofpoint Enterprise DLP.

How was the initial setup?

Previously Proofpoint Enterprise DLP was on-premises. Now we have migrated it to the cloud. Currently, we are in the process of migration and we have almost completed the migration to the cloud. Only the outgoing bound emails are still on-premises, and we will shortly move those into the cloud.

What about the implementation team?

The team evaluated other options as well before starting to use Proofpoint Enterprise DLP, but when they started using it, I was not yet in the organization. So I do not know which tools they evaluated, but they definitely evaluated other tools as well.

What's my experience with pricing, setup cost, and licensing?

I do not have any information about the investment because I am working on the security alerts and security metrics.

What other advice do I have?

I have provided my feedback on Proofpoint Enterprise DLP and I give this product a rating of ten out of ten.


    reviewer2804901

Data protection has enabled confident blocking of patient records while policies stay intuitive

  • February 24, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Proofpoint Enterprise DLP involved determining what classification solutions were in place in a couple of projects that we worked on, but the most important aspect was the critical data for the business, and building controls around those data sets and applying those policies was straightforward with Proofpoint compared to other solutions.

It was more about a medical institution that we were trying to help, and for that particular entity, the patient information was critical. The way Proofpoint Enterprise DLP allowed us to build the policies around protecting the data was straightforward and intuitive.

My main use case was around health data, and we knew where exactly the data was sitting. The kind of access towards that data on the communications part or the transfer of the data is where Proofpoint Enterprise DLP really helped.

What is most valuable?

The best features Proofpoint Enterprise DLP offers include the ease of building rule sets, which is quite intuitive, and comprehensive policies for the data sets and the channels. The way we were able to implement it was easy and testable, so I do believe that is the best feature of the product itself.

When I say the rule building process in Proofpoint Enterprise DLP was intuitive and testable, it made life quite easy while guiding us through the process, such as when you have the source, what to apply, and the kind of action you want to take, including alerting sets. It is quite elaborate compared to other solutions, giving you the absolute control that you require.

Being from the consultant side, I can say that the customer was really happy with Proofpoint Enterprise DLP as is. They had a previous solution that never moved into absolute blocking mode, but with this solution and the rule sets that we were able to build for them, we were able to build it out, and I would say within six to eight months, they moved into a proper blocking mode. So it's a win, because DLP solutions tend to drag on for a long time.

The unified platform aspect of Proofpoint Enterprise DLP is very important for our organization, as the customer used the suite of Proofpoint products, making cross integrations really helpful between different product lines, though other integrations can sometimes be tough, especially with CASB aspects.

Adaptive policy enforcement in Proofpoint Enterprise DLP aids my analysts in responding to data risk with greater accuracy, as we received feedback five or six months after deployment that the adaptive features helped in identifying false positives. Once the learning curve was achieved, it was straightforward.

What needs improvement?

In terms of improvements, I find there are some blind spots in Proofpoint Enterprise DLP; you can obviously add more channels for detection, and logging can be much improved, specifying exactly what action took place or what alert was generated. There is a bit of ambiguity in that area. Apart from that, I am quite happy with the solution.

From a user experience standpoint, the UI in Proofpoint Enterprise DLP can be a bit better. Integration-wise, it would be great if the API or document API could work better with other integrations, as that is a place where we have found it a bit lacking.

For how long have I used the solution?

I have had worked with the solution on two deployments.

What do I think about the stability of the solution?

Proofpoint Enterprise DLP is stable.

What do I think about the scalability of the solution?

From a scalability standpoint, the multi-approach does help, as there are probes for multiple datasets across the domain, though having a single pane of glass to maintain all that would make it even better.

How are customer service and support?

The customer support for Proofpoint Enterprise DLP is good and it did help.

When rating customer support on a scale of one to ten, I say seven because anyone can improve all the time; customers can never be 100% satisfied, and as a customer I would expect support to handle queries within minutes.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

As a consultant, I have had exposure to multiple DLP solutions, including Proofpoint Enterprise DLP, in my previous work with Forcepoint. Comparatively to others, I have worked on two or three deployments, and it is a good product.

How was the initial setup?

As a consultant, I have experience integrating, and I find the ease of deployment of Proofpoint Enterprise DLP at least two times better than previous solutions.

What about the implementation team?

The customer who bought Proofpoint Enterprise DLP actually worked with the channel.

What was our ROI?

I have seen a return on investment.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing in Proofpoint Enterprise DLP was more about providing comparisons between products, and pricing negotiation was done by the customer, so I cannot talk much about it.

Which other solutions did I evaluate?

Before choosing Proofpoint Enterprise DLP, evaluating other options was my job as a consultant, where I would present different solutions to the customer, and it was up to him to choose which solution he wanted to go with.

What other advice do I have?

I assess the effectiveness of Proofpoint Enterprise DLP in detecting and preventing data loss through user behavior and content analysis, and I would say effectiveness is displayed in that they had a solution which they could never move to a blocking scenario; however, with Proofpoint Enterprise DLP they were able to do it. If the rule sets and data sets are not right, the customer would never have even gone to the blocking mode. It is a continuous process with false positives and negatives, and the solution helps a lot in figuring out what will not work, but there is a gap in pinning out exact problems with datasets.

We have used the auto-learned classifiers within Proofpoint Enterprise DLP, with around 60 to 70% accuracy, as we knew where the data is located, and while the crawlers helped, we faced some problems when different languages, such as Arabic, were in use, which was a challenge for us.

My advice to others looking into using Proofpoint Enterprise DLP is to understand the source they need to protect, then pick the solution that suits their environment and use case, understanding the product before buying. I would rate this product an 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Sudarsan Rajamani

Email data controls have reduced accidental leaks and support ongoing compliance monitoring

  • February 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

Proofpoint Enterprise DLP is used primarily to prevent unauthorized transmission of sensitive data through email, which remains one of the highest risk channels for data leakage. It is used to detect and block outbound emails containing PII, financial data, client confidential documents, HR records, intellectual property, and also apply policy-based controls such as encryption enforcement, quarantine for review, user notification for justification prompts, and blocking high-risk transmission. This is critically important for regulatory alignment like GDPR, DPDPA, HIPAA, where applicable, and client contractual obligations.

How has it helped my organization?

The most immediate and measurable impact has been a significant reduction in accidental data leakage. Before Proofpoint Enterprise DLP, users occasionally misaddressed emails, and sensitive attachments were sent without encryption, with limited visibility into outbound risks. After implementation, automatic detection and quarantine prevent misdirected financial and HR data, and encryption enforcement is now policy-driven instead of user-dependent. Sensitive transmissions are logged and reviewable, resulting in fewer reportable incidents and stronger control over outbound data channels.

Additionally, Proofpoint Enterprise DLP has improved visibility into insider behavior patterns, allowing the detection of bulk data transfers during employee transitions, identifying repeat policy violations, and escalating anomalous outbound behaviors early. This has strengthened HR off-boarding controls and reduced intellectual property risk. From a governance standpoint, Proofpoint Enterprise DLP has supported ISO 27001 control evidence, SOC 2 monitoring controls, client contractual data protection requirements, and reduced compliance friction through detailed audit logs and records.

Measurable improvements include a 35 to 60% reduction in accidental sensitive data transmission within the first 6 to 9 months. There is also a 70% reduction in misaddressed financial emails after enabling recipient domain-based policies. In terms of insider risk detection improvements, 100% visibility into bulk sensitive outbound emails has been achieved, resulting in a 40% reduction in high-risk data transfer attempts during employee off-boarding.

Regarding analyst efficiency and time saved, there is a 25 to 40% reduction in manual incident triage time, and automated encryption eliminates approximately 15 to 20 analyst hours per month previously spent on follow-up. Additionally, a 30% noise reduction has been realized after false positive tuning. Concerning compliance and audit outcomes, there are zero major audit findings related to outbound data handling, faster audit evidence generation that reduces preparation time by approximately 30%, and a clear mapping of Proofpoint Enterprise DLP controls to ISO 27001 Annex A and SOC 2 CC controls.

Proofpoint Enterprise DLP is a mature, reliable email-layer data protection solution that delivers strong value when implemented with proper governance. It is essential to recognize that it is a governance program, not just a tool. It is strong at email layer protection while emphasizing that integration is key to maximizing value, and real ROI comes from risk reduction. Future maturity would involve deeper contextual intelligence, broader cross-channel DLP unifications, and advanced executive reporting.

What is most valuable?

The top features of Proofpoint Enterprise DLP from an operational perspective include a rich, flexible detection engine that supports a range of methods such as pattern-based detection, exact data match, dictionary and proximity rules, regular expressions, and custom classifiers. The second feature is attachment and content inspection, which scans attachments across multiple formats including PDF, Word, Excel, and Zip, extracts text from images, and detects sensitive content in embedded objects. This matters because a large percentage of data loss attempts hide inside attachments.

The third feature is policy-driven automatic encryption, which triggers encryption when certain policy conditions are met, ensuring regulatory compliance and contractual obligations without burdening end users. The fourth feature is unified alerting and case management, which integrates with workflow tools for systematic alert routing, case creation, and prioritization of investigations. The fifth feature is outbound quarantine and block actions, where messages violating policies can be automatically quarantined or blocked. Finally, the sixth feature is a comprehensive reporting dashboard that provides trend analysis over time, department-level risk proofing, policy effectiveness metrics, and compliance evidence for auditors.

Integration that amplifies Proofpoint Enterprise DLP value includes SIEM and SOAR integration. Proofpoint natively integrates with leading SIEM tools such as Splunk, QRadar, Sentinel, and Elastic. DLP alerts flow into centralized analytics, and correlations with threat telemetry improve context. Automated playbooks via SOAR can remediate or enrich alerts, turning Proofpoint Enterprise DLP from a standalone policy engine into a security intelligence feed that enhances detection and response.

The second integration feature is its tight integration with the broader Proofpoint email security suite, where phishing threat detection signals feed into DLP risk thresholds, and score-based models of suspicious centers improve policy enforcement. The third integration involves enterprise classification and CASB, leveraging data tags for more precise matches. The fourth integration is with identity and access management solutions such as Azure AD, Okta, and Ping, which allows for adaptive controls based on user roles or risk scores.

What needs improvement?

Overall, Proofpoint Enterprise DLP is a strong platform, but there are areas for improvement to enhance usability and effectiveness. One challenge is policy complexity and lifecycle management. As DLP programs mature, policies become layered and interdependent, leading to frustrations such as rule overlap that causes multiple triggers on a single message. Limited visibility into policy hierarchy impacts, difficulty modeling how new rules interact with existing ones, and change management requiring careful validation can all be challenging.

An improvement opportunity would be advanced policy simulation tools for conflict detection between rules and clear rule precedence visualization, which would help understand the source of issues.

The administrator user experience can feel dense from an admin perspective, especially when managing multiple layered policies, handling rule precedence, troubleshooting overlapping triggers, and onboarding new administration. As DLP programs mature, policy environments become complex quickly. Improvement opportunities would include visual policy mapping, impact previews, easier bulk policy editing, simpler policy cloning with conflict detection, and smarter recommendations during policy creation that would be very beneficial.

Regarding data discovery and risk posture visibility, improvements are needed. While email layer protection is robust, organizations need better visibility across their repositories. There is an opportunity for built-in sensitive data discovery scanning and risk exposure mapping to identify which business units handle more sensitive data. A data movement visualization dashboard could also be beneficial, transitioning from reactive DLP blocking to proactive data exposure intelligence, which would significantly increase maturity.

For how long have I used the solution?

I've been using Proofpoint Enterprise DLP for almost over three years in a global SOC environment.

What do I think about the stability of the solution?

Proofpoint Enterprise DLP has been stable and reliable in our experience. Enforcement actions and integration perform consistently, with minimal technical disruptions.

What do I think about the scalability of the solution?

Proofpoint Enterprise DLP scales very well for enterprise environments due to its cloud-native architecture, which supports growth in users, policy complexity, integration volume, and data throughput without performance degradation. The primary scalability challenges involve operational governance, not the platform itself.

How are customer service and support?

Proofpoint customer support for Proofpoint Enterprise DLP is generally responsive, knowledgeable, and helpful, especially when backed by premium support or an assigned technical account manager. This enhanced support improves resolution speed and overall experience for critical enterprise deployments.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

A different DLP solution was previously used. While it provided baseline content detection capabilities, the transition to Proofpoint Enterprise DLP was made to improve integrations with the email security ecosystems. Enhanced enforcement consistency and streamlined operational management were sought, with other motivations including better policy precision, compliance alignment, and strategic consolidation.

What was our ROI?

ROI from Proofpoint Enterprise DLP is evident in terms of incident reduction, operational efficiency, and breach cost avoidance. There are approximately 40 to 60% fewer accidental outbound sensitive data incidents. Approximately 25 to 40% reduction in manual review workload has been achieved, and about 15 to 20 analyst hours per month are saved through automated encryptions. Additionally, there is a 40% reduction in repeat violations within 6 months, and compliance audit preparation time reduces by about 30%.

Which other solutions did I evaluate?

Before selecting Proofpoint Enterprise DLP, a structured evaluation of various enterprise DLP solutions was conducted, including Microsoft Purview, Microsoft 365 DLP, Symantec, Broadcom DLP, Forcepoint DLP, and considering add-on DLP modules from existing security vendors.

What other advice do I have?

My advice for organizations considering Proofpoint Enterprise DLP is to start with a clear data protection strategy and not begin with technology. Start by determining what data you are trying to protect, which regulatory obligations apply, and identifying your highest risk outbound channels. Proofpoint Enterprise DLP works best when aligned with a defined data classification and governance framework. A phased rollout is recommended, beginning in monitoring mode to collect baseline data, tune policies, validate false positives, and gradually enforce blocking or encryption to prevent user disruption and SOC overload. Finally, focus on high-risk use cases first, protecting payroll or HR data, financial records, and then confidential client information. I would rate this solution an 8 out of 10.


    reviewer2584311

Data protection has prevented outbound leakage and now supports compliant cloud collaboration

  • February 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Proofpoint Enterprise DLP for outbound email data leakage control and threat monitoring purposes, as well as for app data protection in environments like M365 and Google Workspace. I have also worked on security projects where Proofpoint Enterprise DLP is used to maintain regulatory compliance.

Proofpoint Enterprise DLP helps us stop and control sensitive data from leakages and prevents users from uploading proprietary documents or source code. This applies to both existing employees and departing employees who might email or upload sensitive materials. In terms of regulatory compliance, we use this solution for structural detecting and automatically encrypting or blocking outbound communication.

We also perform a little bit of insider risk monitoring by identifying abnormal data movements, such as file uploads of legitimate or non-legitimate files. We use this monitoring to take appropriate actions based on the use case or scenario at that point in time.

What is most valuable?

Proofpoint Enterprise DLP's prevention and detection of user policies is very effective. It is effective in preventing accidental data leakage through email and cloud sharing when the policies are properly tuned. The blocking and auto-tuning feature works reliably, and the encryption works reliably for structured data such as PCI, which we use in the finance industry.

However, there is a chance that insiders will use bypass attempts if poor policies are created for certain users, which can reduce effectiveness and cause some issues. From an effectiveness standpoint, it makes sense that Proofpoint Enterprise DLP helps a lot with accidental data leakage prevention and prevents a lot of data leakages. It also helps with tuning insiders from sharing unencrypted data.

What needs improvement?

Initial policy tuning takes a lot of time to tune the policies according to the connecting application. Out-of-box rules can create a lot of noise in terms of triggering emails, which require careful refinement based on the approaches and based on the output it delivers. From the pricing standpoint, I learned from my senior management team that Proofpoint Enterprise DLP is a little higher compared to other basic DLP tools.

Case management and the reporting workflow should be more streamlined for larger SOC operations where the enterprise has more assets, such as one thousand or two thousand assets. The workflows could be streamlined in a way that makes more sense for these larger deployments.

Problematic Copilot use is something we could use for analysis of email triggerings where you can summarize what data could be overshared in M365 if permissions are misused or exposure increases. There is a lot of data in our accounts that can be overshared. Copilot surfaces whether users already have access to data, and if permissions are missing, there is a chance that exposure increases. A stronger user access control mechanism is needed if you want to use this Copilot feature effectively. It should be aligned with existing policies, such as M365 policies, so you can use it for its real purpose where it makes a lot of sense. Otherwise, a lot of enforcement gaps appear where it creates new data risks.

For how long have I used the solution?

I have been using Proofpoint Enterprise DLP for two years.

What do I think about the stability of the solution?

From a stability standpoint, most of the things are stable in production. I do not see any major downtimes. There is minimal downtime due to ongoing cleanup activities or upgrades. A tough point is that the endpoint agents occasionally require troubleshooting during upgrades. All of these issues depend on or are interlinked with the policy tuning and the current deployment. From a stability standpoint in production, Proofpoint Enterprise DLP is overall stable with minimal disruption and downtime.

What do I think about the scalability of the solution?

Proofpoint Enterprise DLP is scalable and can be used in a large environment, especially for emails and cloud workloads. The cloud-native architecture that Proofpoint has definitely handles user growth without any major performance impact. Endpoint scaling requires planning, which is one thing we have to follow religiously. Proofpoint Enterprise DLP supports overall enterprise expansion without any re-architecting of the existing workflows or existing plans. However, it requires planning on how we can integrate it and how we can manage to add these things over a period of time.

Which solution did I use previously and why did I switch?

I used a tool called Endpoint Protector from Netflix in the past before Proofpoint Enterprise DLP. I used that a few times, but later a migration happened and everything moved to Proofpoint Enterprise DLP.

How was the initial setup?

Initial deployment is moderate in terms of difficulty. It needs a lot of training. If you have hands-on training before the migration of the product, that would make it a little easier to get familiarized with the context of what you are needing. From a general standpoint, it is moderate to complex because it is not a plug-and-play solution. You cannot use it as is, but it requires a lot of initial training. Email integration could be straightforward, but other things are policy tuning, endpoint rollout, false positive tuning, and false positive reductions, which take a lot of effort. If you know the real context of how to use the tool, what use case you are pursuing, and the data classification of what could be pushed into the tool and what could be the output, then the governance of all these could make it moderate to complex.

What's my experience with pricing, setup cost, and licensing?

Compared to basic DLP tools, Proofpoint Enterprise DLP is higher in cost. I can say it has its own capabilities where we can use it to the fullest. It can be a little customized where it could be quoted at the beginning of the contract. It is a little bit higher and not very cheap compared to other DLP tools, but it also has a lot of value if you use it properly.

What other advice do I have?

From a maintenance standpoint, we rely on Proofpoint Enterprise DLP where we need to have continuous policy tuning for false positive reduction, business process changes, and regular updates. It is a little moderate thing for us where integration checks will happen and we need to have dedicated ownership for this person who will be liaising between the Proofpoint team and our team. That makes sense to effectively use the tool. Otherwise, it increases a lot of gaps in terms of the tool and the governing content.

Adaptive Policy Enforcement could be used to control user-level risks or behavior patterns in terms of applying data sensitivity and static rules. By using this policy enforcement, we can reduce a large amount of false positives and focus on controls that make sense, such as strict control enforcement. I give Proofpoint Enterprise DLP a review rating of nine.


    reviewer2801907

Intelligent data policies have stopped insider threats and protect sensitive emails and USB copies

  • February 10, 2026
  • Review provided by PeerSpot

What is our primary use case?

Proofpoint Enterprise DLP depends upon an organization and what kind of organization it is. For example, if you are working for the healthcare industry, the intellectual property, confidential information, or PII includes health records numbers, personal details, account numbers, passport details, and social security numbers. When you take the service of Proofpoint Enterprise DLP, we first identify what our requirement is. If I was working for one of the banking solutions in Australia, their social security number is definitely there, as well as their passport. It depends upon the location. For the India location, we have the UID and Aadhaar identification. For Australia in the healthcare industry, they have HIPAA (Health Insurance Portability and Accountability Act), claim records, claim details, medical record numbers (MRN), and tax details numbers. All these things are required to protect.

When anyone is trying to send all this information outside, Proofpoint Enterprise DLP provides the solution. We have created rules using Proofpoint Enterprise DLP so that whenever any user is trying to send any emails externally, we capture the keyword from the email body. The system will scan the email, and if that keyword is identified within the DLP solution with the rules we have incorporated, it will generate an alert. The email will be moved to the DLP quarantine folder. A user will receive an automated email or response stating that they are trying to send confidential information outside of the organization, and this has been blocked due to DLP policy. An analyst will create a ticket into our solution, and then the analyst will review that incident and start investigating.

Let's say you're working for the electronics industry, and they have taken Proofpoint Enterprise DLP. For any electronics industry, they work in a situation where they want to protect the circuit design of any one of the latest or newly launched electrical or electronic devices. That electrical circuit design is a patent for them. They don't want to send this to an outside organization. The email will be scanned for the circuit design and patent information. If, for example, there is a project manager who wants to send one of the electronic circuit designs using VLSI technology and has worked for ten years in the organization and is now leaving, they want to send that patent information since they have created it, they will try to send it outside of the organization. In that case, the system will capture the alert, create an alert for that, and then the investigation starts.

Let's say there is a user who has recently resigned from the organization due to some conflict or issues. Now they want to send important intellectual property, intellectual documents, or confidential information outside of the organization. In that case, Proofpoint Enterprise DLP works in the backend, triggers an alert, and starts the investigation.

What is most valuable?

Proofpoint Enterprise DLP is a unified solution that does not work for inbound email but only works for outbound email. It can protect everything by scanning for the email and searching for specific criteria. If that criteria is matched, it can create an alert and take actions accordingly. It's easy to perform all those activities on Proofpoint Enterprise DLP.

Data loss prevention is very easy if you take the service from Proofpoint Enterprise DLP. Proofpoint Enterprise DLP works in the direction of what an organization wants to protect. It's easy to create rules and email firewall rules for outbound emails. While creating that rule, we can easily capture that and protect that. We can protect the important information from going outside the organization. It's very easy to identify all those things.

Proofpoint Enterprise DLP is already an AI-based solution that has taken features from AI from the backend for identifying, investigation, or correlations of all the solutions. The AI and machine learning work in the backend to identify these things.

One thing to highlight is that when a user is trying to send emails, rather than sending the data through email, if they insert a USB drive and start copying files within that USB drive, irrespective of the email communication, Proofpoint Enterprise DLP can also trigger an alert for that, indicating that a USB device was inserted for that specific host. That can be one of the best features for Proofpoint Enterprise DLP.

What needs improvement?

From a DLP product improvement point of view, I think if Proofpoint Enterprise DLP can provide a deep-dive investigation or user activity listed on the alert sections with details about what activity was performed by the users at the time of the alert, what checks were performed, whether any rule was created, any SharePoint was accessed, any confidential SharePoint was accessed, or any established connection was performed, this information would be helpful. If that information was also tagged or shown on the ticket, it would be easier to understand more details or investigation approaches and investigation concepts. If that feature can be possible from the vendor side, it will help us for the investigation and as an improvement.

For how long have I used the solution?

I have used this solution for four to six years.

What do I think about the stability of the solution?

The performance stability is very good. We can see the health status every day on Proofpoint Enterprise DLP. Whenever any node is down or whenever any service CPU utilization is high, we can easily review that in the console, the PROOF console, TRAP console, or health status report. It's easy for us to identify any issues.

Which solution did I use previously and why did I switch?

I had worked with Symantec and Symantec Vault for DLP solutions. That was not very good because they don't have customization features. You could only use limited tabs with minimal customization features.

How was the initial setup?

It's easy for the deployment. We can easily configure that email firewall rules and information protection rules.

What about the implementation team?

Creating a policy is not very difficult for us for Proofpoint Enterprise DLP. Sometimes we usually take help from Proofpoint customer or professional support services. They provide guidance on what and how we can create those policies, and that saves time in deployment and configurations. We can easily get help from Proofpoint customer support or professional support, and it would be easy to create the rule logic and the policy deployment.

What was our ROI?

For the DLP, the important thing is that the response time is very quick. The actions taken are immediate. The quarantine time and response time are efficient. When the email is getting quarantined, we can hold that in the quarantine folder for some time, such as for one month. The analyst can review, investigate, and take actions accordingly.

What's my experience with pricing, setup cost, and licensing?

Proofpoint Enterprise DLP is generally a high-pricing solution, so it generally requires additional licenses for the DLP. If you are a regular customer, then you only have the email protection and email firewall, not for the information protection solution. You need to specify and provide the license, and then accordingly you should go ahead with the DLP activities.

Which other solutions did I evaluate?

Other solutions include CrowdStrike, Telstra, Akamai, Microsoft Office 365, SIEM tools, HP ArcSight, and Azure.

What other advice do I have?

Proofpoint Enterprise DLP works in the synchronization of Proofpoint Production on Demand and Proofpoint IMD, which is the Internal Mail Defense solution. When any user account gets compromised or an attacker gains access to an internal user account, they will pretend to be an insider threat and start moving confidential information outside of the organization. In that case, Proofpoint Enterprise DLP plays a very important role in easily identifying all these activities from the backend, using machine learning and advanced analytics. UEBA, which is User and Entity Behavior Analytics, performs checks on the user's day-to-day activity on the backend side. It examines what is the daily routine timing, what the user is trying to do every day, and how it is different from some specific day. Based on all those things, it correlates, it identifies, and based on machine learning, it becomes very easy for the DLP solution to take decisions. It's a very good solution in terms of preventing or protecting from DLP incidents.

I think organizations should go ahead with Proofpoint Enterprise DLP. Every day they are coming with more advanced features, more scalability, and more upgraded versions. I would rate this solution as an eight out of ten.


    reviewer2784738

Email defenses have reduced phishing impact and save our soc team significant investigation time

  • December 04, 2025
  • Review provided by PeerSpot

What is our primary use case?

Proofpoint Enterprise Data Loss Prevention (DLP) is currently being used in parts. The email protection plan is used, though uncertainty exists about whether an added-on plan for the DLP specifically is included.

When first joined, Proofpoint was in the early phases of deployment and was told it was pretty straightforward, especially with the services they provide, such as white glove service. They respond quickly to questions.

What is most valuable?

The product does a pretty good job filtering out promotional emails and unwanted emails. It effectively filters specific vendors sending out mass mails, not just spam. For important emails, it catches scripts in emails and does a double check on those. Many things noticed over time have been positive, especially the impact on the SOC team, who state that it saves a lot of time and catches phishing attempts early, specifically very custom phishing.

What needs improvement?

Proofpoint Enterprise Data Loss Prevention (DLP) should probably add something more into their case management process. There are certain things that Proofpoint lacks regarding case management. When incidents come in, it classifies a specific subcategory of what that incident is and creates a ticket for the SOC team. If they could provide more details on the type of incident filing in case management, that would be helpful. This is a hard ask because it requires some form of backend automation workflow. Many tools are starting to adopt their own automation workflows, which is pretty cool.

Occasional mishaps arise related to users' devices affected by Proofpoint or when Proofpoint isn't logging specific device actions. The insider risk tool has been utilized effectively, which monitors employee actions every ten seconds, but there have been mishaps. Additionally, there are moments when specific servers require updates due to mismatched deployment updates, though this is not considered difficult because endpoint engineering counterparts assist, especially during Proofpoint calls.

For how long have I used the solution?

I have utilized Proofpoint Enterprise Data Loss Prevention (DLP) for approximately five years.

What do I think about the stability of the solution?

There was one instance of instability related to a phishing alarm connected to Outlook. It was not major and nothing caused significant downtime within the systems or applications.

What do I think about the scalability of the solution?

Proofpoint Enterprise Data Loss Prevention (DLP) is pretty scalable. The full scalability phase has not been reached yet, as efforts are being made to formalize processes due to frequent M&As. The aim is to have new companies adhere to the same tools. So far, no issues have been encountered, particularly with the smaller companies acquired.

How are customer service and support?

Technical support was contacted via a ticket and they were pretty responsive. Whenever issues arose, the team reached out and a specific TAM stayed on top of it. Initially, tickets were submitted and emails were sent, and the TAM would respond quickly, involving the right people for the tasks.

The quality of their answers is good. Issues have not really been experienced with this specific vendor regarding their responses. They are technical and provide options that help narrow down solutions.

How would you rate customer service and support?

Positive

How was the initial setup?

For the deployment of Proofpoint Enterprise Data Loss Prevention (DLP), currently about three people are dedicated to the process or to maintenance and weekly TAM calls. The best estimate that can be given is two or three people. One individual has been observed managing one aspect of Proofpoint products on their own, and it seemed feasible to finish within a month.

What was our ROI?

The pricing for Proofpoint Enterprise Data Loss Prevention (DLP) is still good. When renewal occurred with Proofpoint, there were no issues with the stated price. The company works with GuidePoint Security as a VAR, which does a good job. So far, there has been no feeling of it being too expensive, which would lead to switching to another solution. Proofpoint adds value and proves its ROI based on the services they provide. Although Abnormal Security has been pushing, the package that Proofpoint provides is better in the long run, especially since results have been seen in prevention and responses to exercises concerning external files being sent out during various departures.

Which other solutions did I evaluate?

Attempts have been made to use the Netskope DLP policy, but it is bundled with whatever they offer, especially with the POP locations. Some people in the company have also looked into other solutions apart from Proofpoint, such as Abnormal Security. This is the current discussion given the many moving pieces.

What other advice do I have?

The overall review rating for this product is 8 out of 10.


    Computer & Network Security

Highly Flexible Solution Perfect for Large Organizations

  • November 13, 2025
  • Review provided by G2

What do you like best about the product?
Highly flexible, which is perfect for large organisations
What do you dislike about the product?
I don't believe there's anything I would dislike.
What problems is the product solving and how is that benefiting you?
Provides an extra layer of defence, and is truly our biggest protection against phishing emails. Attachment defense also protects us against malicious attachments. Internal DMARC policies can be fully customised to our needs, which is a great benefit when it comes to organisations consisting of multiple different companies, like ours. This for us was a huge help during acquisitions.