Proofpoint Emerging Threats Intelligence


ET Intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after.

Work for Proofpoint Emerging Threats Intelligence?

Learning about Proofpoint Emerging Threats Intelligence?

We can help you find the solution that fits you best.

Proofpoint Emerging Threats Intelligence Reviews

Ask Proofpoint Emerging Threats Intelligence a Question
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 Proofpoint Emerging Threats Intelligence review
LinkedIn Connections
Proofpoint Emerging Threats Intelligence review by User
Validated Reviewer
Review Source

"Daily use"

What do you like best?

I like that I get an email that is quick access each morning to see if I have threats or good emails getting caught.

What do you dislike?

I don't know that I dislike anything, specifically. It's easy to use and the only thing would be that it goes outside my email box to show me information.

Recommendations to others considering the product

I would say it's easy to use and not invasive in sending emails continually.

What business problems are you solving with the product? What benefits have you realized?

I haven't had any situations with hacks or anything. My company uses it.

Sign in to G2 Crowd to see what your connections have to say about Proofpoint Emerging Threats Intelligence

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Proofpoint Emerging Threats Intelligence for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
F-Secure Logo
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
Amazon GuardDuty Logo
Amazon GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
Cisco Talos Logo
Cisco Talos
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
Vectra Networks Logo
Vectra Networks
Vectra Networks provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
Alert Logic Threat Manager Logo
Alert Logic Threat Manager
Alert Logic Threat Manager with ActiveWatch is a cloud-based managed intrusion detection and vulnerability assessment solution.
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
FortiSandbox Logo
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
SecureWorks Logo
SCWX is a cybersecurity company that works to provide an early warning system for evolving cyber threats, enabling to prevent, detect, rapidly respond to and predict cyberattacks.
CapStar Forensics Logo
CapStar Forensics
CapStar Forensics is an analytic platform that complements Wireshark by enabling the syntax and vocabulary in a fully-programmable, stateful way, with a blazingly fast search engine that allows persistent searching.
Show more
Kate from G2 Crowd

Learning about Proofpoint Emerging Threats Intelligence?

I can help.
* We monitor all Proofpoint Emerging Threats Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.