Want to see who topped the 2019 Best Software Awards?

Proofpoint Threat Response Auto-Pull

4.4
(4 reviews)

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators to move malicious or unwanted messages to quarantine, after delivery. It follows forwarded mail and distribution lists and creates an auditable activity trail.

Work for Proofpoint Threat Response Auto-Pull?

Learning about Proofpoint Threat Response Auto-Pull?

We can help you find the solution that fits you best.

Proofpoint Threat Response Auto-Pull Reviews

Ask Proofpoint Threat Response Auto-Pull a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 4 Proofpoint Threat Response Auto-Pull reviews
LinkedIn Connections
Proofpoint Threat Response Auto-Pull review by Administrator
Administrator
Validated Reviewer
Verified Current User
Review Source

"Proofpoint TRAP is a must have tool for Network Admins"

What do you like best?

Anyone who is a network admin or tasked with managing email protection knows that one of the hardest tasks is mitigating potential phishing/malware 0-day attack emails after they have been delivered. Proofpoint TRAP (in conjunction with TAP) automatically removes emails that have been discovered to be malicious after they were initially deemed safe. It's the automation of this process that is the best feature of this tool. In addition, the ability to go into Proofpoint Email and Security and generate a CSV of emails, upload this to TRAP, and have TRAP automatically pull these emails from all sources is fantastic. TAP is great, but TAP without TRAP is like pasta without sauce.

What do you dislike?

Not much to dislike really. It is easy to setup and maintain. I guess my only complaint would be that the web app interface could be updated a little to make drilling down into the incidents a little easier (i.e. how the threat levels change over time changes the order incidents are viewed). Otherwise, I find the product to be pretty much as advertised, which is fantastic.

Recommendations to others considering the product

Unless you enjoy manually going into your email environment and managing 0-day malware and phishing campaigns that were not detected at the time of delivery, I'd suggest looking into this product.

What business problems are you solving with the product? What benefits have you realized?

The problem this solves is the issue of how to quarantine and/or delete emails that have already been delivered. Several use cases are possible to solve with TRAP because of the ability to automate the pulling of emails based on threats post delivery. Because this is automated, there is less time spend by IT resources managing this issue manually. And because we use TRAP, emails are usually pulled before the user has a chance to follow a malicious link, or even answer a phishing attempt. This means less chance for a malware outbreak, resulting in potential network downtime and expensive mitigating solutions.

Sign in to G2 Crowd to see what your connections have to say about Proofpoint Threat Response Auto-Pull
Proofpoint Threat Response Auto-Pull review by Administrator
Administrator
Validated Reviewer
Verified Current User
Review Source

"TRAP is a key piece in our response process dealing with delivered malicious emails"

What do you like best?

It effortlessly does it's job and allows our cyber and IT groups to focus on other more involved incidents.

What do you dislike?

The reporting capabilities of the TRAP need to be enhanced so that custom reports can be created based on more than one attribute or criteria.

Recommendations to others considering the product

Investigate other internal systems that may be able to hook into TRAP to get even more value out of the solution.

What business problems are you solving with the product? What benefits have you realized?

The process of removing malicious emails that were condemned after delivery can now be effortlessly handled with little to no intervention. This same time on IT and Cyber resources. TRAP has also given us the capability to selectively remove other emails without the need to involve IT allowing Cyber to have more autonomy,.

What Incident Response solution do you use?

Thanks for letting us know!
Proofpoint Threat Response Auto-Pull review by Administrator
Administrator
Validated Reviewer
Verified Current User
Review Source

"Threat Response Auto-Pull has given peace of mind"

What do you like best?

It automatically pulls the message from users mailboxes when it determines a message contained a malicious URL or attachment. I can also issue a manual pull, which has been very helpful when an occasional spam message makes it way to a large number of users.

What do you dislike?

The reporting features via .pdf could be improved. The .pdf reports don't have as much detail as the .csv file does and executives like to see graphs and charts versus numbers in a spreadsheet.

Recommendations to others considering the product

This product is a must-have.

What business problems are you solving with the product? What benefits have you realized?

It's prevented multiple phishing attacks. Saved business time by taking automatic corrective action. And it takes corrective action at night, on the weekend, holidays, with no user intervention.

Proofpoint Threat Response Auto-Pull review by Administrator in Information Technology and Services
Administrator in Information Technology and Services
Validated Reviewer
Verified Current User
Review Source

"ProofPoint Response survey"

What do you like best?

In depth analysis of threat locationForensic analysis is excellent. Provides a ton of information.

What do you dislike?

Does not always catch the threat before someone clicks on it. Phishing attacks are rampid

Recommendations to others considering the product

It pretty much runs by it's self. A quick steps guide would be helpful. The documentation is long and a lot to digest.

What business problems are you solving with the product? What benefits have you realized?

It notifies me so we can watch and notify the user. That has helped with training our users what to look for and what not to do. We are hit hard with Phishing attacks trying to get user credentials

There are not enough reviews of Proofpoint Threat Response Auto-Pull for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
D3 Security Logo
D3 Security
4.1
(50 reviews)
D3 Security provides a proven incident management platform that empowers security operations with a full-lifecycle remediation solution and a single tool to determine the root cause of and corrective action for any threat- be it cyber, physical, financial, IP or reputational.
2
InsightIDR Logo
InsightIDR
4.4
(28 reviews)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
3
Cb Response Logo
Cb Response
4.2
(27 reviews)
Cb Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
4
Swimlane Logo
Swimlane
4.4
(22 reviews)
Swimlane is a security platform designed to prioritize alerts, remediate threats and improve operational performances.
5
Siemplify Logo
Siemplify
4.4
(14 reviews)
Siemplify is a comprehensive security operations platform for the analyst to navigate management, automation, and investigation through a single pane of glass.
6
Symantec Emergency Response Logo
Symantec Emergency Response
3.9
(12 reviews)
With experience in every industry, Symantec's Incident Response team can get your organization back to normal operations.
7
TheHive Logo
TheHive
3.9
(12 reviews)
TheHive is a scalable, open source and free security incident response solution.
8
Resilient Incident Response Platform (IRP) Logo
Resilient Incident Response Platform (IRP)
4.2
(11 reviews)
The Resilient Incident Response Platform (IRP) is a platform for orchestrating and automating incident response processes.
9
Cyber Triage Logo
Cyber Triage
4.3
(10 reviews)
Cyber Triage is an automated incident response software any company can use to investigate their alerts.
10
Resolve Systems Logo
Resolve Systems
4.2
(10 reviews)
The Resolve Software System is used to accelerate incident resolution for all types of incidents in customer care, network, and IT operation centers.
Show more

Learn more about Proofpoint Threat Response Auto-Pull

Proofpoint Threat Response Auto-Pull Videos

Proofpoint Threat Response Auto-Pull Downloads

Kate from G2 Crowd

Learning about Proofpoint Threat Response Auto-Pull?

I can help.
* We monitor all Proofpoint Threat Response Auto-Pull reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.