Ignore the glitter. Get the gold standard.
Industry analysts rank Proofpoint above Abnormal in leadership, innovation and completeness. Proofpoint stops more threats, more quickly and more accurately with guaranteed uptime and binding SLAs.
Analysts agree: Proofpoint is the clear winner
“Proofpoint is the only vendor that delivers on all five areas for email security as an integrated platform.”
—Gartner
“Abnormal Security is the added protection you need if you don’t need anything else. Its vision remains firmly grounded in its current capabilities with only limited plans to add capabilities covered by email infrastructure providers.”
—Forrester
"Proofpoint focuses on innovation to retain its market leadership. This includes state of-the-art threat intelligence and detection platforms using AI/ML designed to improve detection and reduce false positives."
—Frost Radar
Forrester
Leader, strategy and current offering
Abnormal scores 1/5:
- Strategic Vision
Abnormal scores 0/5:
- Email Authentication
- Antimalware and Sandboxing
- Encryption
Forrester
|
Abnormal scores 1/5:
Abnormal scores 0/5:
|
Frost Radar
Leader in growth and innovation
Our false positive rate is 1 in 4.5 million thanks to our machine learning (ML) and artificial intelligence (AI) engines which analyze or track more than:
- 3 billion emails
- 45 billion URLs
- 250 million attachments
- 40 million cloud accounts
- 500 million domains
- 150 threat actors
Frost Radar
|
|
Our false positive rate is 1 in 4.5 million thanks to our machine learning (ML) and artificial intelligence (AI) engines which analyse or track more than:
|
Proofpoint is the proven leader
Abnormal is a point product with limited capabilities and gaps it can’t fill on its own. Modern organisations need a complete security platform built to protect people and defend data from today’s advanced threats. See why 83 of Fortune 100 trust Proofpoint to augment Microsoft 365.
Category
Abnormal
Inbound hygiene: Adult, spam, graymail, and other unwanted mail
Phishing: Internal and external phishing, spear phishing, EvilProxy, e-signature phishing, QR-code phishing (quishing), compromised webpages, click-time protection
Malware and ransomware detection: Attachments, URLs, SocGholish, file-less malware, rootkits, keyloggers
Social engineering: BEC, CEO fraud, invoice fraud, payroll diversion, voicemail phishing (vishing), whaling, SMS-based phishing (smishing)
Account compromise: Internal account, vendor account and attorney impersonation, bogus invoice scams
Routing: Inbound and outbound routing and address rewriting
Inbound Protection: Edge/reputation checks, file-type blocking, antivirus, antimalware checks, antispam, antibulk, attachment analysis and sandboxing, URL analysis and sandboxing, URL rewriting and engagement tracking
Inbound Policy: Custom rule creation, message annotation, system administration controls
Sender authentication: DKIM signing, DMARC enforcement
Detection and remediation: Pre- and post-delivery threat detection and remediation
Outbound security: Email threat filtering, misdirected email, data loss prevention (DLP) and encryption
Category
Inbound hygiene: Adult, spam, graymail, and other unwanted mail
Abnormal
Category
Phishing: Internal and external phishing, spear phishing, EvilProxy, e-signature phishing, QR-code phishing (quishing), compromised webpages, click-time protection
Abnormal
Category
Malware and ransomware detection: Attachments, URLs, SocGholish, file-less malware, rootkits, keyloggers
Abnormal
Category
Social engineering: BEC, CEO fraud, invoice fraud, payroll diversion, voicemail phishing (vishing), whaling, SMS-based phishing (smishing)
Abnormal
Category
Account compromise: Internal account, vendor account and attorney impersonation, bogus invoice scams
Abnormal
Category
Routing: Inbound and outbound routing and address rewriting
Abnormal
Category
Inbound Protection: Edge/reputation checks, file-type blocking, antivirus, antimalware checks, antispam, antibulk, attachment analysis and sandboxing, URL analysis and sandboxing, URL rewriting and engagement tracking
Abnormal
Category
Inbound Policy: Custom rule creation, message annotation, system administration controls
Abnormal
Category
Sender authentication: DKIM signing, DMARC enforcement
Abnormal
Category
Detection and remediation: Pre- and post-delivery threat detection and remediation
Abnormal
Category
Outbound security: Email threat filtering, misdirected email, data loss prevention (DLP) and encryption