Threat Response vs. TRAP

When to choose Threat Response over TRAP?

While Threat Response Auto Pull addresses email security incidents, security professionals should also consider full Threat Response, which goes beyond the email quarantine with key capabilities worth considering:

  • Security orchestration and automation of incident response
  • Adding context and intelligence to shortcut incident triage
  • Collecting and verifying endpoint forensics against sandbox forensics
  • Accepting and applying 3rd party intelligence against all incidents
  • Quarantining and containing threats via Firewalls, proxies, and AD
  • Real-time reporting against campaigns, users, incidents, threats, and targets

PTR vs. TRAP feature comparison

The following table outlines the key differences between the capabilities supported by Threat Response Auto Pull (TRAP) and standard Threat Response.

Capability/Feature Threat Response Auto Pull (TRAP) Full Threat Response
ALERT INGESTION
Proofpoint TAP X X
Proofpoint Smart Search X X
Proofpoint CSV Upload X X
Abuse Mailbox Monitor X X
Alert ETL (Python Scripting) X
FireEye EX X X
FireEye NX X
Palo Alto Networks NGFW X
Palo Alto Networks WildFire X
Cisco FirePOWER NGIPS X
Suricata X
Splunk X
HP ArcSight X
IBM QRadar X
Juniper STRM / Secure Analytics X
JSON Events X X
ALERT ENRICHMENT
Microsoft Active Directory X X
Microsoft Domain Controller Agent X
IP Address – WHOIS X X
Domain Names – WHOIS X X
VirusTotal X X
Emerging Threat (IP, Domain, URL Reputation) X X
Splunk Automatic Log Analysis X
STIX / TAXII Intelligence X X
Past Infection IOC Checks X
Custom GeoIP Support X
Campaign Data Enrichment X X
Threat Scoring X X
Custom Fields X
RESPONSE / ENFORCEMENT
Match Conditions X X
Incident Management (Assign, Close, etc.) X X
Incident Notifications X X
On-Demand Agent X
Automatic IOC Data Collections X
Manual IOC Data Collections X
IOC Analysis & Verification X
Custom Scripts X
Custom Responses X
Microsoft Exchange / O365 X X
Google G Suite Gmail App X X
Microsoft Active Directory X X
Cisco ASA Firewall X
Cisco IOS Devices (routers & switches) X
Checkpoint Firewall X
Juniper SRX Firewall X
Fortinet Fortigate Firewall X
Palo Alto Networks Firewall X
OpenDNS X
Blue Coat Web Proxy X
CyberArk X
Imperva X
Audit Activity Trail X X