Proofpoint
Protect people, defend data
Email Security and Protection
Email is the No. 1 threat vector. Social actions such as phishing and email scams arrive via email 96% of the time, and these security threats are always evolving. Proofpoint delivers the most effective unified solution to protect your people and critical data from advanced email threats. Our complete, extensible email security platform blocks malware and non-malware email threats, such as email fraud—also known as business email compromise (BEC)—using our Advanced BEC Defense. It provides you with visibility into your greatest risk—your people. And with actionable insights, you can better understand the risks you face and respond to threats faster.
Email Protection
- Email Protection is the industry-leading secure email gateway. It allows you to secure and control your inbound and outbound email. And our proprietary machine learning and multilayered detection techniques help to dynamically identify and block phishing and impostor threats.
Targeted Attack Protection
- Targeted Attack Protection (TAP) helps you stay ahead of attackers. It provides you with an innovative approach to detect, analyze and block advanced threats before they reach your inbox, helping your emails remain protected. TAP provides visibility into your most attacked people, with actionable insights and forensic details of an attack.
Email Fraud Defense
- Go beyond email authentication to get visibility into supplier fraud. With Email Fraud Defense, you can streamline DMARC implementation. We provide you with guided workflows and support you with dedicated consultants. Get a comprehensive way to protect your organization’s reputation in email fraud attacks.
Threat Response Auto-Pull
- With Threat Response Auto-Pull, we give your messaging and security administrators the ability to analyze emails and move malicious or unwanted emails to quarantine after delivery.
Email Continuity
- Email downtime can be a significant hit to worker productivity. With Enterprise Continuity, you can ensure the email is always available. Even if your company email is down. It provides your users with full access—via Outlook integration, a web portal, or native mobile support. And it automatically activates in an outage. It also provides you with fully automated recovery.
Advanced Threat Protection
Stop threats before they reach your people and respond quickly when things go wrong. Our innovative Advanced Threat Protection solutions prevent, detect, and notify you of advanced threats – through email, mobile, social, and the desktop – and help you resolve them before they cause lasting harm.
Detect and stop advanced threats
- Prevent known and unknown threats with Advanced Threat Protection—even those that don't use malware—from reaching your people. Advanced Threat Protection is a security solution that defends against complex malware or hacking attacks that target sensitive data within an organization. Protect against advanced threats with the industry’s most robust email security platform and the most accurate view of the email threat landscape.
Get complete visibility
- Advanced Threat Protection provides the insight you need to stop and respond to today's advanced threats. Apply fully verified threat intelligence that includes proof of conviction, data on more than 40 threat categories, five-year history, and related samples, domains, and IPs.
Respond quickly to incidents
- Avoid alert fatigue with Advanced Threat Protection. Investigate, prioritize and verify the threats that matter. Respond faster to incidents by automating and streamlining manual tasks. Manage incidents across your entire security infrastructure in a single view.
Security Awareness Training
The vast majority of today’s threats require humans to activate them. Ensure your users know what to do when faced with a real threat by providing them with targeted education.
- Reduce successful phishing attacks and malware infections by up to 90%.
- Measure user behavior change with CISO Dashboard and real-time reporting.
- Reduce exposure and IT overhead with informed users and automated incident response.
- Maximize the effectiveness of efforts by providing targeted and tailored education to users.
- Reduce risk from phishing and other cyber attacks by changing users’ behavior.
- Proofpoint Security Awareness Training Enterprise helps you deliver the right training to the right people for the right response to today’s dangerous attacks. It turns your users into a strong line of defense that proactively protects your organization.
Cloud Security
With Proofpoint Cloud Security solutions, you can govern access to the web and cloud services. You can also detect, investigate, and defend against cyber criminals attempting to access your sensitive data and trusted accounts.
Cloud App Security Broker
- Risk-aware data protection and advanced threat protection for cloud apps—such as Office 365, G Suite, Box, and more—with a people-centered view of app access and data handling.
Proofpoint Web Security
- Gain visibility into web-based threats, control access to risky websites and cloud services, and protect your data while your users browse the web. You can scale easily with a cloud-native and globally-distributed proxy that integrates seamlessly with other Proofpoint Cloud Security solutions.
Proofpoint Browser Isolation
- Allow your people to freely access websites, personal email, and cloud applications without exposing your organization to malware, credential phishing, and data loss.
Cloud Account Defense
- Protect your users from Office 365 account compromise. Detect, investigate, and defend against cyber criminals accessing your sensitive data and trusted accounts.
Targeted Attack Protection SaaS Defense
- Microsoft 365 and G Suite. Our cloud security solutions detect suspicious logins and malicious files using a “trust but verify” approach to SaaS-hosted files.
Archive & Compliance
It’s not easy to develop a strategy to enable corporate or regulatory compliance. Data growth plagues IT departments. And legal and compliance teams struggle to retain, discover and supervise content across channels. Proofpoint offers an Intelligent Compliance family of products and solutions that make it easier for you to make more informed compliance decisions, manage information risk and improve investigation readiness.
Capture
- Proofpoint Capture makes it easy to collect, manage and retain content from the tools your employees use to communicate. This information archiving solution helps unite and normalize your feeds across public social media, enterprise collaboration apps, instant messenger chats, text messaging and more.
Patrol
- Proofpoint Patrol makes it easy to monitor, remediate and report on social media compliance at scale. It provides you with intelligent classifiers, automated workflows and intuitive reporting. You get complete visibility into your social activity. And you can remediate compliance violations quickly.
Track
- Proofpoint Track keeps you compliant and in control. It gives organizations the ability to track, audit and reconcile all content in your capture stream. It helps ensure that every file or communication record originally sent is also in your archive or data store.
Archive
- With Proofpoint Archive, you get a proven, next-generation data archiving solution. It leverages cloud intelligence for deep insight into your data, which helps you to reduce cost, complexity, and risk.
Discover
- With Proofpoint Discover, you can process, analyze and cull archived information in house. This helps you streamline your processes and dramatically reduce the scope of your e-discovery costs.
Supervision
- With Proofpoint Supervision, you can streamline your SEC, FINRA and IIROC compliance. We provide you with easy monitoring, review and reporting across email, social and enterprise collaboration data.
Automate
- With Proofpoint Automate, you can use machine learning to significantly reduce your low-value supervision content. This helps you keep your focus on meaningful content. And at the same time, it reduces reviewer fatigue and the human errors that can result.
Information Protection
Information protection applies security solutions and other technologies, as well as processes and policies, to secure information. Protect your information against accidental mistakes, attacks, and insider risk—across your cloud services, email, endpoint, and on-premises file shares. Leverage common classifiers honed over 10 years. And achieve fast time to value and optimize your end-user experience with a modern architecture that’s easy to deploy and maintain.
Enterprise Data Loss Prevention
- Address the full range of data risk from negligent, compromised, and malicious users with our unique approach that combines content, behavior, and threat telemetry.
Email Encryption
- Communicate securely through policy-based email and attachment encryption. Seamless mobile access and self-service key revocation mean transparency for users.
Cloud App Security Broker
- Risk-aware data protection and advanced threat protection for cloud apps such as Microsoft 365 (Office 365), Google G Suite, Amazon Web Services (AWS), and more.
Insider Threat Management
- Protect information against data loss, malicious acts, and brand damage involving insiders acting maliciously, negligently, or unknowingly on the endpoint.
Data discover
- Quickly discover exposed sensitive and confidential data in on-premises file shares and SharePoint sites. Visualize and automate remediation.