overlay-image

Proofpoint Packages

Human-centric cybersecurity packages from Proofpoint. Maximise protection. Optimise value.

Protect People

Visibility, insight and controls to prevent and mitigate four key sources of people-based risk. People Protection packages from Proofpoint can help you manage the entire spectrum of threats.

Core

Threat Protection

Stop inbound email threats and drive security awareness. Accurately detect and block BEC, phishing emails, malware, spam and more with unparalleled threat intelligence and AI-driven technology. Change unsafe user behaviour with threat-driven and personalised learning.

 

What you get

  • P0
    • Email Protetion
    • Targeted Attack Protection
    • Threat Response Auto Pull
  • P1
    • Email Protection
    • Targeted Attack Protection
    • Threat Response Auto Pull
    • Security Awareness

Plus

Impersonation Protection

Authenticate email and identify risky suppliers. Protect your business communications from brand abuse and compromised suppliers. Authenticate employee and application email while defending against compromised suppliers.

 

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection

Advanced

Impersonation Protection

 

Adaptive Email DLP

Stop data loss with behavioural AI. Automatically detect and prevent email misdelivery, misattached files and data exfiltration in real time. Drastically reduce time spent on configuration, investigation and remediation.

 

Email DLP and Encryption

Stop data loss with built-in or custom policies. Mitigate the risk of a data breach via email. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.

 

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection
  • Misdirected Email Protection
  • Email Exfiltration Protection
  • Email DLP
  • Email Encryption

Complete

Impersonation Protection

 

Adaptive Email DLP

 

Email DLP and Encryption

 

Identity Protection

Discovers vulnerable identities and surfaces compromised accounts in the cloud and on endpoints. It detects privilege escalation and stops lateral movement leveraging deceptions, revokes access to compromised accounts, reverses manipulated MFA settings and access to third-party apps. 

 

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection
  • Misdirected Email Protection
  • Email Exfiltration Protection
  • Email DLP
  • Email Encryption
  • Identity Threat Defence
  • Targeted Attack Protection Account Takeover

Core

Plus

Advanced

Complete

Threat Protection

Stop inbound email threats and drive security awareness. Accurately detect and block BEC, phishing emails, malware, spam and more with unparalleled threat intelligence and AI-driven technology. Change unsafe user behaviour with threat-driven and personalised learning.

Impersonation Protection

Authenticate email and identify risky suppliers. Protect your business communications from brand abuse and compromised suppliers. Authenticate employee and application email while defending against compromised suppliers.

Impersonation Protection

 

Adaptive Email DLP

Stop data loss with behavioural AI. Automatically detect and prevent email misdelivery, misattached files and data exfiltration in real time. Drastically reduce time spent on configuration, investigation and remediation.

 

Email DLP and Encryption

Stop data loss with built-in or custom policies. Mitigate the risk of a data breach via email. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.

Impersonation Protection

 

Adaptive Email DLP

 

Email DLP and Encryption

 

Identity Protection

Discovers vulnerable identities and surfaces compromised accounts in the cloud and on endpoints. It detects privilege escalation and stops lateral movement leveraging deceptions, revokes access to compromised accounts, reverses manipulated MFA settings and access to third-party apps. 

What you get

  • P0
    • Email Protection
    • Targeted Attack Protection
    • Threat Response Auto Pull
  • P1
    • Email Protection
    • Targeted Attack Protection
    • Threat Response Auto Pull
    • Security Awareness

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection
  • Misdirected Email Protection
  • Email Exfiltration Protection
  • Email DLP
  • Email Encryption

What you get

  • Email Fraud Defence
  • Secure Email Relay
  • Supplier Threat Protection
  • Misdirected Email Protection
  • Email Exfiltration Protection
  • Email DLP
  • Email Encryption
  • Identity Threat Defence
  • Targeted Attack Protection Account Takeover

Defend Data

Shift from reactive to proactive data protection with Information Protection packages from Proofpoint. Adaptive, human-centric data-loss prevention to help identify and mitigate risks before they result in a data breach.

Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.

 

What you get

  • Misdirected Email Protection
  • Email Exfiltration Protection

 

Book a demo

Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.

 

What you get

  • Email DLP
  • Email Encryption

 

Book a demo

Protect against data loss involving insiders acting maliciously, negligently, or unknowingly. Correlate user activity and data movement to identify user risk, detect incidents, and accelerate response.

 

What you get

  • Insider Threat Management

 

Book an Insider Threat workshop

Prevent data loss from managed and unmanaged endpoints and sanctioned cloud apps, with a modern approach. Investigate data loss incidents in seconds with unified data and user risk.

 

What you get

  • Insider Threat Management
  • Endpoint DLP
  • Cloud DLP
  • SaaS Isolation
  • Optical Character Recognition (OCR) for Cloud
  • Nexus People Risk Explorer

 

Book a DLP workshop

Mitigate regulatory, legal, or corporate compliance risk and accelerate investigations by capturing, monitoring and preserving digital communications.

 

What you get

  • Capture
  • Patrol
  • Track
  • Archive
  • Discover
  • Supervision
  • Automate

 

Book a demo

Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.

Mitigate the risk of a data breach via email with built-in or custom policies. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.

Protect against data loss involving insiders acting maliciously, negligently, or unknowingly. Correlate user activity and data movement to identify user risk, detect incidents, and accelerate response.

Prevent data loss from managed and unmanaged endpoints and sanctioned cloud apps, with a modern approach. Investigate data loss incidents in seconds with unified data and user risk.

Mitigate regulatory, legal, or corporate compliance risk and accelerate investigations by capturing, monitoring and preserving digital communications.

What you get

  • Misdirected Email Protection
  • Email Exfiltration Protection

What you get

  • Email DLP
  • Email Encryption

What you get

  • Insider Threat Management

What you get

  • Insider Threat Management
  • Endpoint DLP
  • Cloud DLP
  • SaaS Isolation
  • Optical Character Recognition (OCR) for Cloud
  • Nexus People Risk Explorer

What you get

  • Capture
  • Patrol
  • Track
  • Archive
  • Discover
  • Supervision
  • Automate