Home Page

Hero Component

Happening Now

Happening Now



Choices Component

SOLUTIONS

THREAT PROTECTION

Detect, block, and respond to email and social media-based threats, and harden against data loss

COMPLIANCE

Comply easily and thoroughly with internal security controls as well as external regulatory policies

DISCOVERY

Find information quickly—whether it resides on email, IM, social media, shared drives or SharePoint

Threat Insights Component

Threat Insight

Research and commentary on malware, user actions, and other threats to information security

Sep 04

Too Many Crooks in the Kitchen

Posted by Proofpoint Staff | 0

What happens when threat actors overload an exploit kit? Proofpoint researchers open door of a malware clown car.

27 August 2015

Hunter Exploit Kit Targets Brazilian Banking Customers

Posted by Proofpoint Staff | 0

Proofpoint threat researchers analyze a new exploit kit priced to bring flexible malware delivery to cost-conscious cybercriminals.

Live Demo

JOIN US FOR A LIVE DEMO

ARCHIVE

Learn how our leading Archive solution can help your organization keep information safe and compliant.

THREAT PROTECTION

Learn how our advanced threat protection solutions can keep your organization protected from spam, phishing, and other advanced threats.

INCIDENT RESPONSE

Learn about our solutions for incident response and threat intelligence and see how your organization can minimize the damage of an attack.

3 Article Component

PROOFPOINT IN THE NEWS