Defend against threats, ensure business continuity, and implement email policies.
Email Security and Protection
Email Fraud Defense
Domain Discover For Email
Mail Routing Agent
Sendmail Open Source
Essentials for Small Business
Advanced Threat Protection
Protect against email, mobile, social and desktop threats.
Targeted Attack Protection in Email
Targeted Attack Protection For SaaS
Targeted Attack Protection for Webmail
Emerging Threats Intelligence
Premium Threat Information Service
Cloud App Security
Defend against cyber criminals accessing your sensitive data and trusted accounts.
Cloud Account Defense
Cloud App Security Broker
Archiving and Compliance
Reduce risk, control costs and improve data visibility to ensure compliance.
Enterprise Collaboration Archiving
E-discovery and Analytics
Safeguard data in email, cloud apps, on-premise file shares and SharePoint.
Email Data Loss Prevention (DLP)
Digital Risk Protection
Protect against digital security risks across web domains, social media and the deep and dark web.
Guide: Cybersecurity for the Modern Era
Download the report to learn how to stop today’s advanced attacks.
Solutions by Topic
Protect your people and data in Microsoft Office 365 with unmatched security and compliance tools.
Next Generation Compliance Solutions
Safeguard business-critical information from data exfiltration, compliance risks and violations.
Block attacks with a layered solution that protects you against every type of email fraud threat.
EU General Data Protection Regulation (GDPR)
Identify, classify and protect your sensitive data from advanced threats.
Digital Brand, Security and Compliance Risk
Eliminate the brand, security and compliance risks that stand in the way of digital engagement.
Replace McAfee Email Security Products
Stay ahead of email threats with email security from the exclusive migration partner of Intel Security.
Solutions by Industry
Mobile for ISPs
Email for ISPs
Small and Medium Businesses
Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business.
Archive Extraction Partners
Learn about the benefits of becoming a Proofpoint Extraction Partner.
Technology and Alliance Partners
Learn about our relationships with industry-leading firms to help protect your people, data and brand.
Social Media Protection Partners
Learn about the technology and alliance partners in our Social Media Protection Partner program.
Find a Channel Partner
Become a Channel Partner
Channel Partner Portal
Find the information you're looking for in our library of videos, data sheets, white papers and more.
Keep up with the latest news and happenings in the ever-evolving cybersecrity landscape.
Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges.
Learn about our threat operations center and read about the latest risks in our threat blog and reports.
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people.
Read the latest press releases, news stories and media highlights about Proofpoint.
Access the full range of Proofpoint support services.
Digital Risk Portal
Email Fraud Defense
Sendmail Support Log-in
October 23, 2017
U.S. Government’s DMARC Mandate: Why the Australian Government Ought to Follow Suit
April 21, 2017
A Quiet Quarter Ends With a Bang: Proofpoint Q1 Threat Report
March 22, 2017
New Proofpoint Research Reveals a 45% Surge in Business Email Compromise Attacks—and Increased Domain Spoofing
Browse by category:
Security Awareness Training
October 18, 2016
“O’zapft is!”: Cyber criminals tap into German-speaking targets in time for Oktoberfest
October 13, 2016
The Storm After the Calm: Proofpoint Q3 Threat Summary Tracks Locky Ransomware, Social Threats, BEC, and More
October 06, 2016
Don’t Bite: Top 5 Email Phishing Lures
October 11, 2016
Peas in a pod: Microsoft patches CVE-2016-3298, a second information disclosure zero-day used in malvertising campaigns and the Neutrino Exploit Kit
October 06, 2016
Matthew Mesa, Axel F, Proofpoint Staff
Looking for Trouble: Windows Troubleshooting Platform Leveraged to Deliver Malware
October 05, 2016
Hades Locker Ransomware Mimics Locky
September 20, 2016
Ursnif Banking Trojan Campaign Ups the Ante with New Sandbox Evasion Techniques
September 23, 2016
MarsJoke Ransomware Mimics CTB-Locker
August 04, 2016
Malicious Apps and Social Media Scams Target 2016 Rio Olympic Fans and Brands
October 04, 2016
10 Tips on How to Identify a Phishing Email
Load more posts
February 02, 2017
Hook, line, and sinker - A closer look at a sophisticated phishing kit
January 19, 2017
Eight Cybersecurity Predictions and Recommendations for 2017
January 17, 2017
EITest Nabbing Chrome Users with a “Chrome Font” Social Engineering Scheme
January 12, 2017
Targeted Threat Leads to Keylogger via Fake Silverlight Update