<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/us/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://www.proofpoint.com/br</loc><changefreq>daily</changefreq><priority>1.0</priority></url>
<url><loc>https://www.proofpoint.com/br/blog-authors</loc><lastmod>2023-09-19T15:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/security/hall-of-fame</loc><lastmod>2026-01-21T15:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/legal/license/product-terms</loc><lastmod>2026-01-23T00:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/security/security-advisories</loc><lastmod>2025-06-13T00:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/bylines</loc><lastmod>2023-06-30T19:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/cybersecurity-tools/dlp-check</loc><lastmod>2023-11-22T08:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/company/leadership</loc><lastmod>2026-04-07T17:34Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/search</loc><lastmod>2020-07-06T05:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/awareness-materials/holiday-security-awareness-training-kit</loc><lastmod>2023-12-08T21:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/why-proofpoint/nexus-threat-graph</loc><lastmod>2024-05-14T10:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference</loc><lastmod>2022-10-12T13:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/insider-threat-management</loc><lastmod>2025-11-18T17:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/top-10-biggest-and-boldest-insider-threats</loc><lastmod>2023-08-15T15:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/business-email-compromise</loc><lastmod>2024-02-01T07:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/proofpoint-secure-email-relay</loc><lastmod>2024-11-15T15:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/phishing</loc><lastmod>2025-08-12T18:10Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/email-gateway</loc><lastmod>2024-02-26T10:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/email-security</loc><lastmod>2023-11-10T15:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/security-awareness-training</loc><lastmod>2025-06-18T09:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/email-protection</loc><lastmod>2024-03-29T17:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/essentials-threat-protection</loc><lastmod>2023-08-11T18:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/voice-of-the-ciso-report</loc><lastmod>2025-08-28T01:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/archiving-and-compliance/automate</loc><lastmod>2024-12-05T23:45Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/insider-threat-management/how-recognize-malicious-insider-threat-motivations</loc><lastmod>2024-07-12T17:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/partners/palo-alto-networks</loc><lastmod>2024-05-14T12:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/information-protection</loc><lastmod>2024-10-25T12:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/redefining-data-loss-prevention-dlp</loc><lastmod>2023-08-31T14:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/awareness-materials/social-media-awareness-kit</loc><lastmod>2023-08-15T14:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/frost-radar-global-email-security-market-report</loc><lastmod>2024-06-24T20:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/what-do-after-responding-phishing-email</loc><lastmod>2025-07-09T12:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/combat-data-loss-and-insider-risk</loc><lastmod>2026-02-19T13:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/change-user-behavior</loc><lastmod>2025-03-18T00:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/combat-email-and-cloud-threats</loc><lastmod>2025-08-07T14:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/defend-your-remote-workforce</loc><lastmod>2023-11-29T22:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/protect-cloud-apps</loc><lastmod>2024-05-28T22:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/enable-intelligent-compliance</loc><lastmod>2023-12-20T18:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/secure-microsoft-365</loc><lastmod>2025-08-25T19:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/cybersecurity-awareness-hub</loc><lastmod>2025-07-09T13:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/how-proofpoint-defends-against-ransomware</loc><lastmod>2025-07-31T08:45Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/managed-information-protection</loc><lastmod>2025-03-11T15:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/why-choose-proofpoint-essentials-for-microsoft-365</loc><lastmod>2025-08-06T22:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/managed-email-threat-protection</loc><lastmod>2024-02-07T16:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/securing-healthcare-data</loc><lastmod>2025-07-09T17:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/supply-chain-attacks</loc><lastmod>2022-10-11T16:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/breaking-down-bec</loc><lastmod>2023-08-11T12:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-market-guide-for-data-loss-prevention</loc><lastmod>2025-07-09T09:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/data-governance</loc><lastmod>2026-02-05T18:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/rounding-2021s-strangest-social-engineering-tactic</loc><lastmod>2023-11-20T16:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/email-reporting-and-remediation</loc><lastmod>2023-11-20T16:37Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/prevent-loss-from-ransomware</loc><lastmod>2025-07-09T12:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/healthcare-information-security</loc><lastmod>2025-06-23T08:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/federal</loc><lastmod>2025-06-23T08:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/higher-education-security</loc><lastmod>2025-06-23T08:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/protecting-people-new-perimeter-part-1</loc><lastmod>2022-05-06T17:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/financial-services-and-insurance</loc><lastmod>2025-06-23T08:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/mobile-message-security-solutions-for-service-providers</loc><lastmod>2025-06-23T08:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/state-and-local-government</loc><lastmod>2025-06-23T08:40Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/protection-compliance-small-business</loc><lastmod>2025-06-23T08:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/email-security-solutions-for-service-providers</loc><lastmod>2025-06-23T09:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/the-cisos-guide-to-assessing-prioritizing-and-justifying-cybersecurity-budgets</loc><lastmod>2022-06-02T13:50Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blogs/choosing-the-right-protection-for-the-right-people</loc><lastmod>2022-05-12T10:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/beyond-awareness-training</loc><lastmod>2025-05-17T00:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/essentials-email-security-partner-program</loc><lastmod>2023-06-20T12:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/actionable-insights-reduce-your-organizations-people-risk-through</loc><lastmod>2022-08-01T12:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/awareness-materials/new-perimeters</loc><lastmod>2022-11-29T16:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/security-awareness-training/change-behavior</loc><lastmod>2025-05-02T22:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/2022-social-engineering-report</loc><lastmod>2022-07-18T14:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/email-account-compromise</loc><lastmod>2024-04-04T14:24Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/behavioral-analysis-and-aiml-threat-detection-going-behind-scenes</loc><lastmod>2024-03-25T13:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/building-strong-cybersecurity-habits-nca-key-themes</loc><lastmod>2022-09-01T12:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/organizations-struggle-to-protect-against-cloud-and-web-threats</loc><lastmod>2022-09-27T10:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/actionable-insights-reduce-your-organizations-bec-risk</loc><lastmod>2025-08-18T15:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/build-program-that-fosters-thoughtful-cybersecurity-culture</loc><lastmod>2025-06-18T09:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/board-perspective-report</loc><lastmod>2023-09-06T00:12Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/board-members-challenges-to-prepare-for-cyber-attacks</loc><lastmod>2022-11-07T16:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/email-rapid-risk-assessment</loc><lastmod>2023-11-27T18:27Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/email-rapid-risk-assessment/thank-you</loc><lastmod>2023-07-06T09:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/partners/sentinelone</loc><lastmod>2023-04-14T15:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/upgrade-your-symantec-solutions</loc><lastmod>2024-02-26T09:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/updated-cybersecurity-best-practices-kit</loc><lastmod>2022-12-12T08:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/awareness-materials/3-weeks-cybersecurity-best-practices-2023</loc><lastmod>2023-08-15T14:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/chatbot-phishing-emails-what-you-need-to-know</loc><lastmod>2023-03-01T11:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/cybersecurity-platform-to-protect-people-defend-data</loc><lastmod>2023-11-20T15:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/ciso-voices-evolving-role-ciso-storyteller</loc><lastmod>2023-04-27T08:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/sitemap</loc><lastmod>2023-12-19T11:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/reduce-ransomware-risk-using-holistic-approach</loc><lastmod>2024-03-25T14:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/2023-state-of-the-phish-findings-sneak-peek</loc><lastmod>2023-12-28T15:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/ciso-voices-ciso-storyteller-part-2</loc><lastmod>2023-04-27T08:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/defence-works-is-now-proofpoint</loc><lastmod>2023-11-15T11:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/addressing-the-confusion-around-the-ciso-role</loc><lastmod>2023-05-02T10:50Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/how-to-recognize-prevent-supply-chain-risks</loc><lastmod>2023-11-20T16:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/fbis-ic3-report-financial-losses-email-fraud-increased-nearly-50-just</loc><lastmod>2025-08-18T15:39Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/illusive-is-now-proofpoint</loc><lastmod>2023-11-11T17:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/proofpoint-ranked-growth-innovation-leader-email-security-frost-radar</loc><lastmod>2023-04-06T11:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/critical-need-people-centric-cybersecurity</loc><lastmod>2025-06-18T08:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/role-ciso-post-pandemic</loc><lastmod>2023-05-04T10:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/infographics/state-of-the-phish-report-infographic-2023</loc><lastmod>2023-05-10T10:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/identity-threat-detection-response</loc><lastmod>2025-03-07T14:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/identity-threat-detection-response/shadow</loc><lastmod>2024-05-15T07:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/identity-threat-detection-response/spotlight</loc><lastmod>2024-01-22T15:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/spotlight</loc><lastmod>2023-12-04T17:50Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/shadow</loc><lastmod>2023-12-05T11:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/identity-threat-assessment-brochure</loc><lastmod>2023-05-16T10:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/identity-threat-assessment-overview</loc><lastmod>2023-08-14T14:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/evolution-of-the-ciso-role-and-skills-gap</loc><lastmod>2023-05-11T10:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/chilean-senator-pugh-interview-on-importance-of-cybersecurity</loc><lastmod>2023-04-27T09:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/proofpoint-supplier-threat-protection</loc><lastmod>2023-06-07T17:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/compliance-and-archiving/cost-of-modern-compliance</loc><lastmod>2023-05-10T12:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/how-human-behavior-impacts-cybersecurity</loc><lastmod>2023-05-31T16:23Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/break-the-attack-chain-protect-people-defend-data</loc><lastmod>2023-05-31T14:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/third-voice-ciso-shows-cisos-less-confident-about-cyber-preparedness</loc><lastmod>2023-05-09T09:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/introducing-proofpoint-supplier-threat-protection</loc><lastmod>2023-04-27T09:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/the-security-awareness-handbook</loc><lastmod>2023-08-11T13:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/identity-threat-assessment</loc><lastmod>2024-08-23T20:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/global-threat-intelligence-with-threat-intelligence-summary</loc><lastmod>2023-06-26T15:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/getting-started-with-dlp-itm</loc><lastmod>2023-08-31T12:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/analyzing-identity-risks-air-research-report</loc><lastmod>2023-07-21T10:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/trusting-transactional-email</loc><lastmod>2023-08-11T10:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/tap-account-takeover</loc><lastmod>2025-03-31T18:45Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/uncovering-bec-and-supply-chain-attacks</loc><lastmod>2025-06-18T09:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/protecting-transactional-emails-sent-on-your-behalf</loc><lastmod>2025-06-18T09:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/threat-insight/2023-human-factor-analyzes-evolving-threats-attack-chain</loc><lastmod>2025-06-18T09:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/actionable-insights-reduce-your-organizations-risk-toad-attack</loc><lastmod>2023-07-13T10:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/how-to-build-an-information-protection-program</loc><lastmod>2025-06-18T09:07Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/protect-your-data-with-single-endpoint-agent</loc><lastmod>2023-09-28T20:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/reasons-to-augment-microsoft-365-native-email-security</loc><lastmod>2025-06-18T09:27Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/tecnicas-avancadas-de-ciberataques-antes-restritas-hackers-experientes</loc><lastmod>2023-06-17T00:15Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/help-users-build-strong-secure-browsing-habits</loc><lastmod>2023-07-27T01:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/proofpoint-recognized-forrester-wave-email-security-q2-2023</loc><lastmod>2024-03-25T14:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/prevent-identity-attacks-and-credential-abuse-with-itdr</loc><lastmod>2023-06-28T22:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/defending-against-evilproxy-phishing-toolkit</loc><lastmod>2023-08-03T16:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/takeaways-from-2023-verizon-data-breach-investigations-report</loc><lastmod>2024-03-25T13:56Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/free-trial-request</loc><lastmod>2025-04-15T17:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/eight-stages-of-the-ransomware-attack-chain</loc><lastmod>2025-08-06T08:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/rapid-risk-report</loc><lastmod>2023-09-22T14:40Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/board-members-feel-unprepared-big-cyber-attacks</loc><lastmod>2025-07-09T09:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/zenguide-premium-services</loc><lastmod>2025-01-22T14:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/microsoft-office-365-security-vulnerabilities</loc><lastmod>2023-11-14T16:10Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/identity-threats-new-attack-surface</loc><lastmod>2025-06-18T09:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/identity-threat-defense/identity-risk-threat-vulnerability-management</loc><lastmod>2024-02-01T06:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/building-resilience-email-attacks-ai-and-microsoft</loc><lastmod>2025-08-06T07:56Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/build-security-culture-break-the-attack-chain</loc><lastmod>2025-06-18T09:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/relatorio-anual-da-proofpoint-revela-que-quase-metade-do-conselho</loc><lastmod>2023-09-12T02:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/ciso-perspective-identity-threats</loc><lastmod>2025-06-18T09:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/day-in-the-life-of-cybersecurity-analyst</loc><lastmod>2024-03-25T13:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/google-and-yahoo-set-new-email-authentication-requirements</loc><lastmod>2024-08-13T13:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/proofpoint-top-choice-augmenting-microsoft-365-email-security-via-api</loc><lastmod>2025-06-23T22:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/identity-threat-defense/identity-threat-protection-break-the-attack-chain</loc><lastmod>2025-06-18T09:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-protect-organizations-against-bec-phishing</loc><lastmod>2023-12-22T21:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/managed-abuse-mailbox</loc><lastmod>2025-03-21T11:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/email-dmarc-compliance-check</loc><lastmod>2024-02-02T17:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/security-awareness-program-mistakes-how-to-fix</loc><lastmod>2024-02-08T16:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-assina-acordo-definitivo-para-aquisicao-da-tessian</loc><lastmod>2023-11-01T15:24Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/partners/trusted-data-solutions-partnership</loc><lastmod>2024-01-11T22:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/dmarc-key-to-email-deliverability</loc><lastmod>2024-06-24T20:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/ransomware</loc><lastmod>2026-02-19T13:38Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/consumidores-brasileiros-correm-risco-de-fraude-por-e-mail-nesta-black</loc><lastmod>2023-11-30T17:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/identity-threat-detection-response-challenges-solutions</loc><lastmod>2024-07-01T20:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-conclui-aquisicao-da-tessian</loc><lastmod>2023-12-21T07:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/buyers-guide-identity-threat-detection-and-response</loc><lastmod>2025-03-07T14:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/survey-finds-brasil-users-take-risky-actions</loc><lastmod>2024-03-13T18:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/2024-data-loss-landscape-report-dlp</loc><lastmod>2024-08-27T13:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/email-rapid-risk-assessment</loc><lastmod>2024-08-30T08:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/blueprint-defending-privileged-identities</loc><lastmod>2025-03-07T14:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/how-to-buy/collaboration-security</loc><lastmod>2026-02-23T19:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/data-security-landscape-report</loc><lastmod>2025-11-05T20:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/data-loss-prevention</loc><lastmod>2025-07-09T09:56Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/relatorio-da-proofpoint-revela-que-funcionarios-descuidados-sao-o-maior</loc><lastmod>2024-03-22T10:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/63-das-empresas-brasileiras-no-global-2000-estao-colocando-seus-clientes-em</loc><lastmod>2024-03-19T17:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/threat-insight/threat-actors-deliver-malware-youtube-video-game-cracks</loc><lastmod>2024-06-06T21:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom</loc><lastmod>2026-04-03T18:42Z</lastmod><changefreq>weekly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases</loc><lastmod>2025-10-22T21:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/in-the-news</loc><lastmod>2025-10-22T21:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/awards</loc><lastmod>2025-06-13T00:09Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/media-kit</loc><lastmod>2026-01-21T15:40Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/impersonation-protection</loc><lastmod>2025-06-23T08:27Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/identity-protection</loc><lastmod>2025-04-23T20:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-security-governance</loc><lastmod>2026-02-19T13:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/adaptive-email-dlp</loc><lastmod>2026-01-08T23:40Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/mitigate-human-risk</loc><lastmod>2026-03-02T14:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/email-dlp-encryption</loc><lastmod>2026-01-10T07:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/threat-protection</loc><lastmod>2026-03-30T18:11Z</lastmod><changefreq>weekly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/email-protection</loc><lastmod>2026-02-19T13:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/how-to-buy/data-security</loc><lastmod>2026-03-19T16:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-loss-prevention</loc><lastmod>2026-01-04T07:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/insider-threat-management</loc><lastmod>2026-01-10T07:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/qr-code-phishing-simulation</loc><lastmod>2024-08-29T21:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-mimecast</loc><lastmod>2026-04-07T23:25Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/compliance-and-archiving/simplifying-complexities-data-export-for-ediscovery</loc><lastmod>2024-07-12T17:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/celebrating-pride-2024-week-1</loc><lastmod>2024-07-12T15:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/page-not-found</loc><lastmod>2024-05-29T21:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/best-practices-threat-driven-security-awareness-content</loc><lastmod>2025-07-09T13:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/preventing-impersonation-fraud-semantic-analysis-llm</loc><lastmod>2024-07-12T17:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/celebrating-pride-2024-week-2</loc><lastmod>2024-07-12T15:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/generative-ai-transforming-social-engineering</loc><lastmod>2024-07-23T04:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/celebrating-pride-2024-week-3</loc><lastmod>2024-07-12T15:24Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/seguranca-centrada-em-pessoas-no-ecossistema-de-ciberseguranca-e-estrategia</loc><lastmod>2024-09-03T14:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-and-microsoft</loc><lastmod>2025-07-24T17:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/compliance-and-archiving/uncovering-ediscovery-insights-through-data-visualization</loc><lastmod>2024-08-26T14:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-cisco</loc><lastmod>2025-09-22T13:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-microsoft-purview</loc><lastmod>2025-09-16T09:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-legacy-dlp</loc><lastmod>2026-02-19T13:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare</loc><lastmod>2026-04-06T19:09Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/building-effective-security-awareness-program-employees</loc><lastmod>2025-07-09T13:23Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/buyers-guide-data-loss-prevention-solutions</loc><lastmod>2024-07-31T14:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/identity-protection/account-takeover</loc><lastmod>2026-01-07T22:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/tessian-is-now-proofpoint</loc><lastmod>2025-06-18T20:47Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/generative-ai-risks-to-know</loc><lastmod>2024-08-29T21:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/evaluators-guide-information-protection-solutions</loc><lastmod>2025-07-25T20:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/insider-threat-management/insider-threat-visibility-reduce-risk-gain-efficiency</loc><lastmod>2024-11-12T18:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/how-effective-your-insider-risk-program</loc><lastmod>2024-09-16T16:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/identity-threat-defense/cyberark-proofpoint-collaboration-secure-identities-web-browsing</loc><lastmod>2024-11-13T06:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/platform</loc><lastmod>2026-02-07T00:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training/beyond-security-awareness-sustained-behavior-change</loc><lastmod>2024-11-13T07:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/platform/nexus</loc><lastmod>2025-09-16T09:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/buyers-guide-insider-threat-management-solutions</loc><lastmod>2024-09-21T11:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/first-90-days-hidden-risk-for-insider-threats</loc><lastmod>2024-09-19T12:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/steps-building-insider-risk-program</loc><lastmod>2024-09-23T13:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-impulsiona-o-poder-da-ia-comportamental-para-impedir-perda-de</loc><lastmod>2024-09-24T18:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/comparing-proofpoint-dlp-with-microsoft-purview</loc><lastmod>2024-12-10T14:37Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-signs-definitive-agreement-acquire-normalyze</loc><lastmod>2024-11-04T09:23Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-magic-quadrant-for-email-security</loc><lastmod>2025-12-03T20:16Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/whats-best-way-send-transactional-email</loc><lastmod>2024-11-25T12:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-magic-quadrant-digital-communications-governance</loc><lastmod>2025-11-04T20:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/microsoft-365-email-security-and-beyond</loc><lastmod>2025-04-29T09:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/ai-data-security-and-ciso-shifts-top-cybersecurity-trends-watch-2025</loc><lastmod>2026-02-19T13:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/data-security-posture-management-dspm</loc><lastmod>2026-02-05T17:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/proofpoint-dlp-vs-microsoft-purview</loc><lastmod>2024-12-21T15:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/ensure-acceptable-genai-use</loc><lastmod>2025-06-23T09:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/proofpoint-leader-2024-gartner-magic-quadrant-email-security</loc><lastmod>2025-06-18T09:23Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/partners/msp</loc><lastmod>2025-05-14T15:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/solving-enterprise-data-complexity-with-dspm</loc><lastmod>2025-02-14T17:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/digital-communications-governance</loc><lastmod>2025-03-11T13:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/compliance-and-archiving/proofpoint-named-leader-2025-gartner-magic-quadrant-digital</loc><lastmod>2025-07-28T21:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/data-security-posture-management</loc><lastmod>2025-07-28T19:39Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/regain-control-of-application-email-relaying</loc><lastmod>2025-06-18T09:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/buyers-guide-data-security-posture-management</loc><lastmod>2025-07-31T02:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/industry-comparison/dlp</loc><lastmod>2025-09-17T08:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-critical-capabilities-for-email-security</loc><lastmod>2025-12-30T19:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/messaging-protection</loc><lastmod>2026-02-07T07:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/collab-protection</loc><lastmod>2026-01-27T17:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/user-protection</loc><lastmod>2025-03-26T18:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/industry-comparison/email-security</loc><lastmod>2026-02-19T13:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/channel-partners-and-distributors</loc><lastmod>2026-02-03T19:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/user-protection</loc><lastmod>2025-05-17T00:10Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/api-email-security</loc><lastmod>2025-07-15T17:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/threat-protection-overview</loc><lastmod>2025-05-01T13:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/why-upgrade-to-collaboration-security-prime</loc><lastmod>2026-04-07T21:17Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/commercial-prime-threat-protection</loc><lastmod>2025-07-25T23:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/dspm/cspm-vs-dspm-understanding-the-differences</loc><lastmod>2025-04-03T08:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/more-secure-together-proofpoint-microsoft</loc><lastmod>2025-06-23T22:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/future-of-email-dlp</loc><lastmod>2025-04-15T15:40Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/cep-demo</loc><lastmod>2025-05-18T18:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/data-security-gen-ai</loc><lastmod>2025-05-07T13:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/dspm-for-snowflake</loc><lastmod>2025-04-08T09:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/esg-data-resilience-essentials-pack</loc><lastmod>2025-05-06T21:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/simplify-data-access-governance-dspm</loc><lastmod>2026-02-19T13:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/continuous-compliance-made-easy-dspm</loc><lastmod>2025-05-13T02:37Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/secure-sensitive-data-ai-pipelines-dspm</loc><lastmod>2025-09-11T17:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/reduce-risk-and-cost-abandoned-data-dspm</loc><lastmod>2025-09-09T16:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/understanding-core-email-protection-api-and-adaptive-email-dlp</loc><lastmod>2025-07-31T19:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/microsoft-start-enforcing-outbound-email-limits</loc><lastmod>2025-04-17T09:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/modernize-email-data-security-adaptive-approach</loc><lastmod>2025-04-18T07:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/normalyze-is-now-proofpoint</loc><lastmod>2025-04-16T08:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/human-risk-explorer</loc><lastmod>2025-08-04T20:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/threat-reference/human-centric-security</loc><lastmod>2025-07-09T09:12Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/email-and-beyond-threats-across-digital-platforms</loc><lastmod>2025-06-20T16:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats/revolutionising-your-soc-welcome-threat-protection-workbench</loc><lastmod>2025-05-07T15:15Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/esg-technical-validation-dspm</loc><lastmod>2025-09-08T19:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/prime-innovations-expanded-defenses-demo</loc><lastmod>2025-06-23T23:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-unveils-industrys-first-and-only-unified-solution-reduce-costs</loc><lastmod>2025-07-11T20:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/videos/prime-innovations-simplified-operations-demo</loc><lastmod>2025-08-18T17:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/force-multiplier-modern-cybersecurity-architecture</loc><lastmod>2025-06-08T20:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/implementing-human-centric-security-modern-digital-workspace</loc><lastmod>2025-06-05T21:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/definitive-guide-stopping-human-centric-threats</loc><lastmod>2025-07-16T01:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/email-security-buyers-guide</loc><lastmod>2025-08-05T20:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-assina-acordo-definitivo-para-adquirir-hornetsecurity</loc><lastmod>2025-05-19T21:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-abnormal-security</loc><lastmod>2026-04-06T19:32Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/adaptive-email-dlp</loc><lastmod>2026-02-19T13:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/esg-economic-value-data-security</loc><lastmod>2025-07-31T01:39Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/forrester-wave-report-email-messaging-collaboration-security-solutions</loc><lastmod>2025-07-15T22:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/platform/zen</loc><lastmod>2025-06-14T03:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-security-posture-management/use-cases/M365-copilot</loc><lastmod>2025-10-06T17:23Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/economic-benefits-prime-threat-protection-esg-report</loc><lastmod>2025-07-25T14:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/data-loss-assessment</loc><lastmod>2026-02-19T13:24Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/collaboration-security-prime</loc><lastmod>2026-02-27T09:27Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-overcome-ai-powered-attacks-leveling-your-email-security-platform</loc><lastmod>2025-07-28T20:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/news/protecao-olimpica-como-paris-prepara-ciberseguranca-para-os-jogos</loc><lastmod>2025-07-14T17:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-security-posture-management/use-cases/snowflake</loc><lastmod>2026-02-19T13:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-security-posture-management/use-cases/ai-training</loc><lastmod>2025-09-09T11:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/managed-service-providers</loc><lastmod>2025-08-28T01:13Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/news/cibercrime-nacional-mira-sistema-financeiro-com-ataques-centrados-no-usuario</loc><lastmod>2025-07-18T17:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-lanca-primeira-e-unica-solucao-unificada-do-setor-para-reduzir</loc><lastmod>2025-07-21T17:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-lanca-oferta-de-governanca-de-comunicacoes-com-inovacoes</loc><lastmod>2026-02-19T13:39Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-adquire-nuclei-para-captura-e-arquivamento-aprimorados-de</loc><lastmod>2025-07-21T17:14Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-e-nomeada-lider-no-gartnerr-magic-quadranttm-2024-para</loc><lastmod>2025-07-21T17:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-define-novo-padrao-para-seguranca-centrada-no-ser-humano-atraves</loc><lastmod>2025-07-21T17:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-e-cyberark-expandem-parceria-estrategica-para-proteger-de-forma</loc><lastmod>2025-07-21T17:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-apresenta-framework-abrangente-de-protecao-de-informacoes-para</loc><lastmod>2025-07-21T17:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-amplia-lideranca-em-arquivamento-e-compliance-com-uma-nova-oferta</loc><lastmod>2025-07-21T17:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-faz-alianca-global-com-microsoft-para-fortalecer-ciberseguranca</loc><lastmod>2025-07-21T17:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/mais-da-metade-dos-principais-sites-de-viagens-no-brasil-colocam-os</loc><lastmod>2025-07-21T17:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/relatorio-da-proofpoint-revela-que-aproximadamente-71-dos-cisos-brasileiros</loc><lastmod>2025-07-21T18:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-anuncia-disponibilidade-de-suas-solucoes-de-seguranca-centradas</loc><lastmod>2025-07-21T18:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/data-security-posture-management/use-cases/abandoned-data-discovery</loc><lastmod>2025-09-10T09:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-check-point-harmony</loc><lastmod>2025-09-23T07:01Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/prime-threat-protection-suite</loc><lastmod>2025-09-03T13:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/human-factor-url-phishing</loc><lastmod>2025-09-17T20:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives/key-insights-proofpoint-2025-voice-ciso-report</loc><lastmod>2025-09-03T10:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/maximizing-security-roi-aligning-with-nist-csf-2</loc><lastmod>2025-12-20T00:50Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/data-security</loc><lastmod>2025-10-27T19:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/stop-ai-agents-losing-data</loc><lastmod>2025-09-24T08:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/data-visibility-and-control-with-data-security-complete</loc><lastmod>2026-02-19T13:50Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/collaboration-security-innovations-trust-agentic-workspace</loc><lastmod>2025-09-24T13:12Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/satori-agents-force-multiplier</loc><lastmod>2025-09-25T17:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/collaboration-and-data-security-todays-agentic-workspace</loc><lastmod>2026-02-19T13:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/industry-comparison/dspm</loc><lastmod>2026-01-06T16:05Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/platform/satori</loc><lastmod>2025-10-31T16:48Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-secures-collaboration-and-data-agentic-workspace-industry-first</loc><lastmod>2025-09-25T14:28Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/events/protect-series</loc><lastmod>2026-03-24T06:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-data-security-vs-sse-vendors</loc><lastmod>2026-02-05T17:38Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/compare/proofpoint-vs-symantec</loc><lastmod>2025-12-15T13:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/it-directors-guide-to-better-microsoft-365-email-security</loc><lastmod>2025-11-12T00:53Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/industry-comparison/ai-cybersecurity-companies</loc><lastmod>2026-01-20T09:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/securing-governing-ai-data-guide</loc><lastmod>2025-12-11T20:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/relatorio-voz-do-ciso-2025-da-proofpoint-revela-aumento-do-risco-de-ia</loc><lastmod>2025-10-29T19:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/moving-from-legacy-email-gateway-to-proofpoint</loc><lastmod>2025-12-05T19:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection/ai-adoption-insider-risk-data-sprawl-data-security-report</loc><lastmod>2025-11-13T11:03Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gartner-customers-choice-dlp</loc><lastmod>2025-11-18T17:45Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news/hornetsecurity-proofpoint-extending-human-and-agent-centric-security-every</loc><lastmod>2025-12-10T11:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-completes-acquisition-hornetsecurity</loc><lastmod>2025-12-10T17:36Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/stopping-hijacked-business-communication-use-case</loc><lastmod>2026-02-26T08:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/free-demo-request</loc><lastmod>2026-01-20T23:38Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ameacas-na-nuvem-e-no-email/proofpoint-novamente-indicada-como-lider-em-seguranca-de-e-mail-no</loc><lastmod>2026-01-12T14:26Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/advisory-services</loc><lastmod>2026-01-15T17:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/applied-services</loc><lastmod>2026-01-13T18:19Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/why-proofpoint</loc><lastmod>2026-02-16T10:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2026-01-20T17:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/ai-powered-email-security-proofpoint-microsoft</loc><lastmod>2026-02-24T08:37Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/analyst-reports/gigaom-data-security-platforms-report</loc><lastmod>2026-02-17T10:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/securing-the-agentic-workspace</loc><lastmod>2026-03-09T09:10Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/defending-against-account-compromise</loc><lastmod>2026-03-11T14:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-adquire-acuvity-para-ampliar-seguranca-e-governanca-de-ia-no</loc><lastmod>2026-02-13T20:53Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-launches-proofpoint-partner-network</loc><lastmod>2026-02-17T15:20Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/nuclei-discovery-and-archive-suite</loc><lastmod>2026-03-02T17:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/deploying-m365-copilot-securely</loc><lastmod>2026-03-09T09:57Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-collaboration-security-integrates-new-extended-plan-aws-security</loc><lastmod>2026-02-27T16:08Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/node/145678</loc><lastmod>2026-03-04T00:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/webinars</loc><lastmod>2026-03-04T01:24Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/ai-mcp-security</loc><lastmod>2026-04-06T08:44Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/collaboration-security-tier-2</loc><lastmod>2026-03-30T16:48Z</lastmod><changefreq>weekly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/ai-at-proofpoint-nexus-ai-detection</loc><lastmod>2026-04-06T17:50Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/securing-the-workspace-in-the-age-of-ai</loc><lastmod>2026-04-03T04:17Z</lastmod><changefreq>weekly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/newsroom/press-releases/proofpoint-unveils-industrys-newest-intent-based-ai-security-solution</loc><lastmod>2026-03-18T15:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/email-protection</loc><lastmod>2026-02-19T13:12Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/targeted-attack-protection</loc><lastmod>2023-08-11T10:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/ransomware-survival-guide</loc><lastmod>2023-10-30T17:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solutions-briefs/advanced-email-security</loc><lastmod>2023-08-11T18:42Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/definitive-email-security-strategy-guide</loc><lastmod>2024-06-24T20:06Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/human-factor-social-engineering</loc><lastmod>2025-05-27T20:29Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/proofpoint-essentials-small-and-medium-enterprises</loc><lastmod>2023-08-11T18:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/efd360</loc><lastmod>2024-11-12T17:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/threat-reports/state-of-phish</loc><lastmod>2024-03-18T12:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/try-security-awareness-training</loc><lastmod>2025-07-09T13:21Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/security-awareness-training-summary</loc><lastmod>2024-11-20T17:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/email-protection/email-fraud-defense</loc><lastmod>2025-06-23T08:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/email-protection/essentials</loc><lastmod>2025-08-07T13:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/contact</loc><lastmod>2026-01-30T10:56Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/support-services</loc><lastmod>2025-05-06T21:17Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/advanced-threat-protection/threat-response</loc><lastmod>2025-08-07T14:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/cloud-security/cloud-app-security-broker</loc><lastmod>2025-07-10T08:32Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/learn-more/itm-free-demo</loc><lastmod>2024-08-27T13:33Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/reduce-risk-with-people-centric-security</loc><lastmod>2023-08-14T14:04Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/solution-bundles</loc><lastmod>2023-08-11T11:15Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/solutions/bec-and-eac-protection</loc><lastmod>2025-04-23T22:45Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/security-awareness-training/phishing-simulations</loc><lastmod>2024-05-15T07:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/security-awareness-training/modules-videos-materials</loc><lastmod>2025-08-07T14:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/bec-scams</loc><lastmod>2024-10-24T16:38Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/effective-solution-combatting-bec-and-eac</loc><lastmod>2025-04-23T03:30Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/five-steps-to-combat-bec</loc><lastmod>2025-04-23T03:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/security-awareness-training-driving-behavior-change</loc><lastmod>2025-06-18T09:02Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/email-protection/open-source-email-solution</loc><lastmod>2025-08-07T13:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/advanced-threat-protection/et-intelligence</loc><lastmod>2026-04-06T08:22Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/data-sheets/takedown</loc><lastmod>2025-03-26T17:39Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/digital-communications-governance/track</loc><lastmod>2026-01-08T19:31Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/digital-communications-governance/patrol</loc><lastmod>2026-01-08T20:16Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/awareness-materials/cybersecurity-awareness-kit</loc><lastmod>2025-10-01T19:55Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/e-books/secure-your-microsoft-365-deployment</loc><lastmod>2024-10-03T17:22Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/solution-briefs/human-risk-explorer</loc><lastmod>2025-07-11T23:27Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/managed-email-threat-protection</loc><lastmod>2024-01-22T21:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/products/premium-services/recurring-consultative-services</loc><lastmod>2024-01-24T18:46Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources/white-papers/hidden-cost-of-mso365-security</loc><lastmod>2023-08-11T11:18Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/partners/crowdstrike</loc><lastmod>2025-02-25T14:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/cloud-security</loc><lastmod>2025-01-30T16:43Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/information-protection</loc><lastmod>2025-01-30T16:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/security-awareness-training</loc><lastmod>2025-01-30T16:58Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/threat-insight</loc><lastmod>2025-01-30T17:00Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/compliance-and-archiving</loc><lastmod>2025-01-30T16:35Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/insider-threat-management</loc><lastmod>2025-01-30T16:54Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/corporate-news</loc><lastmod>2025-01-30T16:44Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/email-and-cloud-threats</loc><lastmod>2025-01-30T16:49Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/remote-workforce-protection</loc><lastmod>2025-01-30T16:56Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/ciso-perspectives</loc><lastmod>2025-01-30T16:41Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/engineering-insights</loc><lastmod>2025-01-30T16:51Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2024-01-16T23:59Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2024-01-05T21:11Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/blog/dspm</loc><lastmod>2025-03-05T23:52Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2023-05-21T09:34Z</lastmod><changefreq>monthly</changefreq></url>
<url><loc>https://www.proofpoint.com/br/resources</loc><lastmod>2021-10-05T23:25Z</lastmod><changefreq>monthly</changefreq></url>
</urlset>
