Email Data Loss Prevention (DLP)

Information Protection

Eメールは、組織外部から内部にやってくるインバウンド型の脅威の中で、最も重要なリスクベクタです。また、組織内部から外部に流出されるアウトバウンド型のデータ窃取にとっても重要な脅威のベクトルです。「Proofpoint Email Data Loss Prevention (以下、Proofpoint Email DLP)」は、メールデータを損失するリスクを軽減し、メール詐欺から組織を保護します。W2のアウトバウンド通信や、なりすまし詐欺をおこなう攻撃者への転送要求を防止します。Proofpoint Email DLPを使用すると、企業から窃取される電子メールを完全に可視化し、管理することができます。

Deeper Analysis and Fingerprinting

Analyze email content in detail. When needed, block parts of outgoing email and similar content from being sent. Email DLP solutions also looks for all standard forms of restricted content, such as PCI, HIPAA, FINRA and other regulated material.

Our Digital Asset Security feature accurately detects sensitive data in unstructured content. You can monitor and manage a specific network folder. Sensitive enterprise documents are automatically fingerprinted. Digital Asset Security finds partial and full fingerprint matches, even if the data resides in a different file format.

You can also control content that is unique to your enterprise, such as patents and memos. If someone tries to email sensitive assets, the message can be routed back to the user, HR, IT, or anyone else designated by your policy. 

Proofpoint Cybersecurity Solutions, Services, and Training

Protection from Impostor Email

Our Email DLP solution has more than 80 fine-tuned policies that automatically find, classify, and block messages typically used as a part of BEC-based attacks. These policies greatly reduce the risk of sending W2s, employee records, and wire transfers to impostors.

Proofpoint Cybersecurity Solutions, Services, and Training

DLP Solutions that Enable Productivity

Email DLP’s Smart Send feature enables email senders to remediate their own outbound policy violations. This powerful, easy-to-administer tool helps educate users while freeing up IT resources to focus on more strategic tasks.

Learn More

Are You Prepared for a Data Breach?

Learn more about the financial costs of a data breach and how Proofpoint can protect your organization from attacks.

Watch the Demo

Ready to give Proofpoint a try?

Start with a Free Proofpoint Trial