Hero Banner

EMAIL PROTECTION

EMAIL PROTECTION


Email Protection

Proofpoint Email Protection provides protection from unwanted and malicious email, with granular visibility and business continuity for organizations of all sizes. These controls enable IT and security teams to have confidence that they can secure their end users from email threats including phishing, business email compromise (BEC), and malware, while maintaining email communications in the event of an outage.

read more >


Essentials

Proofpoint Essentials harnesses the capabilities of Proofpoint Email Protection to fit the needs of smaller businesses. Proofpoint Essentials provides spam filtering, phishing detection, multi-layer anti-virus, a robust filter rules engine, email continuity, policy-enforced encryption, and email archive – all managed in a simple and intuitive user interface.

read more >


ADVANCED THREAT PROTECTION

ADVANCED THREAT PROTECTION


Targeted Attack Protection (TAP) in Email

Proofpoint Targeted Attack Protection (TAP) helps detect, mitigate, and block advanced threats that target people through email. We detect known and unknown threats that use malicious attachments and URLs. TAP is unmatched in stopping targeted attacks that use ransomware, polymorphic malware, weaponized documents, and credential-stealing phishing techniques to access sensitive information.
 

read more >


TAP Mobile Defense

Proofpoint TAP Mobile Defense combines rich mobile app analysis data with an automated workflow to give IT teams the information and visibility they need to manage risks from mobile apps. TAP Mobile Defense works with enterprise mobile device management (MDM), enterprise mobility management (EMM), and mobile security management (MSM) tools. Having analyzed more than 3 million apps to date from more than 500,000 publishers, TAP Mobile Defense offers deep threat intelligence to stop malicious and data-leaking iOS and Android apps.

read more >


Threat Response

Proofpoint Threat Response is designed for security operations teams working towards security maturity, automates the threat data enrichment, forensic verification, and response processes after a security alert is received. Unlike traditional incident response process related tools, Threat Response automatically confirms malware infections, checks for evidence of past infections, and enriches security alerts by automatically adding internal and external context and intelligence.

read more >


Emerging Threats (ET) Intelligence

Proofpoint ET Intelligence is the gold standard for threat researchers, offering 100% verified threat intelligence. Unlike other intelligence sources that report only domains or IP addresses, our intel includes a five-year history, proof of conviction, more than 40 threat categories and related IPs, domains, and samples.

read more >


SOCIAL MEDIA PROTECTION

SOCIAL MEDIA PROTECTION


Social Discover

Proofpoint Social Discover gives you a detailed understanding of your social media footprint. Protect your brand across social media platforms such as Facebook, Twitter, YouTube, and Instagram, and more. Social Discover scans social networks to find, inventory, and remediate fraudulent or unauthorized social media accounts.

read more >


Social Patrol

Proofpoint SocialPatrol provides advanced protection for companies, customers, and brands across all major social networks, including Facebook, Instagram, Twitter, LinkedIn, Google+, and YouTube. Using patent-pending technology, SocialPatrol empowers organizations to stop hackers from defacing their brands by locking corporate-owned social media accounts, prevent security incidents by blocking malware and phishing attacks, manage compliance and acceptable use requirements by removing inappropriate content, and prevent unauthorized publishing by controlling connected applications.
 

read more >


Social Sight

Proofpoint SocialSight brings privacy-first security to employee social media programs by protecting personal accounts from risks that negatively impact your brand. It acts as a social media security coach: helping employees avoid confidential data exposure, eliminate embarrassing mistakes, prevent hacks, and protect feeds from malicious content.

read more >


INFORMATION PROTECTION

INFORMATION PROTECTION


Data Discover

Proofpoint Data Discover provides complete visibility and response capabilities for unstructured data in the enterprise. It automates content analysis to track information across an organization’s network including email, file shares, SAN, NAS, and SharePoint sites. Data Discover automatically identifies sensitive data — including PII, PHI, and PII — at risk to unauthorized exposure and enables real-time remediation through quarantine, access revocation, or deletion. 

read more >


Email DLP

Proofpoint Email DLP prevents employee negligence with more accurate and transparent control for outgoing communication. Instead of forcing your end users to make policy decisions about the nature and protection of the content they send, simply have them operate normally while our solution enforces email communication policies centrally and automatically.

read more >


Email Encryption

Proofpoint Email Encryption makes secure communication simple, seamless, and automated with policy-based encryption of messages and attachments. Protect sensitive email messages while ensuring your affiliates, business partners, and end users still have seamless access to secured messages on computers or mobile devices.

read more >


INFORMATION PROTECTION

INFORMATION ARCHIVE


Information Archive

Proofpoint Information Archive leverages cloud intelligence to preserve, discover, and supervise business-critical information. It is a next-generation archiving solution that addresses three fundamental challenges — legal discovery, regulatory compliance and reduce cost and complexity — without the headaches of manag ing archiving in-house. It provides a scalable cloud architecture, guaranteed search performance, unmatched customer satisfaction, and the industry’s most sophisticated encryption for complete legal and compliance control.

read more >