Email Protection

Email Protection Products

The tools you need to defend against threats, ensure business continuity, and implement inbound and outbound email policies.


Proofpoint Email Protection solutions—deployed as a cloud service or on premises—protect against malware and threats that don't involve malware, including impostor email, or business email compromise (BEC). Granular filtering controls spam, bulk "graymail" and other unwanted email. And continuity capabilities keep email communications flowing when your email server fails.

Digitale Archivierung mit Proofpoint Enterprise Archive

Impostor email protection

Dynamically block non-malware threats (such as BEC) trying to trick your people into sending money and sensitive corporate data.

email control

Granular control of unwanted email

Dynamically classify and quarantine email using seven unique categories

email protection and continuity

Business continuity

Maintain email communications if your on-premises or cloud-based email server fails.

Email Protection

Keep your people safe from email threats.Enhance your ability to protect against fast-emerging threats such as impostor email (BEC) and phishing.


Easy-to-use, integrated, cloud-based email security, continuity, encryption and archiving for small and medium businesses.

Sendmail Sentrion

Full-content message inspection that enables policy-based delivery
of all human and machine-generated email.

Data Sheet

Impostor in the Machine

Learn how impostor emails attempt to infiltrate your organization and steal money and personal information.

Learn More
this is alt text

Analyst Report

Gartner Magic Quadrant for Security Email Gateway

Proofpoint has been named a leader in the Gartner Magic Quadrant for 7 consecutive years

Learn More
email protection and continuity


Ransomware Survival Guide

What every organization needs to know before, during, after an attack.

Learn More



Trace how impostor emails work and who they target

Learn More

Successful companies choose Proofpoint

Our customers rely on us to protect and govern their most sensitive business data, not only for our leading technology, but our organization-wide commitment to making our customers successful every day.