Email Protection

Email Protection Products

The tools you need to defend against threats, ensure business continuity, and implement inbound and outbound email policies.


Proofpoint Email Protection solutions—deployed as a cloud service or on premises—protect against malware and threats that don't involve malware, including impostor email, or business email compromise (BEC). Granular filtering controls spam, bulk "graymail" and other unwanted email. And continuity capabilities keep email communications flowing when your email server fails.

Protection de la messagerie électronique avec Proofpoint

Impostor email protection

Dynamically block non-malware threats (such as BEC) trying to trick your people into sending money and sensitive corporate data.

Protection contre la fraude par email - Proofpoint Fraud Defense

Granular control of unwanted email

Dynamically classify and quarantine email using seven unique categories

Protection mail contre les ransomwares - Proofpoint Email Security

Business continuity

Maintain email communications if your on-premises or cloud-based email server fails.

Email Protection

Keep your people safe from email threats.Enhance your ability to protect against fast-emerging threats such as impostor email (BEC) and phishing.


Easy-to-use, integrated, cloud-based email security, continuity, email encryption and archiving for small and medium businesses.

Sendmail Sentrion

Full-content message inspection that enables policy-based delivery
of all human and machine-generated email.

Protection contre les emails d'imposteurs et l'usurpation BEC

Data Sheet

Impostor in the Machine

Learn how impostor emails attempt to infiltrate your organization and steal money and personal information.

Learn More
Gartner Magic Quadrant - Proofpoint leader de la sécurité des emails

Analyst Report

Gartner Market Guide for Secure Email Gateways

See what Gartner has to say about Proofpoint.

Learn More
Protection mail contre les ransomwares - Proofpoint Email Security


Ransomware Survival Guide

What every organization needs to know before, during, after an attack.

Learn More



Trace how impostor emails work and who they target

Learn More

Successful companies choose Proofpoint

Our customers rely on us to protect and govern their most sensitive business data, not only for our leading technology, but our organization-wide commitment to making our customers successful every day.