Nyc clouds

Proofpoint Data Security Innovations—Q1 2025

Share with your network!

Keeping your data safe is more than just enforcing policies in a reactive manner—it’s about knowing where your risks are and being proactive and adaptive. Proofpoint's data security solution helps organizations discover, classify and protect data. Our unified solution defends your data against risky users, excessive access, misconfigurations and vulnerabilities. By combining content and context, Proofpoint transforms your data security program by giving you visibility into human-centric risks; preventing data loss from careless, compromised or malicious users. With our data security solution, your organization can strengthen its data security posture, minimize financial and reputational risk and achieve operational efficiencies.

This blog describes the latest innovations for the Proofpoint data security solution. These new product and service capabilities help organizations address top use cases, accelerate investigations and maintain privacy. 

1: Get a holistic view of human and data risk in your organization

  • Proofpoint’s data security solution has a new look and feel! Redesigned for better readability and usability, the user experience is consistent across our data security and threat protection solutions. Our new interface also includes light and dark themes for user preference and adaptability. Within our enhanced navigation, the Analytics app is now called Data Security Workbench.
  • With Explorations’ smart search capability, security analysts can investigate security incidents using natural language prompts. This simplifies explorations, improves investigation efficiency and helps new users to use advanced capabilities. For example, analysts can perform day-to-day activities with easy prompts such as “show me users who browsed to GenAI sites in last 30 days” or “who were the top five users exfiltrating data in the past week?”
  • Cloud DLP now gives you visibility of sensitive information being shared in Zoom meetings, chat (IM) and file transfers. In addition, administrators can monitor external users’ activity and data exposure in meetings and chat rooms . Alerts are shown when sensitive data files are shared with external meeting participants. 

2: Govern email communications and prevent data sharing between defined groups

Driven by behavioral AI, Proofpoint Adaptive Email DLP now enables security and compliance teams to prevent a defined group of users from communicating by email with another group of users. This need arises in regulatory and due diligence processes. For example, in case of a conflict of interest, an organization might need to prevent two departments from communicating with each other. Administrators can now define information barriers that prevent data loss where two groups should not be able to communicate. (Note: This feature is Limited Availability.)

3: Create adaptive controls for data loss across email, cloud and endpoints

Proofpoint has released several features that empower employees with safe generative AI (GenAI) practices while protecting business-critical data. These include:

Expanded GenAI protections

The set of GenAI sites that Proofpoint Endpoint DLP has protection for continues to expand. In Q1 ‘25, we added protection for DeepSeek shortly after the new site was released, helping your organization to keep pace with emerging risks. With no software or configuration updates needed, we continuously add new capabilities to our browser extension, enabling quick response to new risks.

Data redaction for GenAI

Data exfiltration through GenAI prompts can put your sensitive data at risk. Masking sensitive data before users can include it prevents this type of data loss while enabling safe use of GenAI. Using Endpoint DLP, you can redact content such as email addresses or credit card numbers that match the detectors selected in a rule.

When text that contains selected sensitive data is included in a GenAI prompt, the user is informed that redacted text has been submitted. The user can proceed with submitting the redacted text or cancel the prompt.

Data access governance for Databricks

With Proofpoint Data Security Posture Management (DSPM), you can now govern access to sensitive data in Databricks. DSPM uses APIs to enable automated data discovery and classification of structured data in Databricks. Administrators can also visualize user and group access permissions for sensitive data.

Real-time, AI-powered document classification

Proofpoint Cloud DLP now has real-time, AI-powered classification that identifies content categories for your documents. With this capability, you can:

  • Leverage pre-trained large language models (LLMs) to identify the content category of documents. These include accounting-tax, client-customer, corporate, employee, legal-compliance, marketing and technology.
  • Define policies using Nexus AI classifiers to accurately identify business-critical information, such as company intellectual property, that previously remained unprotected due to the limitations of legacy approaches.
  • Combine AI-powered classification with pattern matching to reduce false positives.
  • Accelerate alert triage and investigations with better context about documents even if the detection rule is based only on pattern matching.

AI-powered document classification is currently available for Cloud DLP. Support for other DLP channels will be added in the future.

New Basic Technical Account Manager (TAM) service

As a Proofpoint Services offering, a Technical Account Manager (TAM) is a dedicated technical resource and trusted advisor to help streamline security operations and ensure your long-term success with Proofpoint. The new Basic TAM service is a cost-competitive option for smaller organizations who may not need all the features of a Premium TAM.

The Basic TAM service includes expert, focused support for Proofpoint data security and threat protection solutions and/or Proofpoint Digital Communications Governance. Standard-cadence meetings and case reviews happen monthly, with correspondence done via email.

Together, the innovations described in this blog boost data security, reduce risk and improve compliance. And they do so with minimal disruption to business operations.

Learn more