How Proofpoint Delivers on Gartner's Secure Email Gateway Recommendations

Share with your network!

Organizations spend billions of dollars every year to protect themselves from today’s advanced cyber threats. What’s the best way to invest that money?

That’s the question Gartner explores in its “Market Guide for Secure Email Gateways” report for 2017. The research explains how today’s cyber threats are changing and what you should look for in a modern secure email gateway (SEG).

We are honored to appear in the guide and believe this is a testament to our focus on email security issues.

As organizations move their business and email operations to the cloud, reputation-based defenses—the backbone of traditional secure email gateways (SEGs)—are no longer enough to stop today's advanced threats.

In this guide, Gartner advises security leaders to invest in SEGs that include:

  1. Advanced threat defense and post-delivery protection
  2. Infrastructure consolidation and future business challenges such as data loss protection (DLP) and email encryption
  3. Cloud-based delivery

Here’s how we believe we excel in all three areas.

Advanced Threat Defense

Proofpoint Advanced Email Security is a complete solution for email threats and continuity.

Our multilayered approach stops attacks that use malicious attachments and URLs, such as ransomware and other malware. We also stop those that exploit human nature rather than technical flaws, such as email fraud and credential phishing.

We use sandboxing, URL rewriting, and time-of-click analysis, DMARC, display-name spoofing detection to keep you protected. Gartner calls these features key differentiators when selecting an SEG.

We help contain the threats that do get delivered or forwarded. Our Threat Response Auto Pull (TRAP) product automatically quarantines emails that are deemed malicious or turn malicious after being delivered.

Finally, our granular bulk email controls also give end users easy individual control over graymail. That’s another feature Gartner says should be considered.

Data Loss Prevention (DLP) and Encryption

No cyber defense can stop every attack. That’s why your IT team must proactively identify and protect sensitive and regulated data “at rest” in file stores and “in motion” as it is sent or received.

Proofpoint Information Protection reduces your attack surface and compliance risk. We help you automatically classify sensitive data so that the people who need it—and only those people—have access.

Ours is the only cloud-based solution designed from the ground up to provide visibility and control of sensitive data within your network and in the cloud. We cover cloud-based and on-premises email, file shares, storage area networks (SANs), network attached storage (NAS), and SharePoint. Our out-of-the-box policy filters help you understand to your attack surface in just 24 hours.

Cloud-based Delivery

Proofpoint's cloud-based Proofpoint Nexus™ security and compliance platform blends the industry’s best security research, technology and threat data to protect you at every stage of the attack lifecycle. Nexus extracts and correlates intelligence across email, social media and mobile—learning from each new attack to stay ahead of evolving threats.

This modern, graph database architecture drives the effectiveness of our products. It powers our ecosystem of partners and integrations. And because it’s delivered through the cloud, it deploys quickly and continuously adapts to new threats.

Download Gartner's full report to learn more about what to look for in a modern SEG. And visit to see why Gartner recognizes us as a SEG candidate.

Gartner Market Guide for Secure Email Gateways, Neil Wynne, 03 May 2017.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.