Email Isolation
Advanced Threat Protection
When your people check personal webmail at work, they can unintentionally introduce known or new threats into your organization. Personal Webmail Defense is an email isolation tool built with simplicity at its core, based on intelligence from Targeted Attack Protection (TAP) Isolation.
Demo
Proofpoint Email Isolation
Email Isolation allows users to freely access personal email while protecting your people and your organization from advanced attacks.
Watch the DemoGain Adaptive Controls with TAP Integration
Proofpoint Email Isolation extends the capabilities of TAP. It does this by enabling risk-based isolation for URL clicks within corporate emails. With our unique approach to protecting people, we can highlight your most attacked people and determine the riskiest URLs that get into your users’ inboxes. By doing this, we can isolate risky URL clicks to help prevent threats and credential phish from impacting your organization. Email Isolation:
- Provides adaptive controls integrated with TAP to isolate URL clicks based on risk
- Provides secure use of cloud collaboration tools, such as SharePoint and Dropbox
- Allows your users to exit the isolated session of the URL they clicked within corporate email once it’s deemed safe by deep threat scans
Features and Benefits
Advanced Capabilities to Protect Your People
Email isolation is simple to deploy and manage, email isolation allows you to protect hundreds of thousands of users in days, rather than in weeks or months. And it does this while respecting their privacy. Our cloud-based email isolation solution makes it easy for you to stay ahead of attackers. Email Isolation:
- Keeps business and personal activities separate
- Needs no registration (IP whitelist) or self-registration (email)
- Provides continual daily updates
- Requires no software installation, network configuration or management
- Apply granular controls to high risk profiles and/or existing groups that have been imported from Proofpoint Email Protection
Web Isolation Technology
Our advanced and proven web isolation and threat intelligence capabilities give you visibility into threats that target your most important asset—your people. So you can rest assured that you are secured against webmail threats. Email Isolation:
- Never downloads source documents carrying potential payloads or malicious macros
- Protects your users from phishing attacks in personal webmail
- Re-renders attachment files into HTML5
- Defends against potentially malicious URL links in personal webmail with URL isolation technology
- Does not allow external content, such as JavaScript or Active Content, to execute on corporate devices
- Allows you to set policies to manage potentially risky actions, such as downloads, uploads, or copy and paste
- Leverages the Proofpoint Nexus Threat Graph, which provides industry-leading correlation of threat data across email, cloud, network and social for real-time threat protection
Progressive Management of Personal Webmail
The Personal Webmail Defense email isolation service simply works—without fail. Now you can respect the privacy of your people when they access webmail. And without worrying about additional risk to your organization. It's a win-win for everyone.
- Near-zero security risk for corporate assets is, so there’s no need to inspect and track
- Protects employee privacy
- Simplifies compliance
Content Inspection and Security Monitoring Controls
It’s important to eliminate personal webmail as a source for cyber threats to help you reduce your exposure. Personal Webmail Defense enables secure and robust data monitoring and collection programs without collecting your users’ personal data. It allows you to:
- Monitor what really matters without violating compliance standards
- Inspect web traffic outside of Personal Webmail Defense safely
- Expand your cyber threat monitoring and control programs without collecting personal webmail traffic