Shift to unified, human and AI-centric data security with Proofpoint solutions
Compare tiers to find the right fit for your business
| Key Features & Capabilities | DLP Transform Tier 1 | DLP Transform Tier 2 |
|---|---|---|
| Deep user and file context |
Yes
|
Yes
|
| Threat hunting for proactive detection and investigation |
Yes
|
Yes
|
| Single user mode agent for insider threats and DLP |
Yes
|
Yes
|
| Rich DLP detections (Regex, OCR, IDM, EDM) and MIP classification |
Yes
|
Yes
|
| LLM-based classifiers and alerts |
Yes
|
Yes
|
| Monitoring and detecting file movements with data lineage |
Yes
|
Yes
|
| Broad cloud application detectors |
Yes
|
Yes
|
| Unified alert management and DLP configuration |
Yes
|
Yes
|
| Granular data privacy and access controls |
Yes
|
Yes
|
| Security ecosystem integration (SIEM/ SOAR/ Teams) |
Yes
|
Yes
|
| Detection and analysis of sensitive data in email messages and attachments |
Yes
|
|
| Dynamic encryption of externally or internally-bound email |
Yes
|
|
| Fingerprinting of sensitive documents in email |
Yes
|
Shift to unified, human and AI-centric data security with Proofpoint solutions
Compare tiers to find the right fit for your business
| Key Features & Capabilities | AI Data Security Tier 1 | AI Data Security Tier 2 |
|---|---|---|
| Discovery and classification of data storest |
Yes
|
Yes
|
| Risk prioritization and remediation of exposure in data stores |
Yes
|
Yes
|
| Single user mode agent for insider threats and DLP |
Yes
|
Yes
|
| Rich classifiers, including pre-trained and custom AI classifiers |
Yes
|
Yes
|
| Integration with Microsoft Information Protection labels |
Yes
|
Yes
|
| All supported SaaS and cloud services |
Yes
|
Yes
|
| Data access governance |
Yes
|
|
| GenAI activity monitoring for misuse |
Yes
|
|
| Discovery of AI and SaaS misconfigurations |
Yes
|
Complete data security with Prime
FAQs
I am an existing customer. How will my existing plan factor into the new solution tiers?
Proofpoint will honor renewals of current solutions for existing customers. There are special discounts and added functionality built into these packages that may be financially beneficial for you to consider. Work with your Proofpoint account team to determine the best value for your organization’s needs.
How are the solution tiers priced?
Proofpoint solution tiers are designed to optimize value for our customers. This means providing the most effective and comprehensive solution possible at a sustainable price. Budgetary pricing can be determined based on the number of user licenses, data volume scanned and contract term (single or multi-year). There are exceptions that depend on consumption, so be sure to discuss your requirements with your Proofpoint account team.
How do I know which solution tier is right for my organization?
Please contact us. We would love to have a conversation to learn more about your organization’s criteria, challenges, culture, and budget.
Can I add a Data Security offering to a Collaboration Security package?
Absolutely! Most Data Security solution tiers do not have technical dependencies on Collaboration Security packages. However, there may be integrations and workflows that you can benefit from by using more Proofpoint products. Ask your Proofpoint account team for guidance to right-size a solution that makes the most sense for your organization.