Digital Communications Governance
Digital Communications Governance
Securely Capture Communications

How secure is your capture technology?

The breaches of the Signal-like app used by the former U.S. national security advisory exposed vulnerabilities in the Smarsh TeleMessage platform. Watch this webinar to get our perspective on the Smarsh TeleMessage Hack from Proofpoint executives and experts.

Contact Us

Schedule time with a Specialist Sales Engineer to discuss the security of your current capture solution


Contact us

What we know

Where it all started

In March 2025, ABC News and other outlets reported how a Signal group chat used by former U.S. national security advisor Mike Waltz was compromised. Many dismissed the event, thinking the adding of an external party – an editor from The Atlantic – who could now see tacit, extremely confidential war conversations, was an honest mistake by Waltz or his staff. In early May 2025, Reuters, TechCrunch and others reported how the Signal-like app used by Waltz and other senior White House officials was actually a Signal app clone based TeleMessage technology owned by Smarsh. In addition, the TeleMessage servers were breached not once but twice, and hackers demonstrated how sensitive information from the U.S. Customs and Border Protection, Coinbase and other organizations had been leaked.

 

Our approach

Our approach at Proofpoint

Embedding operational resiliency

The Smarsh TeleMessage hacks involving a Signal-like app highlighted shocking vulnerabilities in capture technology that exposed sensitive U.S. federal government and financial services information, proprietary contacts and more.

Read about the operational resiliency perspectives of Harry Labana, SVP and GM, Digital Communications Governance (DCG) Business Unit at Proofpoint and former Managing Director at Goldman Sachs.

Secure Capture Architecture

Proofpoint Capture encrypts your data from point of capture to storing in Proofpoint Archive or other 3rd party repositories. Unlike Smarsh with their TeleMessage technology, we neither make our capture codebase accessible for public distribution nor do we rely on application clones which could invalidate vendor security guarantees and introduce new vulnerabilities. For mobile capture in particular, we provide a serverless, least‑privilege architecture, immutable audit trails and tamper evidence and much more.

How Proofpoint can help

How Proofpoint can help

View our on-demand webinar. Our experts will break down how the attack occurred, what it means for regulated industries and how Proofpoint’s digital communications governance solutions are designed to protect against such risks.

 


Contact your Specialist Sales Representative to learn how we can streamline your migration to Proofpoint capture technology in as little as two weeks while offering an extremely competitive sales incentive to do so today, whether you stay with your present archive or not.

 

Webinar

Join the webinar