Skip to main content
English: Americas
Search
Login
  • Platform
  • Products
  • Solutions
Proofpoint
Contact Us
Search
  • Platform
  • Products
  • Solutions
  • Partners
  • Resources
  • Company
Search
Login
English: Americas
Platform
Products
Solutions
Partners
Resources
Company
Prime Threat Protection
Proofpoint Prime stops all human-centric threats for today’s and tomorrow’s landscape.
Email Protection
User Protection
Impersonation Protection
How to Buy
More products
Data Security & Governance
Transform your information protection with a human-centric, omni-channel approach.
Enterprise DLP
Adaptive Email DLP
Insider Threat Management
Digital Communications Governance
Data & SaaS Security Posture
Contain SaaS and identity sprawl by responding to account takeovers and understanding your risk posture.
Account Takeover Protection
Data Security Posture Management
Security Awareness
Unlock full user risk visibility and drive behavior change.
ZenGuide
Optimize Proofpoint Solutions
Premium Services
More Protect People Products
Account Takeover Protection
Detect, investigate, and respond to account takeovers.
Collab Protection
Protect your people from messaging and collaboration threats.
Email Fraud Defense
Protect your brand reputation, increase deliverability and identify lookalikes of your domains.
Secure Email Relay
Secure your application email and accelerate DMARC implementation.
Solutions by Use Case
How Proofpoint protects your people and data.
Ensure Acceptable GenAI Use
Empower your workforce with safe GenAI practices.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and holistic approach.
More use cases
Solutions by Industry
People-centric solutions for your organization.
Federal Government
Cybersecurity for federal government agencies.
State and Local Government
Protecting the public sector, and the public from cyber threats.
More industries
Comparing Proofpoint
Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
View comparisons

Solutions By Use Case

How Proofpoint protects your people and data.
Change User Behavior
Help your employees identify, resist and report attacks before the damage is done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernize Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.

Solutions By Industry

People-centric solutions for your organization.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organization.
Healthcare
Protect clinicians, patient data, and your intellectual property against advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.

Proofpoint vs. the competition

Side-by-side comparisons.
Proofpoint vs. Abnormal Security
Proofpoint vs. Mimecast
Proofpoint vs. Cisco
Proofpoint vs. Microsoft Purview
Proofpoint vs. Legacy DLP

Partners

Deliver Proofpoint solutions to your customers.
Channel Partners and Distributors
MSP Partners
Archive Extraction Partners
GSI Partners
Technology and Alliance Partners
Social Media Protection Partners

Resources

Find reports, webinars, blogs, events, podcasts and more.
Resource Library
Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.
Cybersecurity Academy
Earn your certification to become a Proofpoint Certified Guardian.
Podcasts
Learn about the human side of cybersecurity.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.

Company

Proofpoint protects organizations' greatest assets and biggest risks: their people.
About Proofpoint
Careers
Stand out and make a difference at one of the world's leading cybersecurity companies.
News Center
Read the latest press releases, news stories and media highlights about Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.

Platform

Discover the Proofpoint human-centric platform.
Learn More
Nexus
Detection technologies to protect people and defend data.
Zen
Protect and engage users wherever they work.
Search Proofpoint
Try searching for
Email Security Phishing DLP Email Fraud
Select Product Login
  • Support Log-in
  • Proofpoint Cybersecurity Academy
  • Digital Risk Portal
  • Email Fraud Defense
  • ET Intelligence
  • Proofpoint Essentials
  • Sendmail Support Log-in
Select Language
  • English: Americas
  • English: Europe, Middle East, Africa
  • English: Asia-Pacific
  • Español
  • Deutsch
  • Français
  • Italiano
  • Português
  • 日本語
  • 한국어
Glossary

Cybersecurity Glossary

Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data.

P

Proofpoint Prime Threat Protection – Édition entreprise

Proofpoint Prime permet aux entreprises de disposer d'une solution complète auprès d'un seul partenaire stratégique afin de bloquer toutes les menaces centrées sur les personnes dans le paysage d'aujourd'hui et de demain.

Proofpoint nommé parmi les leaders du rapport The Forrester Wave™ : Email, Messaging, And Collaboration Security Solutions (T2 2025)

Proofpoint est fier d'être classé parmi les leaders de l'édition 2025 du rapport Forrester Wave™ : Email, Messaging, And Collaboration Security Solutions. Proofpoint a été nommé parmi les leaders lors d'une évaluation portant sur un total de dix fournisseurs.

Présentation de Proofpoint Core Email Protection – API et Proofpoint Adaptive Email DLP

Ce livre blanc propose une analyse technique approfondie des solutions Proofpoint Core Email Protection – API et Proofpoint Adaptive Email DLP.

Proofpoint Prime Innovations : Défenses Étendues

Dans cette démonstration, découvrez les nouvelles fonctionnalités et capacités de Proofpoint Prime Threat Protection, conçues pour protéger les personnes et stopper les menaces émergentes, où qu’elles travaillent.

U

Utilisation de l'IA comportementale pour se prémunir des e-mails mal dirigés

Participez à une démonstration en direct et approfondie de la solution Proofpoint Adaptive Email DLP, conçue spécifiquement pour empêcher les e-mails mal adressés avant qu’ils ne soient envoyés.

Un multiplicateur de force dans les architectures de cybersécurité modernes

S'il demeure important de choisir des outils de sécurité de pointe, les RSSI modernes doivent également se concentrer sur la création d'une architecture intelligente et cohésive, qui évolue avec le paysage des menaces et s'assure que ces outils fonctionnent de concert pour offrir une défense effi

G

Guide du marché des solutions de prévention des fuites de données (DLP) 2025 de Gartner®

img { max-width: 12%; } Selon Gartner, « le marché du DLP est mature, mais les entreprises modernes sont à la recherche de solutions complètes qui vont au-delà des méthodes DLP traditionnelles.

Guide d'achat : Guide stratégique pour bloquer les menaces centrées sur les personnes

Le phishing, les malwares, les ransomwares, le piratage de la messagerie en entreprise (BEC, Business Email Compromise) et l'ingénierie sociale restent des méthodes privilégiées par les cybercriminels pour cibler les utilisateurs.

L

Les menaces ne se limitent plus aux emails et ciblent les plates-formes numériques

Les outils numériques employés dans l'environnement de travail actuel ne se limitent plus à la messagerie.

A

Adopter une sécurité centrée sur les personnes dans le paysage numérique moderne

La nature des cyberrisques a changé. Les cybercriminels ne ciblent plus seulement les systèmes, mais aussi les personnes.

S

Secure Sensitive Data in AI Pipelines with Proofpoint DSPM

Protecting sensitive data in AI and LLM workflows is a mission-critical priority to avoid privacy violations, data breaches, and regulatory fines. Enterprises need to mitigate the risks of exposing sensitive data to AI systems in dynamic hybrid environments.

R

Réduire les risques et les coûts associés aux données abandonnées avec Proofpoint DSPM

Non seulement les données abandonnées encombrent inutilement l'espace de stockage, mais elles constituent également un risque caché pour la sécurité.

Load More Glossary

Turn people into your best defense with Proofpoint

Get in Touch
Products
  • Protect People
  • Defend Data
  • Mitigate Human Risk
  • Premium Services
Get Support
  • Product Support Login
  • Support Services
  • IP Address Blocked?
More
  • About Proofpoint
  • Why Proofpoint
  • Careers
  • Leadership Team
  • News Center
  • Privacy and Trust
Connect with Us
  • +1 408 517 4710
  • Attend an Event
  • Contact Us
  • Free Demo Request
© 2025. All rights reserved.
Terms and conditions Privacy Policy Sitemap