Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Resources

Datasheet

proofpoint_logo.png
Proofpoint Datasheet
According to the FBI, business email compromise (BEC) and email account compromise (EAC) have cost businesses more than $26 billion globally between June 2016 and July 2019. The scale of these losses shows that threat actors are switching tactics in how they attack the people who work at the organiz...

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Threat Response Auto-Pull (TRAP) enables your messaging and security administrators to streamline the email incident response process. When a malicious email is detected, TRAP will analyze emails and automatically remove any malicious messages. It also moves unwanted emails to quarantine ...

proofpoint_logo.png
Proofpoint Datasheet
Protecting your people and the data they create is more challenging— and critical—than ever. That’s because users, apps and data no longer sit behind your network perimeter. Users work from home, a coffee shop or on a train using cloud-based email and apps such as Microsoft Office 365, G Suite, and ...

proofpoint_logo.png
Proofpoint Datasheet
As applications move to the cloud and workers are increasingly mobile, enterprises need a better alternative for access than traditional VPN. Proofpoint Meta leverage a software-defines perimeter for cloud-delivered secure remote access to resources in the datacenter and the cloud.

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Essentials tailors the capabilities of Email Protection to the needs of small businesses. It provides spam filtering, phishing detection, multilayer anti-virus, dynamic sandboxing of URLs, a robust filter rules engine, email continuity, policy-enforced encryption, email archive and social...

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Email Protection helps you secure and control inbound and outbound email through an easy-to-use cloud-based solution. With Email Protection, you can protect your people, data, and brand from today’s threats and common nuisances such as: impostor email, phishing, malware, spam, bulk mail.

proofpoint_logo.png
Proofpoint Datasheet
It's an ongoing struggle to protect your people against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns.

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Cloud Account Defense (PCAD) protects Microsoft Office 365 users from account compromise. With PCAD, you can detect, investigate and defend against cybercriminals accessing your sensitive data and trusted accounts. Our powerful forensics and policy-based controls help you monitor and reme...

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Email Fraud Defense (EFD) authenticates incoming and outgoing email to protect your employees, customers and partners from email-based fraud. With unmatched visibility, tools, and services, EFD can help you authenticate email quickly and with confidence.

proofpoint_logo.png
Proofpoint Datasheet
Proofpoint Enterprise Archive is a cloud-based archiving solution that simplifies legal discovery, regulatory compliance, and end-user information access without the headaches of managing an archive in-house. It provides a central, searchable repository of a wide variety of content types.