• slide
  • slide
  • slide
  • slide

Overview

Proofpoint protects organizations’ biggest risks and greatest assets: their people. With an integrated, cloud-based suite of people-centric compliance and security solutions, Proofpoint helps leading organizations mitigate their most critical security and compliance risks.

Telework Solutions

As your remote workforce grows, it’s critical that you maintain the security of your users and the data and applications they use. However, legacy methods of remote access can open potential security risks and potentially issues of scale. Combine this with the fact that remote workers are not necessarily behind all the security controls that the organization has implemented, and the risk can increase even further. Proofpoint can help you quickly and securely enable remote working, while reducing your risk.

Products

 

Remote Working and Business Continuity

 

Proofpoint Image 1.png    Proofpoint Image 2.png

Proofpoint Image 3.png    Proofpoint Image 4.png

Additional Resources

Threat Snapshot: Coronavirus-related Lures Comprise More Than 80 Percent of the Threat Landscape

MARCH 27, 2020

The Proofpoint research team has tracked malicious activity associated with coronavirus since January 29 and regularly publishes our findings across this blog and our Twitter page. Following last week’s update on the overall threat landscape, this blog serves as a current snapshot and provides additional campaign examples aimed at recipients in the U.S., Spain, Portugal, and the Netherlands. Coronavirus-related threat volumes continue to be high, attacks are broad in both nature and scope, and the threat actors behind these attacks are wide and varied. Most importantly, these campaigns continue to grow, literally by the minute. Read More...

Get Visibility into COVID-19 Attacks Targeting your Organization with Targeted Attack

MARCH 19, 2020

It comes as no surprise that attackers are taking advantage of what is going on in the world today and preying on human vulnerability. Proofpoint research has shown cybercriminals are using coronavirus themes for nearly all types of attacks, including (but not limited to) business email compromise (BEC), credential phishing, malware, and spam email campaigns. Read More...

How to Automate Security with Proofpoint Cloud App Security Broker

MARCH 27, 2020

Right now, users who are working from home lack the security of your corporate network. Your VPN does not have the capacity to accommodate everyone working remotely.  And some of your employees do not have corporate laptops and are using their personal devices instead. To make matters worse, attackers are exploiting Covid-19 phishing lures to steal your users’ credentials and take over their accounts. These conditions have become commonplace almost overnight as countries and states put in place strict COVID-19 control measures such as “shelter-in-place”. Read More...

How to Help Your Remote Workforce Stay Compliant

MARCH 25, 2020 

In a flash, the world has been thrust into a new way of working. Some professionals, like software engineers and writers, have experience working from home. But for so many workers, it's an unfamiliar world. There's the financial advisor who switched from in-person client meetings to Zoom video calls. Or the dermatologist who's doing telemedicine for the first time. Millions of educators are navigating online learning on the fly. All are facing new logistical and productivity challenges. Read More...

Contact Us

Products

Email & Threat Protection

  • Email Protection

    Proofpoint Email Protection protects users against unwanted and malicious email—both malware and non-malware threats, such as impostor email or business email compromise (BEC). We do this by providing granular visibility and business continuity for organizations of all sizes. By controlling all aspects of inbound/outbound email and setting up policies, we help your IT and security team secure your end users from email threats and maintain email communications in the event of an outage.

  • Email Fraud Defense (EFD)

    Proofpoint Email Fraud Defense (EFD) protects your employees, customers and business partners from all forms of email fraud by stopping impostor email attacks before they even reach the inbox. From a single portal, you can authorize legitimate email, block fraudulent messages, and see all threats—regardless of the tactic used or the person being targeted. By leveraging email authentication, machine learning and policy, and enforcing DMARC authentication, EFD helps you block all fraud tactics used by criminals to launch advanced attacks.

  • Threat Response Auto-Pull (TRAP)

    Proofpoint Threat Response Auto-Pull (TRAP) uses orchestration and automation capabilities to recall malicious emails that were already delivered to a user’s inbox. This entry-level version of Threat Response identifies and removes malicious emails based on alerts from TAP. It then uses business logic to follow its path to the larger group of recipients and find and retract those messages. TRAP also generates reports showing quarantine attempts, successes/failures, and a list of which users are targeted most— reducing the workload of your security team.

  • Targeted Attack Protection (TAP)

    Proofpoint Targeted Attack Protection (TAP) helps detect, mitigate and block advanced threats containing malicious attachments and URLs that target people through email and cloud apps, such as Microsoft Office 365 and Google G Suite. TAP provides you with visibility into the Very Attacked People (VAPs) within your organization. It also equips you to rewrite all embedded URLs to protect your users on any device and track clicks on malicious links.

  • Internal Mail Defense

    Proofpoint Internal Mail Defense uses a robust, multilayered approach to protect your organization’s internal email and help detect compromised accounts. It scans all internal mail for spam, and malicious attachments and URLs. If internally sent email is flagged, it is removed and quarantined automatically. It also gives your security team visibility into the accounts that sent these malicious URLs, so they can quickly track down and act upon potentially compromised accounts.

  • Essentials for Small Business

    Proofpoint Essentials tailors the capabilities of Email Protection to the needs of small businesses. It provides spam filtering, phishing detection, multilayer anti-virus, dynamic sandboxing of URLs, a robust filter rules engine, email continuity, policy-enforced encryption, email archive and social media account protection. And best of all, it is managed in a simple and intuitive user interface, making it easy to manage for SMBs who might have smaller security teams.

  • Email Isolation

    Proofpoint Email Isolation enables your IT and security teams to allow users to access personal webmail from corporate devices without security concerns. It can be integrated with TAP for an additional layer of security for your VAPs, while protecting all users from unknown or risky websites. This is achieved by preventing any malware or malicious content from impacting the user or device. Our cloud service isolates web content from corporate data and networks. And it simplifies how you govern risk and operational costs, while elevating your security posture.

  • Threat Response

    Proofpoint Threat Response is designed for security operations teams working towards security maturity. It allows you to get an actionable view of your network threats, enrich alerts, and automate forensic collection and comparison. It also takes the manual labor and guesswork out of incident response. This helps your security team resolve threats faster and more efficiently. And unlike traditional incident response process related tools, it automatically confirms malware infections, checks for evidence of past infections, and enriches security alerts by automatically adding internal and external context and intelligence.

  • Emerging Threats Intelligence

    Proofpoint Emerging Threats Intelligence (ET) is the gold standard for threat researchers. It offers 100% verified threat intelligence from one of the world’s largest malware exchanges. And it helps you understand the deeper, historical context of the origin and author of a threat, integrating seamlessly with your security tools. Unlike other intelligence sources that report only domains or IP addresses, our intel includes a 10-year history and proof of conviction, with more than 40 threat categories and related IPs, domains and samples.

  • Emerging Threats Pro Ruleset

    Proofpoint Emerging Threats (ET) Pro is a timely and accurate rule set that detects and blocks threats using your existing network security appliances, such as next-generation firewalls and network IDS/IPS. Updated daily in Suricata and SNORT formats, ET Pro covers more than 40 different categories of network behaviors, malware command and control, DoS attacks, botnets, exploits, vulnerabilities, SCADA network protocols, exploit kit activity and more. By running daily updates and using an automated sandbox environment, your security team can rest assured that all threats will successfully be evaluated.

  • Premium Threat Information Service (PTIS)

    Proofpoint Premium Threat Information Service (PTIS) enables you to prioritize security decisions by providing you with a deeper situational understanding of the ongoing threat landscape. It includes three components: direct access to our industry-leading threat researchers, monthly custom threat reports, and advanced warning for emerging threats through access to our analyst logbooks. This service can aid and retain hard-to-find security analyst staff by reducing manual processes and allowing them to focus on the most critical issues.

  • Digital Risk Protection

    Proofpoint Digital Risk Protection secures both the customer and their brand against digital security risks across web domains, social media, and the deep web. This includes the ability to protect corporate domains from brand fraud; secure and monitor social media accounts for phishing, account takeovers and spam; and monitor deep and dark web activity for executive threats, credential leaks, locations for physical attacks, and nearby high-impact events. Through use of machine learning, our solution helps you get in front of threats whether they are planned, imminent or occurring real-time.

Information Protection

  • Email Data Loss Prevention (DLP)

    Proofpoint Email DLP prevents employee negligence in outgoing communication by preventing the loss of sensitive, private information. Instead of forcing end users to make policy decisions about the nature and protection of content they send (which can increase burden and time resources), you can allow them to operate normally while our solution enforces email communication policies centrally and automatically. With more than 80 fine-tuned policies that automatically find, classify, and block sensitive messages, you can rest assured that the likelihood of a data breach will be reduced.

  • Email Encryption

    Proofpoint Email Encryption uses policy-based encryption to make secure communication via messages and attachments seamless and automated for your end users. While traditional encrypted email services can be challenging for users, with Email Encryption, they do not need to manually encrypt their email to send and receive messages, since this happens in the background. With us, you can protect sensitive email messages while ensuring your affiliates, business partners, and end users have seamless access to secured messages on computers or mobile devices.

  • Data Discover

    Proofpoint Data Discover finds, monitors and protects sensitive data on file shares, data stores and SharePoint sites. It does so by automating content analysis to track information across your organization’s on-premises network. It then automatically identifies sensitive data—including PII and PHI—at risk to unauthorized exposure. And it enables real-time remediation through quarantine, copying or deletion.

  • Digital Risk

    Protection Proofpoint Digital Risk Protection secures both the customer and their brand against digital security risks across web domains, social media, and the deep web. This includes the ability to protect corporate domains from brand fraud; secure and monitor social media accounts for phishing, account takeovers and spam; and monitor deep and dark web activity for executive threats, credential leaks, locations for physical attacks, and nearby high-impact events. Through use of machine learning, our solution helps you get in front of threats whether they are planned, imminent or occurring real-time.

  • Cloud Account Defense (CAD)

    Proofpoint Cloud Account Defense (CAD) offers automated protection against account compromise and malicious files in Office 365 and G Suite. Account compromise typically starts with phishing, credential-stealing malware, or brute-force attacks, such as credential stuffing. Compromised accounts are most often used to launch further attacks, such as BEC or phishing, both inside and outside organizations. CAD helps you quickly detect, investigate and defend against cyber criminals accessing your sensitive data and trusted accounts. It provides you with people-centric threat detection, correlation of threat activity, granular forensics with rich threat intel, and flexible policies for automated response.

  • Cloud App Security Broker Proofpoint Cloud App Security Broker (CASB)

    Protects organizations from cloud account compromise, oversharing of sensitive data, and compliance risks in the cloud. PCASB provides a granular people-centric view of app access and data handling. Our solution combines compromised account detection, access control, data loss prevention (DLP), third-party app control, and analytics to help you secure Office 365, G Suite, Box and more. Our powerful analytics help you grant the right levels of access to users and third-party apps based on the risk factors that matter to you.

  • ObserveIT Insider Threat Management

    Proofpoint acquired ObserveIT in November 2019. ObserveIT offers a lightweight endpoint solution that helps organizations identify and mitigate insider risk. The solution provides detection and prevention to defend data against both malicious and negligent user behavior from employees, privileged users, and third parties. With ObserveIT, organizations can significantly reduce the risk of security incidents by monitoring user behavior and offering real-time education and deterrence. ObserveIT cuts investigation time from days to minutes and offers full playback of security incidents to improve response times and simplify compliance.

Security Awareness Training

  • Anti-Phishing Suite

    Proofpoint Anti-Phishing Suite helps you identify and reduce your employees’ susceptibility to phishing attacks and malware infections by up to 90%. If a user falls for a ThreatSim simulated phishing attack, they are provided with a teachable moment with tips on how to stay safe in the future. Users who fail a simulated attack can be automatically enrolled into one of our 8 anti-phishing training modules, or they can be assigned separately. In addition, with this package, administrators have access to our PhishAlarm® email reporting button and PhishAlarm Analyzer email analysis tools. These tools are the beginning of our Closed Loop Email Analysis and Response (CLEAR) solution, which allows for a streamlined reporting and automated response to active phishing attacks.

  • Enterprise Security Awareness Training

    The Proofpoint Security Awareness Training Enterprise package includes everything from the Anti-Phishing Suite and adds ThreatSim USB, CyberStrength® Knowledge Assessments, our entire library of Training Modules, and all of our Awareness Materials, including videos. This package is ideal for customers looking to administer the most effective and comprehensive security awareness training program. With access to more tools to identify risk, change behavior, and reduce exposure, you can experience a more impactful people-centric risk reduction strategy.

Archiving & Compliance

  • Enterprise Archive

    Proofpoint Enterprise Archive uses cloud intelligence and machine learning to preserve and discover business-critical information in a manner that is easy to find. It addresses three fundamental challenges—legal discovery, regulatory compliance, and cost and complexity reduction. And it does this without the headaches of an IT team managing archiving in-house. Our scalable cloud architecture, guaranteed search performance, unmatched customer satisfaction, and the industry’s most sophisticated encryption all provide you with complete legal and compliance control.

  • Enterprise Collaboration Archive

    Proofpoint Enterprise Collaboration Archive applies policy-based controls to capture social content from Salesforce Chatter, Jive, Skype for Business, LinkedIn, Twitter and other platforms to be managed or reviewed as any other critical data asset in your compliance archive or supervision platform. This ensures you remain compliant with your regulatory obligations. It also provides you with advanced features that automate and streamline critical compliance tasks.

  • Intelligent Supervision

    Proofpoint Intelligent Supervision helps streamline compliance for financial services firms, which face some of the world’s most stringent and complex regulations, such as FINRA, SEC and IIROC. It is fully integrated with Enterprise Archive and leverages machine learning to provide you with easy capture, efficient review, and effective reporting for regulatory response. That gives you complete visibility across your email, instant messages, collaboration tools, voice, SMS, and social media.

  • E-Discovery Analytics

    Proofpoint E-Discovery Analytics provides an intuitive e-discovery workflow for legal teams. It increases insight by using machine learning with real-time search results and integrated early case analytics. We help you achieve proactive litigation readiness, which means more control and less risk.

  • Social Media Compliance

    Proofpoint helps bridge the gap between social media compliance and marketing practices to help users comply with the current social media regulations. Digital Risk Protection integrates with leading archiving solutions to collect and classify social media content for future search and e-discovery. Not only do we do this, but we also collect and classify social media content for future search. All of this saves you time and money during an audit.

Access Protection

  • Browser Isolation

    Proofpoint Browser Isolation extends the capabilities of Proofpoint Email Isolation to protect all web browsing activities for all end users, including your VAPs. It provides a secure and anonymous web browsing service that is simple for your IT team to deploy, manage and support. This provides your users with privacy when they access sites such as webmail. And with no additional risks to your organization.

  • Zero Trust Network Access (Meta)

    Proofpoint Meta is the next generation in secure enterprise application access. A people-centric solution, Meta ensures employees, contractors and partners have zero-trust, identity-based access to enterprise resources in the datacenter and any cloud.

Product Integrations

Crowdstrike

Cyberark

Okta

Palo Alto Networks

Splunk

Top Blogs

Threat Snapshot: Coronavirus-related Lures Comprise More Than 80 Percent of the Threat Landscape

MARCH 27, 2020

The Proofpoint research team has tracked malicious activity associated with coronavirus since January 29 and regularly publishes our findings across this blog and our Twitter page. Following last week’s update on the overall threat landscape, this blog serves as a current snapshot and provides additional campaign examples aimed at recipients in the U.S., Spain, Portugal, and the Netherlands. Coronavirus-related threat volumes continue to be high, attacks are broad in both nature and scope, and the threat actors behind these attacks are wide and varied. Most importantly, these campaigns continue to grow, literally by the minute. Read More...

Get Visibility into COVID-19 Attacks Targeting your Organization with Targeted Attack

MARCH 19, 2020

It comes as no surprise that attackers are taking advantage of what is going on in the world today and preying on human vulnerability. Proofpoint research has shown cybercriminals are using coronavirus themes for nearly all types of attacks, including (but not limited to) business email compromise (BEC), credential phishing, malware, and spam email campaigns. Read More...

How to Automate Security with Proofpoint Cloud App Security Broker

MARCH 27, 2020

Right now, users who are working from home lack the security of your corporate network. Your VPN does not have the capacity to accommodate everyone working remotely.  And some of your employees do not have corporate laptops and are using their personal devices instead. To make matters worse, attackers are exploiting Covid-19 phishing lures to steal your users’ credentials and take over their accounts. These conditions have become commonplace almost overnight as countries and states put in place strict Covid-19 control measures such as “shelter-in-place”. Read More...

How to Help Your Remote Workforce Stay Compliant

MARCH 25, 2020 

In a flash, the world has been thrust into a new way of working. Some professionals, like software engineers and writers, have experience working from home. But for so many workers, it's an unfamiliar world. There's the financial advisor who switched from in-person client meetings to Zoom video calls. Or the dermatologist who's doing telemedicine for the first time. Millions of educators are navigating online learning on the fly. All are facing new logistical and productivity challenges. Read More...

Proofpoint Announces Two New Holistic Solutions for Business Email Compromise, Email Account Compromise and Cloud Security

FEBRUARY 25, 2020

The best way to solve a complex problem is to address different pain points with a single, versatile solution. We’re excited to announce two new product innovations that help our customers do just that, defending against the $26B Business Email Compromise (BEC) and Email Account Compromise (EAC) problem and offering robust cloud security. Read More...

Contracts

Proofpoint Contract

GSA Schedule Contracts

GSA Multiple Award Schedule Contract (MAS)

GSA Schedule No. 47QSWA18D008F Term: August 22, 2018 - August 21, 2023

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2021

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Events

News

Latest News

Leading cybersecurity company safeguards millions of users worldwide from increasingly blended attacks that combine the cloud and email channels.
READ MORE >
Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today released its Cost of Insider Threats 2020 Global Report to identify the costs and trends associated with ...
READ MORE >
Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today released its sixth annual global State of the Phish report, which provides an in-depth look at user phishing ...
READ MORE >
Proofpoint, Inc., a leading cybersecurity and compliance company, today announced it has achieved Federal Risk and Authorization Management Program (FedRAMP) certification for its flagship email ...
READ MORE >
Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced that CRN®, a brand of The Channel Company, has named Proofpoint Email Protection a winner in the 2019 ...
READ MORE >
Proofpoint Acquires Threat Prevention Vendor ObserveIT Proofpoint announced the acquisition of ObserveIT, the leading insider threat management platform. Read our partner Q&A with Ryan Kalember, ...
READ MORE >
Proofpoint, Inc., a leading cybersecurity and compliance company, today announced an expansion to its technology partnership with Okta, Inc, the leading independent provider of identity for the ...
READ MORE >
Proofpoint, Inc., a leading cybersecurity and compliance company, today announced a partnership and integration with CrowdStrike, a leader in cloud-delivered endpoint protection, to provide ...
READ MORE >
Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced numerous people-centric security and compliance innovations across all product lines.
READ MORE >
Broadcom recently announced the acquisition of Symantec’s Enterprise Security Business. During this announcement, Broadcom highlighted several major proposed changes that could hurt their ...
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it has partnered with Proofpoint, Inc., a leading next-generation cybersecurity company.
READ MORE >

Resources

Datasheet

According to the FBI, business email compromise (BEC) and email account compromise (EAC) have cost businesses more than $26 billion globally between June 2016 and July 2019. The scale of these losses shows that threat actors are switching tactics in how they attack the people who work at the organiz...

Proofpoint Threat Response Auto-Pull (TRAP) enables your messaging and security administrators to streamline the email incident response process. When a malicious email is detected, TRAP will analyze emails and automatically remove any malicious messages. It also moves unwanted emails to quarantine ...

Protecting your people and the data they create is more challenging— and critical—than ever. That’s because users, apps and data no longer sit behind your network perimeter. Users work from home, a coffee shop or on a train using cloud-based email and apps such as Microsoft Office 365, G Suite...

As applications move to the cloud and workers are increasingly mobile, enterprises need a better alternative for access than traditional VPN. Proofpoint Meta leverage a software-defines perimeter for cloud-delivered secure remote access to resources in the datacenter and the cloud.

Proofpoint Essentials tailors the capabilities of Email Protection to the needs of small businesses. It provides spam filtering, phishing detection, multilayer anti-virus, dynamic sandboxing of URLs, a robust filter rules engine, email continuity, policy-enforced encryption, email archive and social...

Proofpoint Email Protection helps you secure and control inbound and outbound email through an easy-to-use cloud-based solution. With Email Protection, you can protect your people, data, and brand from today’s threats and common nuisances such as: impostor email, phishing, malware, spam, bulk mail...

It's an ongoing struggle to protect your people against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns.

Proofpoint Cloud Account Defense (PCAD) protects Microsoft Office 365 users from account compromise. With PCAD, you can detect, investigate and defend against cybercriminals accessing your sensitive data and trusted accounts. Our powerful forensics and policy-based controls help you monitor and reme...

Proofpoint Enterprise Archive is a cloud-based archiving solution that simplifies legal discovery, regulatory compliance, and end-user information access without the headaches of managing an archive in-house. It provides a central, searchable repository of a wide variety of content types.

Provides out-of-the box visibility and enforcement without the complexity and costs of legacy or disparate solutions. Automatic classification and transparent encryption is centrally managed at the gateway.