Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.


Threat Protection

  • Email Protection

    Proofpoint Email Protection solutions—deployed as a cloud service or on premises—protects your customers against malware and threats that don't involve malware, including impostor email, and business email compromise (BEC). Granular filtering controls spam, bulk "graymail" and other unwanted email.

  • Email Continuity

    If your customers moved to a cloud-based inbox like Microsoft Office 365, service outages can be a concern. Email Continuity lets your customers continue to send and receive email when mail servers are unavailable. This always-on capability that means important messages get through—and their business keeps running.

  • Personal Webmail Defense

    Proofpoint Email Isolation provides your customers with a robust, multi-layered approach to protecting their organization's internal email. It also gives them the ability to detect compromised accounts.

  • Personal Browsing Defense

    Proofpoint Browser Isolation is based on intelligence from Targeted Attack Protection (TAP). It protects your customers across both personal webmail and browsing activities across the web. It is the easiest security solution to deploy and manage.

  • Cloud Account Defense

    Proofpoint Cloud Account Defense (PCAD) protects Microsoft Office 365 users from account compromise. With PCAD, your customers can detect, investigate and defend against cybercriminals accessing their sensitive data and trusted accounts. Our powerful forensics and policy-based controls helps them monitor and remediate based on the risk factors that matter to them.

  • Targeted Attack Protection

    Proofpoint Targeted Attack Protection (TAP) helps detect, mitigate, and block advanced threats that target your customers via email. We detect known and unknown threats that use malicious attachments and URLs using both dynamic and static analysis. TAP is unmatched in stopping spear phishing attacks that use polymorphic malware, weaponized documents, and credential stealing techniques to access sensitive information.

  • Threat Response

    Proofpoint Threat Response helps Incident Response teams understand, prioritize, and contain security threats. It collects alerts from major SIEMs, email security solutions - like Proofpoint Targeted Attack Protection, malware sandboxes, and other custom alert sources and automatically: enriches security alerts by adding internal and external context and intelligence, confirms malware infections, and checks for evidence of past infections.

Ecosystem Protection

  • Digital Risk Protection

    Proofpoint Digital Risk Protection secures brands, employees and customers against digital risks across websites, social media and the deep, dark web. It’s the only solution that gives your customers a holistic defense for all their digital engagement channels.

  • Email Fraud Defense 360

    Business email compromise (BEC) costs companies billions, and consumer phishing is at an all-time high. The majority of these email attacks can be prevented. By leveraging the power of email authentication, Proofpoint EFD360 protects organizations from all phishing attacks that spoof trusted domains, and helps your customers understand who is sending emails across their entire enterprise.

Information Protection

  • Email Encryption and Data Loss Prevention (DLP)

    Help your customers secure, automate and simplify their communications with our policy-based encryption of messages and attachments. Protect your customers' sensitive email messages while ensuring their affiliates, partners, and end users always have access to secured messages from any device.

  • Cloud App Security Broker (CASB)

    Proofpoint provides world-class people-centric security for email and apps in the cloud. To provide our customers better protection for their cloud apps such as Sharepoint Online, OneDrive, Skype, G Drive, Box and more, we offer Proofpoint Cloud App Security Broker, a new breed of CASB.

User Protection

  • Security Awareness and Training

    Proofpoint Security Awareness Training (formerly Wombat Security) delivers the right training to the right people at the right time. Help your customers learn to identify cyberattacks and protect their organization. Proofpoint provides a uniquely effective suite of research-based security awareness and training products to empower your customers.

  • Closed Loop Email Analysis and Response (CLEAR)
    Help your customers reduce the risk of successful phishing attacks by teaching end-users to report suspicious emails with a single, integrated click. Reported messages are automatically dissected and analyzed.

Essentials for SMB (Up to 1000 Users)

  • Essentials for Small Business

    Our cloud-based Email Security, Continuity, Encryption and Archiving is built for small businesses. It's based on the Proofpoint enterprise-class security & infrastructure but offered at a price that delivers cost-savings and value for small businesses. Essentials is available in 4 tailored packages: Beginner, Business, Advanced and Pro.

Product Integrations


Proofpoint Contract

GSA Schedule Contracts

GSA Schedule 36

GSA Schedule No. 47QSWA18D008F Term: August 22, 2018 - August 21, 2023

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2021


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Archived Events


Latest News

Proofpoint, Inc., a leading cybersecurity and compliance company, today announced an expansion to its technology partnership with Okta, Inc, the leading independent provider of identity for the ...
Proofpoint, Inc., a leading cybersecurity and compliance company, today announced a partnership and integration with CrowdStrike, a leader in cloud-delivered endpoint protection, to provide ...
Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced numerous people-centric security and compliance innovations across all product lines.
Broadcom recently announced the acquisition of Symantec’s Enterprise Security Business. During this announcement, Broadcom highlighted several major proposed changes that could hurt their ...
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it has partnered with Proofpoint, Inc., a leading next-generation cybersecurity company.


SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC


Find and protect your sensitive data, wherever it goes. Information Protection reduces your attack surface and compliance risk


Ransomware attackers collected more than $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015. In addition to the ransom itself, these attacks can exact a heavy cost: business disruption, remediation costs, and a diminishe...


Proofpoint™ DoubleBlind Key Architecture is a patented technology (US patent No. 7,512,814) used in Proofpoint Enterprise Archive to deliver unmatchable security and privacy controls for your organization’s archived information.


Cyber criminals continue to refine techniques that target people rather than infrastructure, with attacks that rely more on human interaction and less on automated exploits. Download our report to learn why more than 99% of the attacks we observe require human interaction to succeed resulting in mal...

This cybersecurity report analyses data from tens of millions of simulated phishing attacks sent through our Security Education Platform over a 12-month period, as well as an extensive survey of our global database of infosec professionals. It also includes survey data from thousands of working adul...

Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect. Our latest Protecting People report explores who’s being targeted, how they’re being attacked, and what you can do about it.


Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based (i.e. Microsoft Office 365) or on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), ...