woman in glasses and button down shirt smiling
woman in glasses and button down shirt smiling
Email DLP and Encryption

Identify and protect sensitive data. Automate compliance.

Stop outbound data loss with dynamic, granular encryption policies applied automatically to secure email flowing between your users and external business partners.

Overview

Protect sensitive data and automate compliance with Proofpoint

1%
of data loss occurs in email
1%
of workers emaled the wrong person last year
1%
is the average risk of a data breach occurring in any given year
The Solution

Maintain strict control over your email communications


Through our email threat protection platform, we manage and enforce DLP and encryption policies, meticulously scanning and analyzing sensitive content in messages and attachments.

Manage and enforce DLP policies

Keep business communications flowing securely with a robust set of controls and no-touch key management that works with your Proofpoint email gateway. Its policy-based DLP engine lets you define and dynamically apply granular encryption policies at the global, group and user levels with integrations with LDAP and Active Directory.

Abstract_GriddedWaves

Detect and analyze sensitive data

Accurately detect sensitive data within Microsoft 365, PDFs, images and other unstructured content. A centralized dashboard shows real-time statistics and trends to help you act quickly on noncompliant messages. Drill down into any incident and see a side-by-side view highlighting policy violations next to the original document or policy.

Abstract_dataWaves

Integrate with Proofpoint Information Protection

Extend the power with Email DLP and Encryption with the rest of the Proofpoint Information Protection product family. Find, track and safeguard data as users work in email, cloud, applications and endpoints with common data detectors and consistent DLP policies across all the channels your data touches.

Abstract_GriddedWaves
Key Features

Adopt a multi-layered, holistic and people-centric strategy to prevent loss from ransomware

  • Hundreds of built-in data identifiers

    Securities, privacy and personal data, and healthcare

    Securities

    • PCI
    • SOX
    • GLBA
    • SEC
    • Other country-specific codes

    Privacy and personal data

    • PII
    • GDPR
    • UK-DPA
    • EU-DPD
    • PIPEDA (Canada)
    • UK National Insurance Number
    • Japanese credit card numbers

    Healthcare

    • HIPAA
    • ICD-9
    • ICD-10
    • ICD-11
    • National Drug Code
    • More code sets
  • Deep analysis and fingerprinting

    Beyond Microsoft Office 365 and PDF files, more than 300 file types are scannable out of the box.

    Beyond Microsoft Office 365 and PDF files, more than 300 file types are scannable out of the box. New, custom and proprietary file types are also supported though our filetype profiler. You’ll have the opportunity to get full and partial matching, index document matching (IDM), exact data matching (EDM) and text extraction from images.

  • Real-time reporting

    Because every second counts, a centralized dashboard gives you real-time statistics, trends and active data-loss incidents.

    Because every second counts, a centralized dashboard gives you real-time statistics, trends and active data-loss incidents. You can drill down into, comment on, track, search and act on any incident and export matching messages right away.

  • Streamlined and automated workflows 

    Routing policies like Smart Send make life easier for DLP analysts. Emails can be sent back to the sender to correct an DLP violations or routed elsewhere, such as to HR, IT or business owner.

    Routing policies like Smart Send make life easier for DLP analysts. Emails can be sent back to the sender to correct an DLP violations or routed elsewhere, such as to HR, IT or business owner. You can automate encryption by destination domain, sender or message attributes, such as attachment types.

  • Enhanced recipient experience

    Reduce the temptation to work around DLP policies with a seamless user experience.

    Reduce the temptation to work around DLP policies with a seamless user experience. Flexible options include a web-based Secure Reader inbox and portal, Microsoft Outlook add-ins for one-click sending and reading and internal-to-internal encryption for sensitive employee-to-employee emails.

  • Managed services that shorten time to value

    Let our highly skilled experts help you design, implement and comanage your DLP program.

    Let our highly skilled experts help you design, implement and comanage your DLP program. Optimize your technology investment, augment your staff and mature your organization’s data protection strategy.

Protect more
 than your people: Defend Data

View Product Packages
woman standing on balcony
outbound emails encrypted 23K
Product Packages

Comprehensive protection against today's risks — tailored to your organization's needs.

Learn More
Get Up to Speed

Explore the latest in cybersecurity 
news, insights, and innovations.

Resource Library
Take an Assessment

Get a security audit and custom report of your corporate environment

GET AN ASSESSMENT
Request a Demo

Walk through our products on a
 guided tour with a Proofpoint expert.

GET A DEMO