DORA FAQs

  • Q: What is the Digital Operational Resilience Act (DORA)?

    A: DORA is a European Union regulation designed to strengthen the IT security of the EU’s financial sector.

    A: DORA is a European Union regulation designed to strengthen the IT security of the EU’s financial sector. It requires regulated entities to implement measures to effectively manage and mitigate operational risk in relation to information and communication technology (ICT). The regulation took effect on 17 January 2025.

  • Q: What entities must comply with DORA?

    A: Financial sector entities (e.g., banks, insurance companies, investments firms, and other financial services organizations) operating in the EU and ICT third-party service providers supporting these entities which have been designated as ‘critical’ by the European Supervisory Authorities.

    A: Financial sector entities (e.g., banks, insurance companies, investments firms, and other financial services organizations) operating in the EU and ICT third-party service providers supporting these entities which have been designated as ‘critical’ by the European Supervisory Authorities.

  • Q: Is Proofpoint regulated by DORA?

    A: No. Proofpoint is not a DORA regulated entity and is not an ICT third-party service provider designated as ‘critical’ by the EU Supervisory Authorities.

    A: No. Proofpoint is not a DORA regulated entity and is not an ICT third-party service provider designated as ‘critical’ by the EU Supervisory Authorities. Proofpoint offers services that can help its regulated customers comply with their DORA obligations.

  • Q: When is an ICT third-party provider identified as ‘critical’?

    A: An ICT third-party provider may be identified as ‘critical’ when the regulated entity would suffer large scale operational failure without the ICT third-party provider’s services.

    A: An ICT third-party provider may be identified as ‘critical’ when the regulated entity would suffer large scale operational failure without the ICT third-party provider’s services.

  • Q: Do Proofpoint’s contracts meet DORA requirements?

    A: Your relationship with Proofpoint is governed by terms and conditions that align with DORA requirements.

    A: Your relationship with Proofpoint is governed by terms and conditions that align with DORA requirements. This may include, but is not limited to, the Proofpoint Master Subscription Agreement or Customer Agreement located on the Proofpoint License Terms website, certain Proofpoint Product Terms, the Proofpoint Data Processing Agreement, and for financial sector customers, our U.S. Financial Services Exhibit and DORA Financial Services Industry Addendum.

  • Q: Does a customer’s use of Proofpoint’s services relieve it from their regulatory obligations?

    A: No. Proofpoint’s financial services customers are required to ensure that they meet their regulatory obligations.

    A: No. Proofpoint’s financial services customers are required to ensure that they meet their regulatory obligations. This includes a well-documented and comprehensive ICT risk management framework, which includes internal strategies, policies, procedures, protocols and tools designed to adequately protect and ensure the operational resilience, security, and availability of their information, systems, and ICT assets.

  • Q: What is an ICT event?

    A: Any incident related to ICT that negatively impacts the regulated entity’s operations, security, or data integrity.

    A: Any incident related to ICT that negatively impacts the regulated entity’s operations, security, or data integrity. This includes, but is not limited to:

    • Cybersecurity events such as a malicious attack, phishing, hacking, ransomware, or data breach,
    • Data loss or corruption resulting from human error, intentional exfiltration, or unauthorized access, modification, or deletion,
    • System or software failures or malfunctions,
    • Insider threats, such as employees leaking or misusing internal sensitive information
    • Regulatory or legal compliance failures,
    • Third-party risks, such as vendors or cloud providers experiencing a security incident, and
    • Natural disasters that impact ICT infrastructure.
  • Q: How can Proofpoint help organizations with their ICT risk management and prevent an ICT event?

    A: Proofpoint offers a range of cybersecurity and compliance solutions that can help its customers protect themselves from cybersecurity threats, insider risks, supply chain vulnerabilities, and other ICT risks.

    A: Proofpoint offers a range of cybersecurity and compliance solutions that can help its customers protect themselves from cybersecurity threats, insider risks, supply chain vulnerabilities, and other ICT risks. This includes, but is not limited to:

    • Email Security and Protection - Proofpoint’s email monitoring solutions utilize advanced threat detection and filtering capabilities to protect against a wide range of threats, such as phishing, malware, spam, malicious URLs, and business email compromise.
    • Adaptive Email DLP (AEDLP) – Proofpoint helps organizations avoid the loss of sensitive data by detecting and preventing misdelivered emails, mis-attached files, and intentional exfiltration of data.
    • Adaptive Email Security (AES) – Proofpoint offers an Integrated Cloud Email Security (ICES) solution that delivers an additional layer of behavioral AI-based detection of advanced threats, including BEC, social engineering, and lateral phishing messages.
    • Insider Threat Management – Proofpoint’s Insider Threat Management can provide visibility into risky employee behavior that leads to business disruption and data loss. Insider Threat Management gathers evidence to accelerate investigations and help ensure appropriate organizational response to mitigate loss.
    • Automated Risk Based Learning – Move beyond standard compliance training to drive behavioral change and build a security-minded culture.
    • Compliance reporting – Proofpoint offers compliance reporting tools and functionality including Compliance Gateway, Track, and Supervision to help organizations monitor and report on compliance with regulations and other requirements.
    • Third party risk management – Proofpoint Supplier Threat Protection (STP) helps keep its customers’ supply chains secure from advanced phishing, malware, and business email compromise (BEC) attacks. It checks suppliers and known third parties for signs that they may have been compromised.
    • Identity Threat Defense – Proofpoint’s Identity Threat Defense (ITD) platform provides comprehensive protection against identity-based threats. It includes Proofpoint Shadow (deception technology for active threat detection) and Proofpoint Spotlight (identity vulnerability discovery and remediation), allowing customers to identify and proactively address risks while also detecting and investigating active attacks through agentless deception techniques and forensic data collection.

© 2025 Proofpoint. All rights reserved. The content on this site is intended for informational purposes only.
最終更新 March 20, 2025.