Skip to main content
English: Europe, Middle East, Africa
Search
Login
Platform
Products
Solutions
Proofpoint
Contact
Search
Platform
Products
Solutions
Partners
Resources
Company
Search
Login
English: Europe, Middle East, Africa
Platform
Products
Solutions
Partners
Resources
Company
Protect People
Multi-layered, adaptive defences for threat detection, impersonation, and supplier risk.
Email Security
Impersonation Protection
More products
Defend Data
Transform your information protection with a human-centric, omni-channel approach.
Enterprise DLP
Adaptive Email DLP
Insider Threat Management
Data Security Posture Management
Digital Communications Governance
Mitigate Human Risk
Unlock full user risk visibility and drive behaviour change.
Security Awareness
Augment Your Capabilities
Managed Services
Product Packages
More Protect People Products
Account Take-Over and Identity Protection
Secure vulnerable identities, stop lateral movement and privilege escalation.
Adaptive Email Security
Stop more threats with a fully integrated layer of behavioural AI.
Collab Protection
Protect your people from messaging and collaboration threats.
Email Fraud Defense
Protect your brand reputation, increase deliverability and identify lookalikes of your domains.
Secure Email Relay
Secure your application email and accelerate DMARC implementation.
Solutions
See how we solve today's complex cyber threats and attacks.
Solutions by Use Case
How Proofpoint protects your people and data.
Ensure Acceptable GenAI Use
Empower your workforce with safe GenAI practices.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and holistic approach.
More use cases
Solutions by Industry
People-centric solutions for your organisation.
State and Local Government
Protecting the public sector, and the public from cyber threats.
More industries
Comparing Proofpoint
Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
View comparisons
Solutions By Use Case
How Proofpoint protects your people and data.
Change User Behaviour
Help your employees identify, resist and report attacks before the damage is done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernise Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.
Solutions By Industry
People-centric solutions for your organisation.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organisation.
Healthcare
Protect clinicians, patient data, and your intellectual property against advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.
Proofpoint vs. the competition
Side-by-side comparisons.
Proofpoint vs. Abnormal Security
Proofpoint vs. Mimecast
Proofpoint vs. Cisco
Proofpoint vs. Microsoft Purview
Proofpoint vs. Legacy DLP
Partners
Deliver Proofpoint solutions to your customers.
Channel Partners
Archive Extraction Partners
Learn about Extraction Partners.
GSI and MSP Partners
Learn about our global consulting.
Technology and Alliance Partners
Learn about our relationships.
Social Media Protection Partners
Learn about the technology and....
Proofpoint Essentials Partner Programs
Small Business Solutions.
Become a Channel Partner
Resources
Find reports, webinars, blogs, events, podcasts and more.
Resource Library
Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.
Cybersecurity Academy
Earn your certification to become a Proofpoint Certified Guardian.
Podcasts
Learn about the human side of cybersecurity.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.
Company
Proofpoint protects organisations' greatest assets and biggest risks: their people.
About Proofpoint
Careers
Stand out and make a difference at one of the world's leading cybersecurity companies.
News Center
Read the latest press releases, news stories and media highlights about Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.
Platform
Discover the Proofpoint human-centric platform.
Learn More
Nexus
Detection technologies to protect people and defend data.
Zen
Protect and engage users wherever they work.
Search Proofpoint
Try searching for
Email Security
Phishing
DLP
Email Fraud
Select Product Login
Support Log-in
Proofpoint Cybersecurity Academy
Digital Risk Portal
Email Fraud Defence
ET Intelligence
Proofpoint Essentials
Sendmail Support Log-in
Select Language
English: Europe, Middle East, Africa
English: Americas
English: Asia-Pacific
Español
Deutsch
Français
Italiano
Português
日本語
한국어
Blog
Blog
Blog
Subscribe
Email and Cloud Threats
May 16, 2025
Monica Gupta
Cybersecurity Stop of the Month: Stopping Phishing Attacks that Pivot from Email to SMS
Email and Cloud Threats
May 15, 2025
Angela Morris
Proofpoint Data Security Innovations—Q1 2025
Insider Threat Management
May 09, 2025
Stephanie Torto
What Is the Goal of an Insider Threat Program?
Browse by category
CISO Perspectives
Cloud Security
Compliance and Archiving
Corporate News
DSPM
Email and Cloud Threats
Engineering Insights
Identity Threat Defense
Information Protection
Insider Threat Management
Remote Workforce Protection
Security Awareness Training
Threat Insight
Search
March 11, 2024
Garrett Guinivan, Staff Solutions Architect, U. S. Federal Team
How Proofpoint Helps Federal Government Agencies Defend Against Cybercriminals and Insider Threats
Read More
March 07, 2024
Dave Cook and Tyler Johnson
Cybersecurity Stop of the Month: Detecting a Multilayered Malicious QR Code Attack
Read More
March 06, 2024
Selena Larson, Jake G. and Dusty Miller
TA4903: Actor Spoofs U.S. Government, Small Businesses in Phishing, BEC Bids
Read More
March 04, 2024
Tommy Madjar, Kelsey Merriman, Selena Larson and the Proofpoint Threat Research Team
TA577’s Unusual Attack Chain Leads to NTLM Data Theft
Read More
February 29, 2024
Carl Leonard, Cybersecurity Strategist, EMEA, Proofpoint
Break the Attack Chain: Decisive Moves
Read More
February 28, 2024
Tim Nursall, Staff Sales Engineer, Proofpoint Identity Threat Protection
Break the Attack Chain: Developing the Position to Detect Lateral Movement Attacks
Read More
February 27, 2024
Carl Leonard, Cybersecurity Strategist, EMEA, Proofpoint
Risky and They Know It: 95% of Risk-Taking Users in Europe and the Middle East Aware of the Dangers but Do It Anyway, 2024 State of the Phish Reveals
Read More
February 26, 2024
Stephanie Torto
and
Itir Clarke
The Ins and Outs of Data Privacy, Part 2: Privacy by Design in Information Protection
Read More
February 21, 2024
Shawn Aquino
Understanding the EU AI Act: Implications for Communications Compliance Officers
Read More
February 20, 2024
Paul Chavez
Guardians of the Digital Realm: How to Protect Yourself from Social Engineering
Read More
Load More Blog Posts
Most Popular
April 24, 2025
Sumit Dhawan
Q1 Business Momentum Cements Proofpoint’s Position as Undisputed Leader in Human-Centric Security
Read More
November 24, 2024
AI, Data Security and CISO Shifts: Top Cybersecurity Trends to Watch in 2025
Read More
October 25, 2024
Jenny Chen
A Global Manufacturer’s Journey: Making the Switch from Abnormal Security to Proofpoint
Read More
July 23, 2024
Sumit Dhawan
Proofpoint Leads the Way in Protecting People and Defending Data with a Pivotal Quarter
Read More
Subscribe to the Proofpoint Blog