Skip to main content
English (Americas)
Search
Login
Platform
Products
Solutions
Proofpoint
Contact
Search
Platform
Products
Solutions
Partners
Resources
Company
Search
Login
English (Americas)
Platform
Products
Solutions
Partners
Resources
Company
Protect People
Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.
Email Security
Impersonation Protection
More products
Defend Data
Transform your information protection with a human-centric, omni-channel approach.
Enterprise DLP
Adaptive Email DLP
Insider Threat Management
Intelligent Compliance
Mitigate Human Risk
Unlock full user risk visibility and drive behavior change.
Security Awareness
Augment Your Capabilities
Managed Services
Product Packages
More Protect People Products
Account Take-Over and Identity Protection
Secure vulnerable identities, stop lateral movement and privilege escalation.
Adaptive Email Security
Stop more threats with a fully integrated layer of behavioral AI.
Secure Email Relay
Secure your application email and accelerate DMARC implementation
Solutions by Use Case
How Proofpoint protects your people and data.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and holistic approach.
More use cases
Solutions by Industry
People-centric solutions for your organization.
Federal Government
Cybersecurity for federal government agencies.
State and Local Government
Protecting the public sector, and the public from cyber threats.
More industries
Comparing Proofpoint
Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
View comparisons
Solutions By Use Case
How Proofpoint protects your people and data.
Change User Behavior
Help your employees identify, resist and report attacks before the damage is done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernize Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.
Solutions By Industry
People-centric solutions for your organization.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organization.
Healthcare
Protect clinicians, patient data, and your intellectual property against advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.
Proofpoint vs. the competition
Side-by-side comparisons.
Proofpoint vs. Abnormal Security
Proofpoint vs. Mimecast
Proofpoint vs. Cisco
Proofpoint vs Microsoft
Proofpoint vs. Microsoft Purview
Proofpoint vs. Legacy DLP
Partners
Deliver Proofpoint solutions to your customers.
Become a Partner
Archive Extraction Partners
Learn about Extraction Partners.
GSI Partners
Learn about our global consulting.
Technology and Alliance Partners
Learn about our relationships.
Social Media Protection Partners
Learn about the technology and....
Portal Login
Resources
Find reports, webinars, blogs, events, podcasts and more.
Resource Library
Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.
Cybersecurity Academy
Earn your certification to become a Proofpoint Certified Guardian.
Podcasts
Learn about the human side of cybersecurity.
New Perimeters Magazine
Get the latest cybersecurity insights in your hands.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.
Company
Proofpoint protects organizations' greatest assets and biggest risks: their people.
About Proofpoint
Why Proofpoint
Learn about our unique people-centric approach to protection.
Careers
Stand out and make a difference at one of the world's leading cybersecurity companies.
News Center
Read the latest press releases, news stories and media highlights about Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.
Platform
Discover the Proofpoint human-centric platform.
Learn More
Nexus
Detection technologies to protect people and defend data.
Zen
Protect and engage users wherever they work.
Search Proofpoint
Try searching for
Email Security
Phishing
DLP
Email Fraud
Select Product Login
Support Log-in
Proofpoint Cybersecurity Academy
Digital Risk Portal
Email Fraud Defense
ET Intelligence
Proofpoint Essentials
Sendmail Support Log-in
Select Language
English (Americas)
English (Europe, Middle East, Africa)
English (Asia-Pacific)
Español
Deutsch
Français
Italiano
Português
日本語
한국어
Sitemap
Sitemap
Products
Email Security and Protection
Email Protection
Email Fraud Defense
Secure Email Relay
Threat Response Auto-Pull
Sendmail Open Source
Essentials for Small Business
Advanced Threat Protection
Targeted Attack Protection in Email
Email Isolation
Threat Response
Emerging Threats Intelligence
Security Awareness Training
Simulated Phishing and Knowledge Assessments
Training Modules, Videos and Materials
Phishing Email Reporting and Analysis
Evaluate - Security Programme Reporting
Cloud Security
Browser Isolation
Cloud Account Defense
Cloud App Security Broker
Web Security
Compliance and Archiving
Automate
Capture
Patrol
Track
Archive
Discover
Supervision
Information Protection
Enterprise Data Loss Prevention (DLP)
Insider Threat Management
Intelligent Classification and Protection
Endpoint Data Loss Prevention (DLP)
Email Data Loss Prevention (DLP)
Email Encryption
Data Discover
Digital Risk Protection
Social Media Protection
Domain Fraud Monitoring
Executive and Location Threat Monitoring
Premium Security Services
Technical Account Managers
Proofpoint Threat Information Services
Managed Services for Security Awareness Training
People-Centric Security Program
Managed Email Security
Managed Services for Information Protection
Insider Threat Management Services
Compliance and Archiving Services
Consultative Services
Solutions
Combat Email and Cloud Threats
Change User Behavior
Combat Data Loss and Insider Risk
Modernize Compliance and Archiving
Protect Cloud Apps
Prevent Loss from Ransomware
Secure Microsoft 365
Defend Your Remote Workforce with Cloud Edge
Solutions by Industry
Federal Government
State and Local Government
Higher Education
Financial Services
Healthcare
Mobile Operators
Internet Service Providers
Small and Medium Businesses
Partner Programs
Channel Partners
Archive Extraction Partners
Global System Integrator (GSI) and Managed Service Provider (MSP) Partners
Technology and Alliance Partners
Social Media Protection Partners
Proofpoint Essential Partner Program
Resources
Resource Library
Blog
Podcasts
Threat Glossary
Events
Customer Stories
Webinars
Data Sheets
Earn CPE Credits
Proofpoint Free Trial
News Center
Security Hub
Threat Hub
CISO Hub
Cybersecurity Awareness Hub
Ransomware Hub
Insider Threat Management Hub
Threat Blog
Daily Ruleset
Company
About Proofpoint
Why Proofpoint
Careers
Privacy and Trust
Environmental, Social, and Governance
Leadership Team
Nexus Platform
Connect
Contact Us
Request a Demo
Support
Support Login
Support Services
Blocked IP Address Checker
Top Blog Categories
Compliance and Archiving Blogs
CISO Perspectives Blogs
Cloud Security Blogs
Corporate News Blogs
Email and Cloud Threats Blogs
Engineering Insights Blogs
Information Protection Blogs
Insider Threat Management Blogs
Remote Workforce Protection Blogs
Security Awareness Training Blogs
Top Blogs
What to Do if You Respond or Reply to a Phishing Email
Understanding the information TikTok gathers and stores
GDPR: Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)
Key Findings from the 2022 Verizon Data Breach Investigations Report (DBIR) Underscore the Role of the Human Element in Data Breaches
The Top 4 Use Cases for a Modern Approach to DLP
Microsoft Teams HIPAA Compliance: 3 Things Businesses Need to Know
New Redline Password Stealer Malware
The First Step: Initial Access Leads to Ransomware
5 Examples of Malicious Insider Data and Information Misuse
Rising Tide: Chasing the Currents of Espionage in the South China Sea
2021 Gartner® Market Guide for Email Security: Proofpoint Lets You Have Your Cake and Eat It, Too
What is Website Categorization and How to Do It
Proofpoint Analyzes Potentially Dangerous Functionality in Microsoft Sway That Enables Phishing and Malware Delivery
10 Best Practices for Network Security Management
How Cyber Criminals Target Cryptocurrency
Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO
Reporting Phishing Simulations: The Essential Metric to Measure in Phishing Awareness
This isn't Optimus Prime's Bumblebee but it's Still Transforming
How Threat Actors Are Adapting to a Post-Macro World
FBI’s IC3 Report: Financial Losses Due to Email Fraud Hit Record High in 2021
Top Glossary Pages
What Is a Computer Virus?
What Is Email Spoofing?
What Is Ransomware?
What Is a Sandbox?
What Is DKIM?
What Is Phishing?
What Is Smishing?
Business Email Compromise (BEC)
What Is a Social Media Threat?
What Is SPF?
What Is Email Security?
What Is SMTP Relay?
What Is the OSI Model?
What Is E-Discovery?
What Is Data Loss Prevention (DLP)?
What Is Social Engineering?
What Is SSTP?
What Is Encryption?
What Is a Secure Email Gateway (SEG)?
What Is Pharming?