Skip to main content
English (Europe, Middle East, Africa)
Search
Login
Products
Solutions
Resources
Proofpoint
Contact
Search
Products
Solutions
Partners
Resources
Company
Search
Login
English (Europe, Middle East, Africa)
Products
Solutions
Partners
Resources
Company
Maximise security. Optimise value.
Products
Threat Protection
Stop inbound email threats and drive security awareness.
Impersonation Protection
Authenticate email and identify risky suppliers.
Identity Protection
Protect identities in hybrid enterprises from account takeover.
Information Protection
Defend data and manage insider threat.
Premium Services
Leverage proactive expertise, operational continuity and deeper insights from our skilled experts.
Solutions
See how we solve today's complex cyber threats and attacks.
Solutions by Industry
People-centric solutions for your organization.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and holistic approach.
Change User Behaviour
Help your employees identify, resist and report attacks before the damage is done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders by correlating content, behaviour and threats.
Modernise Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk.
Secure Microsoft 365
Implement the very best security and compliance solution for your Microsoft 365 collaboration suite.
Defend Your Remote Workforce with Cloud Edge
Secure access to corporate resources and ensure business continuity for your remote workers.
Authenticate Your Email
Protect your email deliverability with DMARC.
Modernise Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Solutions By Industry
People-centric solutions for your organization.
Financial Services
Counties and Local Government
Higher Education
Healthcare
Mobile for ISPs
Email for ISPs
Small and Medium Businesses
Channel Partners
Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business.
Archive Extraction Partners
Learn about the benefits of becoming a Proofpoint Extraction Partner.
Technology and Alliance Partners
Learn about our relationships with industry-leading firms to help protect your people, data and brand.
Social Media Protection Partners
Learn about the technology and alliance partners in our Social Media Protection Partner program.
Archive Extraction Partners
Learn about Proofpoint Extraction Partners.
Become a Channel Partner
Channel Partner Portal
Resource Library
Find the information you're looking for in our library of videos, data sheets, white papers and more.
Blog
Keep up with the latest news and happenings in the ever-evolving cybersecurity landscape.
Podcasts
Learn about the human side of cybersecurity. Episodes feature insights from experts and executives.
New Perimeters Magazine
Get the latest cybersecurity insights in your hands - featuring valuable knowledge from our own industry experts.
Threat Glossary
Learn about the latest security threats and how to protect your people, data, and brand.
Events
Connect with us at events to learn how to protect your people and data from ever-evolving threats.
Customer Stories
Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.
About Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people.
Why Proofpoint
Today's cyber attacks target people. Learn about our unique people-centric approach to protection.
News Center
Read the latest press releases, news stories and media highlights about Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other regulations.
Environmental, Social, and Governance
Learn about our people-centric principles and how we implement them to positively impact our global community.
Search Proofpoint
Try searching for
Email Security
Phishing
DLP
Email Fraud
Select Product Login
Support Log-in
Digital Risk Portal
Email Fraud Defense
ET Intelligence
Proofpoint Essentials
Sendmail Support Log-in
Select Language
English (Europe, Middle East, Africa)
English (Americas)
English (Asia-Pacific)
Español
Deutsch
Français
Italiano
Português
日本語
한국어
Sitemap
Sitemap
Products
Email Security and Protection
Email Protection
Email Fraud Defense
Secure Email Relay
Threat Response Auto-Pull
Sendmail Open Source
Essentials for Small Business
Advanced Threat Protection
Targeted Attack Protection in Email
Email Isolation
Threat Response
Emerging Threats Intelligence
Security Awareness Training
Simulated Phishing and Knowledge Assessments
Training Modules, Videos and Materials
Phishing Email Reporting and Analysis
Evaluate - Security Programme Reporting
Cloud Security
Browser Isolation
Cloud Account Defense
Cloud App Security Broker
Web Security
Archiving and Compliance
Automate
Capture
Patrol
Track
Archive
Discover
Supervision
Information Protection
Enterprise Data Loss Prevention (DLP)
Insider Threat Management
Intelligent Classification and Protection
Endpoint Data Loss Prevention (DLP)
Email Data Loss Prevention (DLP)
Email Encryption
Data Discover
Digital Risk Protection
Social Media Protection
Digital Compliance
Domain Fraud Monitoring
Executive and Location Threat Monitoring
Premium Security Services
Technical Account Managers
Proofpoint Threat Information Services
Managed Services for Security Awareness Training
People-Centric Security Program
Managed Services for Information Protection
Solutions
Combat Email and Cloud Threats
Change User Behaviour
Combat Data Loss and Insider Risk
Intelligent Compliance
Protect Cloud Apps
Secure Microsoft 365
Defend Your Remote Workforce with Cloud Edge
Solutions by Industry
Financial Services
Healthcare
Mobile for ISPs
Email for ISPs
Small and Medium Businesses
Proofpoint Partners
Channel Partners
Archive Extraction Partners
Technology and Alliance Partners
Social Media Protection Partners
Become a Channel Partner
Channel Partner Portal
Resources
Resource Library
Proofpoint Blog
Podcasts
Events
Customer Stories
Webinars
White Papers
Data Sheets
Free Trial
Security Hub
Cybersecurity Awareness Hub
Ransomware Hub
Compliance Hub
Insider Threat Management Hub
Company
About Proofpoint
Why Proofpoint
News Centre
Privacy and Trust
Careers
Leadership Team
Nexus Platform
Threat Centre
Human Factor Report
Threat Glossary
Threat Blog
Daily Ruleset
Connect
Contact Us
Request a Demo
Support
Support Login
Support Services
Blocked IP Address Checker
Top Threat References
What Is a Computer Virus?
What Is HIPAA Compliance?
What Is a Web Proxy Server?
What Is Smishing?
What Is Email Spoofing?
National Cybersecurity Awareness Month (NCSAM)
What Is a Sandbox?
CryptoLocker
Email Scams
Network-Delivered Threats
What Is DKIM?
What Is a Remote Access Trojan (RAT)?
DMARC
What Is Email Security?
Business Email Compromise (BEC)
What Is Phishing?
What Is Pharming?
What Is a VPN?
What Is a Brute-Force Attack?
What Is an Insider Threat?
Top Blogs
What to Do if You Respond or Reply to a Phishing Email
GDPR: Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)
Where Can Your Data Reside? Understanding the Data Residency Challenges of the Likely Brexit Scenarios
Rising Tide: Chasing the Currents of Espionage in the South China Sea
Bye-Bye BERT-ie: Why We Built Our Own Neural Network Language Model Instead of Using BERT or GPT
5 Major Risks of Hybrid Working
New Vulnerabilities Bypass Multi-Factor Authentication for Microsoft 365
The Next Generation of Targeted BEC Attacks: How Stagecoach is Fighting Imposter Blindness
Understanding BEC Scams: Supplier Invoicing Fraud
Behavioural Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint
FBI’s IC3 Report: Financial Losses Due to Email Fraud Hit Record High in 2021
How to Use Brand Logos in Email Using BIMI
Key Findings from the 2022 Verizon Data Breach Investigations Report (DBIR) Underscore the Role of the Human Element in Data Breaches
Proofpoint Introduces Advanced DLP for Microsoft Teams
Proofpoint Introduces Protection Against Data Loss by “Leavers” on Unmanaged Devices
New Ponemon Study Finds the Annual Cost of Phishing Scams Has More Than Tripled Since 2015
Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media
Cobalt Strike: Favourite Tool from APT to Crimeware
New Variant of Buer Loader Written in Rust
Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO