www.proofpoint.com
Open in
urlscan Pro
2a02:e980:107::cf
Public Scan
Submitted URL: https://pages.proofpoint.com/MzA5LVJIVi02MTkAAAGEEGtQF8VagXO5MMrmdmBeR6CwHMtqm2X25YFk08H6W-OHwMGt72f6wUcnim9PMkxyD8WGTaw=
Effective URL: https://www.proofpoint.com/us?mkt_tok=MzA5LVJIVi02MTkAAAGEEGtQF31Um1RyUKWPbXSPYqtcFc1RPu07bAlzbCKhv0XtQpIgQPI5g6KOCW6AAUrpF...
Submission: On April 28 via api from US — Scanned from DE
Effective URL: https://www.proofpoint.com/us?mkt_tok=MzA5LVJIVi02MTkAAAGEEGtQF31Um1RyUKWPbXSPYqtcFc1RPu07bAlzbCKhv0XtQpIgQPI5g6KOCW6AAUrpF...
Submission: On April 28 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM/us
<form action="/us" data-region="us" data-language="en">
<input type="text" name="search_block_form" placeholder="Search">
<input type="submit">
</form>
POST https://www.facebook.com/tr/
<form method="post" action="https://www.facebook.com/tr/" target="fb01927383901769253" accept-charset="utf-8" style="display: none;"><iframe src="about:blank" id="fb01927383901769253" name="fb01927383901769253"></iframe><input name="id"><input
name="ev"><input name="dl"><input name="rl"><input name="if"><input name="ts"><input name="cd[DataLayer]"><input name="cd[Meta]"><input name="cd[OpenGraph]"><input name="cd[Schema.org]"><input name="cd[JSON-LD]"><input name="sw"><input
name="sh"><input name="v"><input name="r"><input name="ec"><input name="o"><input name="fbp"><input name="it"><input name="coo"><input name="dpo"><input name="dpoco"><input name="dpost"><input name="es"><input name="tm"><input name="exp"><input
name="rqm"></form>
Text Content
Skip to main content Products Solutions Partners Resources Company ContactLanguages Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Main Menu EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. SECURITY SERVICE EDGE Defend against threats, protect your data, and secure access. COMPLIANCE AND ARCHIVING Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Protect from data loss by negligent, compromised, and malicious users. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalized assistance from our expert team. RANSOMWARE HUB Stop ransomware in its tracks with the free research and resources in our Ransomware Hub. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behavior and threats. MODERNIZE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. PREVENT LOSS FROM RANSOMWARE Learn about this growing threat and stop attacks by securing today’s top ransomware vector: email. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government State and Local Government Higher Education Financial Services Healthcare Mobile Operators Internet Service Providers Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS Learn about our global consulting and services partners that deliver fully managed and integrated solutions. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PROOFPOINT ESSENTIALS PARTNER PROGRAMS Small Business Solutions for channel partners and MSPs. PARTNER TOOLS Become a Channel Partner Channel Partner Portal Channel Buzz RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever‑evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Watch now to earn your CPE credits SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Threat Hub Cybersecurity Awareness Hub Ransomware Hub Insider Threat Management Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. CAREERS Stand out and make a difference at one of the world's leading cybersecurity companies. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. SUPPORT Access the full range of Proofpoint support services. Learn More United States United Kingdom France Germany Italy Spain Japan Australia Products Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos and Materials Phishing Email Reporting and Analysis Business Intelligence Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Secure Access Overview Capture & Monitor Content Capture Content Patrol Compliance Gateway Archiving Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI Compliance Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Overview Social Media Protection Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Proofpoint Threat Information Services Managed Services for Security Awareness Training People-Centric Security Program Managed Email Security Managed Services for Information Protection Insider Threat Management Services Compliance and Archiving Services Consultative Services Products Solutions Partners Resources Company United States United Kingdom France Germany Italy Spain Japan Australia Login Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Contact EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. SECURITY SERVICE EDGE Defend against threats, protect your data, and secure access. COMPLIANCE AND ARCHIVING Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Protect from data loss by negligent, compromised, and malicious users. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalized assistance from our expert team. Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos and Materials Phishing Email Reporting and Analysis Business Intelligence Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Secure Access Overview Capture & Monitor Content Capture Content Patrol Compliance Gateway Archiving Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI Compliance Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Overview Social Media Protection Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Proofpoint Threat Information Services Managed Services for Security Awareness Training People-Centric Security Program Managed Email Security Managed Services for Information Protection Insider Threat Management Services Compliance and Archiving Services Consultative Services RANSOMWARE HUB Stop ransomware in its tracks with the free research and resources in our Ransomware Hub. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behavior and threats. MODERNIZE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. PREVENT LOSS FROM RANSOMWARE Learn about this growing threat and stop attacks by securing today’s top ransomware vector: email. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government State and Local Government Higher Education Financial Services Healthcare Mobile Operators Internet Service Providers Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS Learn about our global consulting and services partners that deliver fully managed and integrated solutions. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PROOFPOINT ESSENTIALS PARTNER PROGRAMS Small Business Solutions for channel partners and MSPs. PARTNER TOOLS Become a Channel Partner Channel Partner Portal Channel Buzz RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever‑evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Watch now to earn your CPE credits SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Threat Hub Cybersecurity Awareness Hub Ransomware Hub Insider Threat Management Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. CAREERS Stand out and make a difference at one of the world's leading cybersecurity companies. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. SUPPORT Access the full range of Proofpoint support services. Learn More Join us for Protect 2022, our premier annual event. Register Now Zeigen Sie weiterhin Inhalte für Ihren Standort an United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen 2022 STATE OF THE PHISH REPORT An In-Depth Exploration of User Awareness, Vulnerability and Resilience. Read More FEATURED | E-BOOK REDEFINING DATA LOSS PREVENTION (DLP) Download Now RECOMMENDED | VIRTUAL EVENT JOIN US FOR PROTECT 2022 PROTECT AMERICAS MAY 17-18 Register Now FEATURED | ANALYST REPORT PROOFPOINT RECOGNIZED IN 2021 GARTNER® MARKET GUIDE FOR EMAIL SECURITY Download Now FEATURED | THREAT REPORT 2022 PONEMON COST OF INSIDER THREATS GLOBAL REPORT Download Now FEATURED | ANALYST REPORT GARTNER MAGIC QUADRANT FOR ENTERPRISE INFORMATION ARCHIVING Download Now FEATURED | E-BOOK REDEFINING DATA LOSS PREVENTION (DLP) Download Now RECOMMENDED | VIRTUAL EVENT JOIN US FOR PROTECT 2022 PROTECT AMERICAS MAY 17-18 Register Now PreviousNext * 1 * 2 * 3 * 4 * 5 EXPLORE OUR FULL LIST OF PRODUCTS Protection Starts With People Combat Threats Protect Your Data Modernize Compliance WHY PROOFPOINT PROTECTION STARTS WITH PEOPLE Attackers know your people are the easiest way into your organization. Defend them. Protect them. Empower them with Proofpoint. Learn More About Our Approach WHY PROOFPOINT COMBAT THREATS Email and the cloud are today’s primary attack vectors. Fight back with an intelligent, holistic and people-centric approach that blocks attacks, secures cloud accounts and educates users. Learn More About Our Approach WHY PROOFPOINT PROTECT YOUR DATA Data doesn’t lose itself. Prevent data loss from malicious, negligent or compromised users by correlating content, behavior and threats for better insight and streamlined investigations. Learn More About Our Approach WHY PROOFPOINT MODERNIZE COMPLIANCE Data-retention needs are exploding as organizations create more data on more communications platforms. Manage risk with a modern compliance and archiving solution for IT and legal teams. Learn More About Our Approach Enterprise Archive Targeted Attack Protection Phishing Email Reporting CASB Insider Threat Management E-Discovery Content Capture Supervision Data Loss Prevention Encryption Browser Isolation Web Security Threat Response Email Fraud Defense Email Protection Security Awareness Protection Starts With People Enterprise Archive Targeted Attack Protection Phishing Email Reporting CASB Insider Threat Management E-Discovery Content Capture Supervision Data Loss Prevention Encryption Browser Isolation Web Security Threat Response Email Fraud Defense Email Fraud Defense Security Awareness Attackers know your people are the easiest way into your organization. Defend them. Protect them. Empower them with Proofpoint. Combat Threats Enterprise Archive Targeted Attack Protection Phishing Email Reporting CASB Insider Threat Management E-Discovery Content Capture Supervision Data Loss Prevention Encryption Browser Isolation Web Security Threat Response Email Fraud Defense Email Fraud Defense Security Awareness Email and the cloud are today’s primary attack vectors. Fight back with an intelligent, holistic and people-centric approach that blocks attacks, secures cloud accounts and educates users. Protect Your Data Enterprise Archive Targeted Attack Protection Phishing Email Reporting CASB Insider Threat Management E-Discovery Content Capture Supervision Data Loss Prevention Encryption Browser Isolation Web Security Threat Response Email Fraud Defense Email Fraud Defense Security Awareness Data doesn’t lose itself. Prevent data loss from malicious, negligent or compromised users by correlating content, behavior and threats for better insight and streamlined investigations. Modernize Compliance Enterprise Archive Targeted Attack Protection Phishing Email Reporting CASB Insider Threat Management E-Discovery Content Capture Supervision Data Loss Prevention Encryption Browser Isolation Web Security Threat Response Email Fraud Defense Email Fraud Defense Security Awareness Data-retention needs are exploding as organizations create more data on more communications platforms. Manage risk with a modern compliance and archiving solution for IT and legal teams. Learn More About Our Approach POWERED BY INTELLIGENCE STOP THREATS AND REDUCE COMPLIANCE RISK WITH PROOFPOINT NEXUSAI MACHINE LEARNING Cybersecurity fueled by machine learning, real-time analytics and one of the largest and most diverse data sets in all of cybersecurity. Learn More We sandbox 1 M+ Attachments per day We analyze 1 B+ URLs per day We Monitor 1 M+ Cloud accounts We analyze 1 B+ Email messages per day Learn More START PROTECTING YOUR PEOPLE TODAY Start A Free Trial CUSTOMER STORIES MANY OF THE WORLD'S LARGEST COMPANIES RELY ON PROOFPOINT Every day we protect the people at more Fortune 500 and Global 2000 organizations than anyone else. Explore Our Customer Stories PEOPLE-CENTRIC CYBERSECURITY SOLUTIONS Solutions that work together. Solutions that build on each other. People-centric cybersecurity solutions to keep your business secure, in compliance and thriving. COMBAT DATA LOSS AND INSIDER RISK The human element behind data loss. Learn More CHANGE USER BEHAVIOR You protect your people—and your people can protect you. Learn More COMBAT EMAIL AND CLOUD THREATS Email and cloud security everywhere your people work. Learn More DEFEND YOUR REMOTE WORKFORCE Connected, compliant and secure: Meet the new remote workforce. Learn More PROTECT CLOUD APPS Keep your people and their cloud apps secure. Learn More MODERNIZE COMPLIANCE AND ARCHIVING Digital communication has evolved—so has compliance. Learn More SECURE MICROSOFT 365 Next-level protection and compliance for Microsoft 365. Learn More PREVENT LOSS FROM RANSOMWARE Stop attacks by securing today’s top ransomware vector: email. Learn More CYBERSECURITY INSIGHT AND INTEL YOU WON'T FIND ANYWHERE ELSE. Visit the Threat Hub ABOUT * Overview * Why Proofpoint * Careers * Leadership Team * News Center * Nexus Platform THREAT CENTER * Threat Hub * Cybersecurity Awareness Hub * Ransomware Hub * Threat Glossary * Threat Blog * Daily Ruleset PRODUCTS * Email Security & Protection * Advanced Threat Protection * Security Awareness Training * Cloud Security * Archive & Compliance * Information Protection * Digital Risk Protection * Product Bundles RESOURCES * White Papers * Webinars * Data Sheets * Events * Customer Stories * Blog * Free Trial CONNECT * +1-408-517-4710 * Contact Us * Office Locations * Request a Demo SUPPORT * Support Login * Support Services * IP Address Blocked? * Facebook * Twitter * linkedin * Youtube * United States * United Kingdom * France * Germany * Italy * Spain * Japan * Australia © 2022. All rights reserved. Terms and conditions Privacy Policy Sitemap