www.proofpoint.com Open in urlscan Pro
2a02:e980:107::cf  Public Scan

Submitted URL: https://pages.proofpoint.com/MzA5LVJIVi02MTkAAAF_PJJIoBMQ_pCA6hYg1q6P_Qh3WpHh9QA-PcmMeQBWHgxUrtyOuFF8IknY1Atvh3wFB7T7kyo=
Effective URL: https://www.proofpoint.com/us?mkt_tok=MzA5LVJIVi02MTkAAAF_PJJIoFd0XxK-axQIiwF58e1aM3XuEXS_EUB_WXUXt1WYiIT60xd45NxqyKfkrc9w6...
Submission: On August 31 via api from US

Form analysis 1 forms found in the DOM

/us

<form action="/us" data-region="us" data-language="en">
  <input type="text" name="search_block_form" placeholder="Search">
  <input type="submit">
</form>

Text Content

Skip to main content
Products Solutions Partners Resources Company ContactLanguages
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Main Menu

EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against cyber criminals accessing your sensitive data and trusted
accounts.

COMPLIANCE AND ARCHIVING

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Protect from data loss by negligent, compromised, and malicious users.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalized assistance from our expert team.


PRIORITIZE AND ACT ON INSIDER THREATS

Protect your people and data from insider threats across the organization.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite

DEFEND YOUR REMOTE WORKFORCE

Secure access to corporate resources and ensure business continuity for your
remote workers


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal Channel Buzz

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


THREAT CENTER

Learn about our threat operations center and read about the latest risks in our
threat blog and reports.

Learn More

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
United States United Kingdom France Germany Italy Spain Japan Australia
Products
Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail
Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos
and Materials Phishing Email Reporting and Analysis Business Intelligence
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security Zero Trust Network Access (ZTNA)
Overview Capture & Monitor
Content Capture Content Patrol Compliance Gateway
Archiving
Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI
Compliance
Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention
(DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider
Threat Management
Overview Social Media Protection Domain Fraud Monitoring Executive and Location
Threat Monitoring
Overview Technical Account Managers Premium Threat Information Service Managed
Services for Security Awareness Training People-Centric Security Program Managed
Email Security Insider Threat Management Services Compliance and Archiving
Services Consultative Services
Products Solutions Partners Resources Company
United States United Kingdom France Germany Italy Spain Japan Australia
Login
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Contact


EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against cyber criminals accessing your sensitive data and trusted
accounts.

COMPLIANCE AND ARCHIVING

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Protect from data loss by negligent, compromised, and malicious users.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalized assistance from our expert team.

Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail
Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos
and Materials Phishing Email Reporting and Analysis Business Intelligence
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security Zero Trust Network Access (ZTNA)
Overview Capture & Monitor
Content Capture Content Patrol Compliance Gateway
Archiving
Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI
Compliance
Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention
(DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider
Threat Management
Overview Social Media Protection Domain Fraud Monitoring Executive and Location
Threat Monitoring
Overview Technical Account Managers Premium Threat Information Service Managed
Services for Security Awareness Training People-Centric Security Program Managed
Email Security Insider Threat Management Services Compliance and Archiving
Services Consultative Services


PRIORITIZE AND ACT ON INSIDER THREATS

Protect your people and data from insider threats across the organization.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite

DEFEND YOUR REMOTE WORKFORCE

Secure access to corporate resources and ensure business continuity for your
remote workers


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal Channel Buzz

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


THREAT CENTER

Learn about our threat operations center and read about the latest risks in our
threat blog and reports.

Learn More

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
Zeigen Sie weiterhin Inhalte für Ihren Standort an
United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen


PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing


PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing


PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing

Get the report



A DETAILED ANALYSIS OF A CHAOTIC
YEAR IN CYBERSECURITY

The Human Factor 2021


A DETAILED ANALYSIS OF A CHAOTIC
YEAR IN CYBERSECURITY

The Human Factor 2021


A DETAILED ANALYSIS OF A
CHAOTIC YEAR IN CYBERSECURITY

The Human Factor 2021

Get the report



"INSIDERS ARE PEOPLE, NOT COMPUTERS"

Forrester Best Practices: Mitigating Insider Threat.


"INSIDERS ARE PEOPLE, NOT COMPUTERS"

Forrester Best Practices: Mitigating Insider Threat.


"INSIDERS ARE
PEOPLE, NOT
COMPUTERS"

Forrester Best Practices:
Mitigating Insider Threat.

Get the report



PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing


PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing


PHISHING CAN COST MORE
THAN $1,500 PER EMPLOYEE

New Ponemon Report: The Cost of Phishing

Get the report



A DETAILED ANALYSIS OF A CHAOTIC
YEAR IN CYBERSECURITY

The Human Factor 2021


A DETAILED ANALYSIS OF A CHAOTIC
YEAR IN CYBERSECURITY

The Human Factor 2021


A DETAILED ANALYSIS OF A
CHAOTIC YEAR IN CYBERSECURITY

The Human Factor 2021

Get the report

 * 1
 * 2
 * 3


PROOFPOINT GIVES YOU PROTECTION AND VISIBILITY FOR YOUR GREATEST CYBERSECURITY
RISK—YOUR PEOPLE.

We provide the most effective cybersecurity and compliance solutions to protect
people on every channel including email, the web, the cloud, social media and
mobile messaging.


THREAT PROTECTION

Defend your #1 threat vector, stopping malware, credential phishing, and
impersonation across email, cloud and mobile messaging. Orchestrate responses to
detected attacks and get actionable intelligence on who your Very Attacked
People (VAPs) are.


INFORMATION PROTECTION

Get visibility into where your sensitive data is exposed across email and the
cloud. Lock down access to files in the cloud, prevent data loss, and archive
email and other communications to stay compliant.


USER PROTECTION

Educate your people and reduce risk with advanced threat simulations and
cybersecurity awareness training. Protect them across personal webmail and web
browsing.


ECOSYSTEM PROTECTION

Secure the digital channels you don’t own. Block imposter attacks and malicious
content that uses trusted and lookalike email domains, web domains, and social
media handles.

Learn About Our Unique Approach
Previous
misc



WE HAVE TO BE ABLE TO SEE THE LATEST TRENDS AND ADAPT TO THEM AS QUICKLY AS
POSSIBLE.

Seth Edgar, MSU chief information security officer



misc



WE LIVE IN AN IMMEDIATE, I-WANT-IT-NOW-WORLD. THESE SERVICES ARE ORIENTED TO
SERVE CONSUMERS' RIGHT-NOW-NEEDS.

Martin Littmann, Chief Technology Officer and Chief Information Security Officer
Kelsey-Seybold Clinic



misc



WE HAVE TO BE ABLE TO SEE THE LATEST TRENDS AND ADAPT TO THEM AS QUICKLY AS
POSSIBLE.

Seth Edgar, MSU chief information security officer



misc



WE LIVE IN AN IMMEDIATE, I-WANT-IT-NOW-WORLD. THESE SERVICES ARE ORIENTED TO
SERVE CONSUMERS' RIGHT-NOW-NEEDS.

Martin Littmann, Chief Technology Officer and Chief Information Security Officer
Kelsey-Seybold Clinic



Next
 * 1
 * 2

ANALYST REPORT


FORRESTER WAVE™: ENTERPRISE EMAIL SECURITY, Q2 2021

Learn why Proofpoint has been named a leader in enterprise email security.
Learn More


ANALYST REPORT


GARTNER MARKET GUIDE FOR INSIDER RISK MANAGEMENT SOLUTIONS

Learn how Proofpoint addresses Gartner’s evaluation considerations.
Read Now


ANALYST REPORT


HOW TO PREPARE FOR RANSOMWARE ATTACKS

Learn more about what you should do before, during and after a ransomware
attack.
Learn More


ANALYST REPORT


GARTNER MARKET GUIDE FOR SECURITY AWARENESS COMPUTER-BASED TRAINING

Learn why awareness programs need to evolve and Gartner's view on the market.
Learn More



PROTECT YOUR ORGANIZATION AGAINST THE LATEST CYBERSECURITY THREATS

Contact Us Today


ABOUT

 * Overview
 * Why Proofpoint
 * Careers
 * Leadership Team
 * News Center
 * Nexus Platform


THREAT CENTER

 * Human Factor Report
 * Threat Glossary
 * Threat Blog
 * Daily Ruleset


PRODUCTS

 * Email Security & Protection
 * Advanced Threat Protection
 * Security Awareness Training
 * Cloud Security
 * Archive & Compliance
 * Information Protection
 * Digital Risk Protection
 * Product Bundles


RESOURCES

 * Whitepapers
 * Webinars
 * Datasheets
 * Events
 * Customer Stories
 * Blog
 * Free Trial


CONNECT

 * +1-408-517-4710
 * Contact Us
 * Office Locations
 * Request a Demo


SUPPORT

 * Support Login
 * Support Services
 * IP Address Blocked?

 * Facebook
 * Twitter
 * linkedin
 * Youtube

 * United States
 * United Kingdom
 * France
 * Germany
 * Italy
 * Spain
 * Japan
 * Australia

© 2021. All rights reserved. Terms and conditions Privacy Policy Sitemap