Protect People
Visibility, insight and controls to prevent and mitigate four key sources of people-based risk. People Protection packages from Proofpoint can help you manage the entire spectrum of threats.
Core
Threat Protection
Stop inbound email threats and drive security awareness. Accurately detect and block BEC, phishing emails, malware, spam and more with unparalleled threat intelligence and AI-driven technology. Change unsafe user behaviour with threat-driven and personalised learning.
What you get
- P0
- Email Protetion
- Targeted Attack Protection
- Threat Response Auto Pull
- P1
- Email Protection
- Targeted Attack Protection
- Threat Response Auto Pull
- Security Awareness
Plus
Impersonation Protection
Authenticate email and identify risky suppliers. Protect your business communications from brand abuse and compromised suppliers. Authenticate employee and application email while defending against compromised suppliers.
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
Advanced
Impersonation Protection
Adaptive Email DLP
Stop data loss with behavioural AI. Automatically detect and prevent email misdelivery, misattached files and data exfiltration in real time. Drastically reduce time spent on configuration, investigation and remediation.
Email DLP and Encryption
Stop data loss with built-in or custom policies. Mitigate the risk of a data breach via email. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
- Misdirected Email Protection
- Email Exfiltration Protection
- Email DLP
- Email Encryption
Complete
Impersonation Protection
Adaptive Email DLP
Email DLP and Encryption
Identity Protection
Discovers vulnerable identities and surfaces compromised accounts in the cloud and on endpoints. It detects privilege escalation and stops lateral movement leveraging deceptions, revokes access to compromised accounts, reverses manipulated MFA settings and access to third-party apps.
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
- Misdirected Email Protection
- Email Exfiltration Protection
- Email DLP
- Email Encryption
- Identity Threat Defence
- Targeted Attack Protection Account Takeover
Core
Plus
Advanced
Complete
Threat Protection
Stop inbound email threats and drive security awareness. Accurately detect and block BEC, phishing emails, malware, spam and more with unparalleled threat intelligence and AI-driven technology. Change unsafe user behaviour with threat-driven and personalised learning.
Impersonation Protection
Authenticate email and identify risky suppliers. Protect your business communications from brand abuse and compromised suppliers. Authenticate employee and application email while defending against compromised suppliers.
Impersonation Protection
Adaptive Email DLP
Stop data loss with behavioural AI. Automatically detect and prevent email misdelivery, misattached files and data exfiltration in real time. Drastically reduce time spent on configuration, investigation and remediation.
Email DLP and Encryption
Stop data loss with built-in or custom policies. Mitigate the risk of a data breach via email. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.
Impersonation Protection
Adaptive Email DLP
Email DLP and Encryption
Identity Protection
Discovers vulnerable identities and surfaces compromised accounts in the cloud and on endpoints. It detects privilege escalation and stops lateral movement leveraging deceptions, revokes access to compromised accounts, reverses manipulated MFA settings and access to third-party apps.
What you get
- P0
- Email Protection
- Targeted Attack Protection
- Threat Response Auto Pull
- P1
- Email Protection
- Targeted Attack Protection
- Threat Response Auto Pull
- Security Awareness
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
- Misdirected Email Protection
- Email Exfiltration Protection
- Email DLP
- Email Encryption
What you get
- Email Fraud Defence
- Secure Email Relay
- Supplier Threat Protection
- Misdirected Email Protection
- Email Exfiltration Protection
- Email DLP
- Email Encryption
- Identity Threat Defence
- Targeted Attack Protection Account Takeover
Defend Data
Shift from reactive to proactive data protection with Information Protection packages from Proofpoint. Adaptive, human-centric data-loss prevention to help identify and mitigate risks before they result in a data breach.
Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.
What you get
- Misdirected Email Protection
- Email Exfiltration Protection
Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.
What you get
- Email DLP
- Email Encryption
Protect against data loss involving insiders acting maliciously, negligently, or unknowingly. Correlate user activity and data movement to identify user risk, detect incidents, and accelerate response.
What you get
- Insider Threat Management
Prevent data loss from managed and unmanaged endpoints and sanctioned cloud apps, with a modern approach. Investigate data loss incidents in seconds with unified data and user risk.
What you get
- Insider Threat Management
- Endpoint DLP
- Cloud DLP
- SaaS Isolation
- Optical Character Recognition (OCR) for Cloud
- Nexus People Risk Explorer
Mitigate regulatory, legal, or corporate compliance risk and accelerate investigations by capturing, monitoring and preserving digital communications.
What you get
- Capture
- Patrol
- Track
- Archive
- Discover
- Supervision
- Automate
Leverage behavioural AI to automatically detect and prevent email misdelivery, misattached files and data exfiltration in real-time. Drastically reduce time spent on configuration, investigation and remediation.
Mitigate the risk of a data breach via email with built-in or custom policies. Gain out-of-the-box data visibility and enforcement without the complexity and cost of disparate solutions.
Protect against data loss involving insiders acting maliciously, negligently, or unknowingly. Correlate user activity and data movement to identify user risk, detect incidents, and accelerate response.
Prevent data loss from managed and unmanaged endpoints and sanctioned cloud apps, with a modern approach. Investigate data loss incidents in seconds with unified data and user risk.
Mitigate regulatory, legal, or corporate compliance risk and accelerate investigations by capturing, monitoring and preserving digital communications.
What you get
- Misdirected Email Protection
- Email Exfiltration Protection
What you get
- Email DLP
- Email Encryption
What you get
- Insider Threat Management
What you get
- Insider Threat Management
- Endpoint DLP
- Cloud DLP
- SaaS Isolation
- Optical Character Recognition (OCR) for Cloud
- Nexus People Risk Explorer
What you get
- Capture
- Patrol
- Track
- Archive
- Discover
- Supervision
- Automate