Vendor
Proofpoint
Company Website
- Proofpoint Supervision
Proofpoint Supervision makes your SEC, FINRA and IIROC compliance easier. We provide you with robust digital communications monitoring, review, auditing and reporting across email, social and enterprise collaboration data.
- Identity Protection
Take a defense-in-depth approach to account takeover across your hybrid enterprise
- Defend Against Insider Threats
Get human-centric data-loss and insider-threat protection at the endpoint
- Proofpoint Capture
Proofpoint Capture collects, centralizes, manages and retains the digital communications channels your employees use to collaborate. This spans mobile, meetings, enterprise collaboration, social media, email, voice, files and much more. It contextualizes what’s collected and easily delivers this content into our cloud archive or into any third-party archive of your choice.
- Proofpoint Automate
With Proofpoint Automate, you can use machine learning to significantly reduce your low-risk supervision content. This helps you keep your focus on meaningful content. And at the same time, by streamlining your overall review process, it can help reduce reviewer fatigue and the human errors that can result.
- Adaptive Email Security
Stop more threats, including internal phishing, with a fully integrated layer of behavioral AI.
- Threat Detection
Protect your people from today’s modern threats
- Proofpoint Track
Proofpoint Track helps keep you compliant with and in control of reconciling what you store in your archive – a process that is both manual and cumbersome with other vendors. It gives you the ability to track, audit, report on and reconcile all content in your capture stream. It helps ensure that every file or communication record originally sent is also in your Proofpoint archive or 3rd party data store.
- Adaptive Email DLP
Stop sensitive data loss by augmenting rules-based DLP with AI
- Proofpoint Archive
With Proofpoint Archive, you get a proven, next-generation SaaS archiving solution. As one of only a few archives that have achieved a PCI DSS Compliance attestation, it uses cloud intelligence to give you deep insights into your data. This helps you to reduce the cost, complexity and risk of archiving data to improve litigation readiness and enable corporate and regulatory compliance.
- Proofpoint Nexus
Proofpoint Nexus® is a comprehensive threat intelligence platform powered by AI, machine learning and real-time threat intelligence.
- Proofpoint Discover
With Proofpoint Discover, you can process, analyze and cull more archived information in-house. This helps you optimize your e-discovery processes and dramatically reduce the scope of your e-discovery costs.
- ZenGuide
Drive employee behavior change with automated, risk-based learning
- Proofpoint Patrol
Proofpoint Patrol makes it easy to monitor, remediate and report on social media compliance at scale across all social media channels. It provides you with intelligent classifiers, automated workflows and intuitive reporting. You get complete visibility into your social activity and can manage profiles more efficiently, whether you archive into Proofpoint or another third-party archive.
- Secure Email Relay
Secure your application email and accelerate DMARC implementation.
- Proofpoint Platform
With Proofpoint cybersecurity platform, organizations can protect people and defend data by taking a human-centric approach. Our cybersecurity platform provides best-of-breed solutions to solve four critical concerns—stopping threats, protecting information, guiding users and securing app & identity posture.
- Impersonation Protection
Protect your communications with trusted partners, customers and suppliers
- Email Fraud Defense
Protect your brand reputation, increase deliverability and identify lookalikes of your domains.
- Proofpoint Zen
Proofpoint’s Zen™ is a set of end-user control points designed to protect your people and data, no matter where work happens.
- DLP Transform
Transform your data loss prevention program and architecture
- Data Security Posture Management
Discover and classify valuable and sensitive data while prioritizing risks and reducing attack surfaces.