Beyond Email Protection Advanced defenses to guard against known and unknown threats
Proofpoint Enterprise encompasses multiple facets of security to protect an organization from the latest email-based attacks and enable administrators to easily monitor email security practices across the organization.
Proofpoint's Targeted Attack Protection includes deep content analysis, signature-based virus and malware scanning, and granular filtering controls.
Proofpoint excels at providing administrators with tools for accelerated threat response and monitoring for email, social media, and mobile apps.
Fully integrated Email Continuity, Archiving, and Encryption are also available to protect business continuity and ensure compliance regulations are met.
Benefits of Proofpoint Enterprise Protect your organization with the most advanced cybersecurity platform on the market.
Advanced Threat Analysis
The Proofpoint filtering algorithms are highly accurate with an extremely low rate of false positives. Targeted Attack Protection evaluates URLs and attachments for threats that could be missed by more traditional signature or reputation-based analysis.
Users are protected no matter where or from which device they access email. Your customized policies are applied to all inbound and outbound emails, making it easy to manage messaging across multiple servers and locations.
Accelerated Response Time
Real-time notifications provide details of attacks or suspicious behavior, including specific users that may be affected. Advanced message-tracing features make it easy to pinpoint log data based on dozens of search criteria.
Custom policies can be created to further fine-tune message management, including re-routing email delivery based on specified criteria. Quarantined messages can be segmented into different folders with varying permissions depending on the type of threat. In addition, Smart Send and other user features enable employees to resolve errors on their own, thereby freeing up IT resources.
Reduce Risk and Liability
Email Continuity provides secondary email service for both on-premise and cloud services with automatic failover and restoration. This add-on allows network administrators to focus on restoring the primary email service while employees can continue to send and receive emails from any device or location via the web portal or Outlook integration.
Proofpoint outbound filtering helps prevent data loss and safeguards critical information from email compromise or compliance violations. Choose from dozens of pre-configured policies or create your own to automatically detect, block, or re-route potentially compromising messages. Policy-based encryption and disclaimers can be applied to outbound messages.
Add Proofpoint Archiving to have a fully searchable history of organization-wide email communications. Archiving is essential for compliance with many regulatory policies and simplifies data access for audits and litigation. Data is encrypted from site to site with DoubleBlind key architecture, no onsite hardware is needed, and storage space is unlimited.
Privacy and Reliability
Most SaaS email security solutions are hosted in a public cloud. However, Proofpoint Enterprise is deployed within a private cloud configuration used only by your network. Data centers within your company's geographical region are utilized to minimize latency.
Proofpoint is compatible with most email services, including Exchange, Lotus Domino, Zimbra, Office 365, G Suite (Google Apps), and more. There is no need to purchase new equipment or alter your existing network infrastructure.
- All incoming emails pass through the Proofpoint Email Protection Firewall. Suspicious connections are terminated.
- Messages are analyzed based on settings within the Spam Detection and Virus Protection modules. Custom policies and rules are also applied.
- Suspicious messages are sent to the spam quarantine with varying access and release permissions depending on the degree of the threat.
- Administrators can log into the web-based portal to adjust settings and review email traffic.
- Messages sent internally (between employees on the same mail server) do not pass through the Proofpoint system.
- If outbound filtering is enabled, emails sent to outside recipients will pass through the Email Protection portal and all outbound rules will be applied.
- If archving is included with your Proofpoint service, all inbound and outbound messages will be copied to the cloud-based storage system. Users can search emails directly from Outlook/OWA based on subject, sender, date, content, and more.
Proofpoint Enterprise Email Protection Filters
Proofpoint is unmatched in its granular filtering at every level of detection, including sender reputation, firewall policies, spam detection, virus protection, and email routing.
Use firewall rules to customize allowed/blocked connections and sender reputation checks. Determine how to handle messages with executable attachments, corrupted archives, etc. Implement filters for spoofing protection, offensive language, foreign languages, and more. Certain types of messages can be exempted from rules.
The Proofpoint Spam Detection module allows for customization of pre-established rules based on spam score for different categories of spam, including malware, phishing, adult, and bulk email.
An administrator can also set organization-wide safe and blocked lists for senders and recipients. Entries can be added based on email address, domain name, hostname, or IP address.
Control Virus Protection processing according to policy routes. A separate zero-hour protection module can also be enabled. Within each of these modules, customizations can be made according to the degree of threat and message disposition.
Proofpoint includes customizable email routing and message editing capabilities. Messages can be copied, rerouted, or sent to additional recipients. In addition, you can modify the message header, subject, add annotations, send an automatic reply, or delete attachments. These message modifications can be varied to match the originial language used in the email.
Proofpoint Enterprise Features
MX Record Protection
The Proofpoint Enterprise records will replace your existing MX records. This DNS configuration ensures that all messages pass through the email security system. In addition, it makes it more difficult for spammers to directly target your company mail server and offers protection against denial of service (DoS) and directory harvest attacks (DHA).
All inbound and outbound messages are scanned for viruses, malware, and suspicious content or behavior, including phishing attempts. The Proofpoint SLA guarantees 100% protection against viruses along with 99% of spam blocked on inbound messages, and no more than 1 false positive for every 350,000 emails.
Proofpoint uses deep content analysis, signature-based virus and malware scanning, and granular filtering controls to safeguard your network from emerging email threats.
Set rules for inbound emails based on multiple conditions along with specified routes and actions.
An administrator can manage Reputation Service settings or add senders/recipients to the organization-wide safe-block lists based on email address, domain, hostname, or IP.
Spam and Virus Policies
Spam and virus settings can be modified at a granular level for different types of emails, such as malware, phishing, adult spam, bulk, etc. Custom policies can also be created.
Customizable Email Quarantine
Different types of suspect emails are diverted to corresponding folders in the message quarantine. Permissions, retention, and actions can be varied depending on the folder content.
Compliance and DLP
Proofpoint includes multiple options to aid in compliance with HIPAA and other legal standards. These features include disclaimers, policy-based email encryption, groups, and message routing.
Data Discover Add-on
Install this tool on data storage systems to identify sensitive data and apply policies to data in transfer or at rest.
Mobile Defense Add-on
Monitor Android and iOS devices for risky app behavior or permissions. Create automated workflows to notify users and admins, block access to compromised devices, and restore access when the appropriate action has been taken.
Social Media Protection Add-on
Monitor your presence across all major social media platforms to indentify unauthorized accounts, enforce compliance and conduct standards, delete posts/comments with phishing or malware, provide authorized users with a single sign-on, and more. All features are managed from an easy-to-access dashboard.
Proofpoint Enterprise is deployed in a private cloud configuration across at least two locations. The uptime SLA is 99.999%.
Regional Data Centers
Your emails will be processed through facilities in the same region as your primary business location. This configuration helps minimize latency for faster processing speeds.
Mulitple delivery routes can be configured in Proofpoint to allow for failover. In the event that all delivery routes are unavailable, Proofpoint will hold incoming messages for up to four days. All held messages will be delivered when the destination server becomes available.
Email Continuity Add-on
Access is available via the web portal or Outlook integration. A 30-day archive of email history is available to users (Proofpoint Archive users will have access to their full email history).
Proofpoint Archiving encrypts all stored messages from site-to-site and at rest with DoubleBlind keys.
Fast Search Guarantee
Proofpoint's SLA includes a 20-second search guarantee even with a complex search of the full archive. The average search time is 6 to 7 seconds.
No Storage Limits
Archiving is priced on a per user basis without storage or retention restrictions. Data ingestion options mean you can import your company's full email history.
Enable email journaling on your mail server to have a copy of all outbound messages saved to the archive.
Audits and Reports
A full policy history is maintained and reports can be easily exported in industry-standard formats to streamline compliance.
Administrators and end-users can manage all Proofpoint services made available to them through a single web-based interface.
Configure Proofpoint to automatically add users and groups based on your LDAP organization. Alternately an administrator may import users via .csv file or manually create users and groups.
Proofpoint allows an administrator to manage user authentication profiles, application settings, access, and sessions. Administrator roles can be created to give some users special privileges.
Logs and Reports
Proofpoint includes many pre-configured report templates which can be customized by time period, route, and frequency.
Create multiple alert profiles for different recipients. Add customized rules including condition, action, and frequency.
Users can select their language of choice with 37 options available
Take the Next Step
Get started with Proofpoint Enterprise today or let us connect you with a consultant if you have questions.