URL Defense protects against the latest URL-based email threats, including malware and credential phishing. It offers predictive analysis that runs continuously in the background to identify and sandbox suspicious URLs.
It also performs real-time sandboxing during every URL click and it transparently rewrites all URLs that reach inboxes. This protects users on any device on the network.
Automatic email encryption mitigates the impact of lost data or customer information, which can result in fines, negative publicity and loss of brand reputation.
Accessing, understanding, and replying to encrypted messages is easy with clear message threading and one-time encrypted links. Messages include customizable branding and don’t require external users to login or create an account to respond.
Our policy-driven DLP filter help customers stay compliant. Its built-in term dictionaries and smart identifiers help reduce risk when
employees make security and disclosure policy decisions.
It also secures outgoing sensitive information. This can include PII, PHI, financial information and GDPR terms.
Our emergency inbox keeps your email up and running when a disaster strikes. This feature keeps emails spooled in a backup server until message service is restored. It also includes instant replay of lost or deleted emails over the last 30 days.
Email Warning Tags reduce risk of potential compromise by enabling users to make more informed decisions about emails that fall into the gray area between clean and malicious. They provide short descriptions of potential threats and convey the level of risk associated with them. The tags are customizable and mobile responsive. And they allow users to block a sender directly through the tag, even on mobile.
Our Security Awareness is available as a standalone offering and includes everything a small business
needs to educate users and train them to be a strong last line of defense. It includes:
Phishing simulations help gauge a company’s risk of phishing attacks. We provide thousands of phishing templates, pulled from real-world Proofpoint threat
intelligence, across 13 threat categories. Users who fail simulations can be automatically enrolled in additional training.
Both low-level and high-level visibility into
employee interactions with training content and phishing simulations are available in easy-to-read, modern reports. We offer more than just completion data to help organizations track real-time progress.
Our content library is constantly
updated, with training covering a broad range of risks. We include interactive and game-based training modules in more than 40 languages. Modules are available on demand, are mobile-friendly, and can be tailored to specific compliance requirements.
By the numbers
Attacks increasingly target people, not infrastructure.
45%
129
2 out of 3
90%
$26.6B+