PROOFPOINT
Email Security
Email Security
Email Security & Protection
More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.
Industry-Leading SLAs
When deployed in the cloud:
- 99.999% service availability
- 99% blocked or redirected spam
- 100% virus protection
- Less than 1 minute email latency
Proofpoint Email Protection Features
- Dynamic classification and control of email across spam, phishing, impostor, bulk, adult and malware
- Multi-layered threat protection
- Flexible policy creation
- Detailed reporting
- Scalable to support even the largest organizations
Proofpoint Email Protection Benefits
- Protection against attacks that don’t involve malware, such as impostor email
- Accurate, granular spam and unwanted mail prevention
- Business continuity when email servers are offline
- Reduced administration overhead with personalized user controls
- Quick and easy reports and searches
Secure your organization against Email Threats
Proofpoint Email Protection helps you secure and control inbound and outbound email through an easyto-use cloud-based solution. With Email Protection, you can protect your people, data, and brand from today’s threats and common nuisances such as: Impostor email, Phishing, Malware, Spam, Bulk mail
NEXT GENERATION EMAIL SECURITY
Email Protection provides the tools you need to keep your people safe from email threats. We enhance your ability to protect against fast-emerging threats such as impostor email and phishing. We also help block better understood threats such as spam, bulk email, and viruses. Email Protection meets the needs of even the most complex enterprise deployments; we support cloud, hybrid and on-premises installations with virtual or physical appliances.
THREAT PREVENTION
Effective threat protection starts with accurate detection. Email Protection uses multiple layers of technology to accurately detect threats, including malicious content and malware.
Multilayered Content Analysis
Email Protection uses several techniques to protect against both known and emerging threats. Signature-based detection prevents known threats while dynamic reputation analysis continually assesses local and global IP addresses to determine whether to accept, reject or throttle email connections. Together, these features help protect you at the first signs of malicious activity.
Protection from malware-free threats
Email Protection detects threats that don’t involve malware, such as credential phishing and impostor email. It assesses the reputation of the sender by analyzing hundreds of thousands of email attributes, including the sender/recipient relationship, headers, and content. Impostor email—also known as business email compromise or CEO fraud—is a fast-growing threat that can cause huge losses.
CONTROL
Accurate Email Classification and Quarantine
Protect against email threats and other unwanted messages in just about any language with multilingual analysis. Email classifiers divide incoming email into separate quarantines by type. This feature gives you granular control over a wide range of email, including: Spam, Phishing, Impostor email, Malware, Bulk email, Adult content.
Graymail Management
Reduce the amount of inbox clutter and give users personal control over bulk email. Big data analysis techniques accurately identify graymail and deliver it to a separate low-priority inbox. Users can then “promote” wanted email to their regular inbox or “demote” unwanted email to their quarantine.
Policy Creation
Email Protection supports the demands of the largest enterprises in the world. Our policy engine gives you complete flexibility with custom rules at the global, group and user level. With our deep content inspection, you can easily enforce your unique acceptable-use policies.
Email Continuity
If you’re moving to cloud-based inbox platforms such as Microsoft Office 365, service outages can be a concern.Email continuity lets you continue to send and receive email when mail servers are unavailable; this always-on capability that means important messages get through—and your business keeps running. When email service is restored, all sent and received emails can be synced back to the server.
VISIBILITY
Message Tracing
Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria.
Reporting
Get more than 60 real-time reports for detailed visibility into mail flow and trends. This data can help you proactively address issues and trends as they emerge.
End User Controls
Give your people self-service control over their email preferences such as:
- Quarantines
- Safe and block lists
- Bulk mail delivery
You can even allow users to opt in or out of various spam policies. All end-user services are easy to brand allowing providing familiarity for end-users who access these tools . And with support for numerous languages, you can deploy them globally.