Identify and protect sensitive data. Automate compliance.
Stop outbound data loss with dynamic, granular encryption policies applied automatically to secure email flowing between your users and external business partners.
Protect sensitive data and automate compliance with Proofpoint
Maintain strict control over your email communications
Through our email threat protection platform, we manage and enforce DLP and encryption policies, meticulously scanning and analyzing sensitive content in messages and attachments.
Manage and enforce DLP policies
Keep business communications flowing securely with a robust set of controls and no-touch key management that works with your Proofpoint email gateway. Its policy-based DLP engine lets you define and dynamically apply granular encryption policies at the global, group and user levels with integrations with LDAP and Active Directory.
Detect and analyze sensitive data
Accurately detect sensitive data within Microsoft 365, PDFs, images and other unstructured content. A centralized dashboard shows real-time statistics and trends to help you act quickly on noncompliant messages. Drill down into any incident and see a side-by-side view highlighting policy violations next to the original document or policy.
Integrate with Proofpoint Information Protection
Extend the power with Email DLP and Encryption with the rest of the Proofpoint Information Protection product family. Find, track and safeguard data as users work in email, cloud, applications and endpoints with common data detectors and consistent DLP policies across all the channels your data touches.
Adopt a multi-layered, holistic and people-centric strategy to prevent loss from ransomware
-
Hundreds of built-in data identifiers
Securities, privacy and personal data, and healthcareSecurities
- PCI
- SOX
- GLBA
- SEC
- Other country-specific codes
Privacy and personal data
- PII
- GDPR
- UK-DPA
- EU-DPD
- PIPEDA (Canada)
- UK National Insurance Number
- Japanese credit card numbers
Healthcare
- HIPAA
- ICD-9
- ICD-10
- ICD-11
- National Drug Code
- More code sets
-
Deep analysis and fingerprinting
Beyond Microsoft Office 365 and PDF files, more than 300 file types are scannable out of the box.Beyond Microsoft Office 365 and PDF files, more than 300 file types are scannable out of the box. New, custom and proprietary file types are also supported though our filetype profiler. You’ll have the opportunity to get full and partial matching, index document matching (IDM), exact data matching (EDM) and text extraction from images.
-
Real-time reporting
Because every second counts, a centralized dashboard gives you real-time statistics, trends and active data-loss incidents.Because every second counts, a centralized dashboard gives you real-time statistics, trends and active data-loss incidents. You can drill down into, comment on, track, search and act on any incident and export matching messages right away.
-
Streamlined and automated workflows
Routing policies like Smart Send make life easier for DLP analysts. Emails can be sent back to the sender to correct an DLP violations or routed elsewhere, such as to HR, IT or business owner.Routing policies like Smart Send make life easier for DLP analysts. Emails can be sent back to the sender to correct an DLP violations or routed elsewhere, such as to HR, IT or business owner. You can automate encryption by destination domain, sender or message attributes, such as attachment types.
-
Enhanced recipient experience
Reduce the temptation to work around DLP policies with a seamless user experience.Reduce the temptation to work around DLP policies with a seamless user experience. Flexible options include a web-based Secure Reader inbox and portal, Microsoft Outlook add-ins for one-click sending and reading and internal-to-internal encryption for sensitive employee-to-employee emails.
-
Managed services that shorten time to value
Let our highly skilled experts help you design, implement and comanage your DLP program.Let our highly skilled experts help you design, implement and comanage your DLP program. Optimize your technology investment, augment your staff and mature your organization’s data protection strategy.
Protect more than your people: Defend Data
View Product PackagesProduct Packages
Comprehensive protection against today's risks — tailored to your organization's needs.
Learn MoreGet Up to Speed
Explore the latest in cybersecurity news, insights, and innovations.
Resource LibraryTake an Assessment
Get a security audit and custom report of your corporate environment
GET AN ASSESSMENT