Proofpoint Essentials makes the highest levels of email security protection, often reserved for the large enterprise, now available to SMEs with less than 5,000 users. If you want the reassurance of a top level security service, powered with the technology that is concurrently protecting some of the world’s largest and most security-conscious organisations, but which is tailored specifically for the smaller enterprise – Proofpoint Essentials is the ultimate solution. Getting started is really easy. For volume discounts, please submit a Custom Quote form.
Employ advanced threat protection technology that filters inbound and outbound email for spam, viruses, malware, phishing attacks, and more. Be confident that Proofpoint will provide the same high level protection for small and medium-sized enterprises as our large global enterprise customers have—with our patented MLX™ machine learning technology ensuring business email is protected every second of every day.
Removes all malicious and inappropriate email that could negatively impact an organization, before it reaches inboxes. Our interface logs all emails—Inbound and Outbound—which pass through a company’s system, enabling complete message traceability for users. Disclaimers can also be attached to all filtered email in line with each business’ own compliance guidelines. Outbound mail is scanned for any viruses, malware or other malicious content. As a result, a company can provide protection to the intended recipients while protecting the professional reputation of its organization.
Email threat protection automatic protection from various email threats
Guard against specific spam and security threats, including malicious spam and longline phishing attacks designed to deliver high volumes of dangerous email into organizations
Proofpoint MLX™ Technology: comprehensive spam detection
Get the enterprise-level protection needed for a small- or medium-sized enterprise with our email filtering feature, powered by our patented Proofpoint MLX™ technology, which uses advanced machine learning techniques to provide comprehensive spam detection. MLX™ continuously analyzes millions of messages and automatically adjusts its detection algorithms to identify even the newest, most cunning types of attacks. The result is a high rate of effectiveness and a very low rate of false positives. Download the MLX™ Technology Guide for more details.
Data Loss Prevention (DLP)
Proofpoint Data Loss Prevention software-as-a-service solution effectively manages both structured and unstructured data management with ease. Basic enterprise data management security policies can be handled as well advanced deep content analysis based on structured data such as protected health information (PHI) or primary account numbers (PAN) and unstructured data such as confidential documents. Structured and unstructured data management policies can be set based on the enterprise data being detected, then addressed accordingly.
Intelligent Content Filtering: an advanced email content filter with flexible rules engine
Address issues regarding confidential, malicious or inappropriate email content that is being sent or received. Establish a variety of filters, depending on a company’s needs—and block emails based on the size of the email, the type of attachment, the sender or recipient, the country of origin or destination, and the content within the subject line, body or header. This content filtering feature is completely configurable to each company’s needs and harnesses a range of proprietary technologies that determine whether or not each individual email may be allowed in or out of the organization. Also customize rules for a number of different situations. The Rules Engine allows emails to be filtered based on a series of select variables, such as message size, country of origin, and destination. The rules can be directed either to the user only, or a group of users chosen by the company administrator or even the entire organization. Users are also able to edit and order rules to their own preferences. Download Content Filtering Guide for more information.
Proofpoint Essentials leverages advanced technology to provide smaller enterprises with a comprehensive URL Defense service inclusive of predictive sandboxing, advanced malware detection and real-time dynamic analysis features. Targeted email attacks containing malicious links represent one of the most dangerous IT threats facing enterprises today. The Proofpoint Essentials solution is leveraging Proofpoint’s Targeted Attack Protection™ solution to power our new URL Defense Features. Proofpoint Targeted Attack Protection™ is the industry’s first comprehensive email analysis solution for combatting targeted threats by monitoring suspicious messages containing malicious URLs. Download the URL Defense guide to learn more.
URL Defense uses Big Data techniques and machine learning heuristics to predictively determine what ‘could likely’ be malicious, and take pre-emptive steps before any user clicks on it. Download Targeted Attack Explained
It is achieved by:
- Modeling every user’s email patterns and building behavioral history of that specific user to determine which email is suspicious and anomalous.
- Building Cloud based statistical model using history, Alexa ranking, IP block reputation, velocity of email sent from an originating IP, and a set of other criteria.
- Predicting malicious URLs, and proactively sandboxing with the help of real time scoring against this statistical model
Advanced Malware Detection
URL Defense uses sophisticated techniques to evaluate advanced threats that are traditionally missed by signature-based and reputation-based solutions. These techniques include:
- Malicious List Check - Check for emerging campaigns and known new malicious websites
- Code Analysis Check – Check for suspicious behavior, obfuscated scripts, malicious code snippets, and redirects to other malicious sites
- Dynamic Analysis – Sandbox a destination or sandbox a suspicious attachment to simulate a real user to a machine to observe changes made to a system
Real-time Dynamic Analysis
URL Defense enables the solution to provide protection on any device, at any time, from any location, by following the email and checking for the URL destination’s safety in real-time. A frequent technique used by hackers has been to drive recipients to click on a link directing them to a website which is initially harmless but turns malicious after a period of time. With this feature, users are still protected: whether they access the message from the corporate network, home network, mobile device, or a public network.
- Protects users and organizations on and off the corporate VPN across all devices including Mobile, Tablet and Laptops.
- Architected to help comply with existing corporate security controls and acceptable use policies by redirecting the user’s browser to safe destinations rather than acting like a proxy service.
Ensure that vital email communications are up and running like normal at all times—even when there is partial network failure.
Emergency Inbox: automatic access to email if unexpected downtime occurs
Make sure your business email is fully operational at all times, even if your server fails or unexpected downtime hits. Many email continuity systems only activate after a disaster, but our emergency inbox is activated the very moment a problem occurs. The result: your company won’t miss a single email. With our easy-to-use webmail client, gain full access to read, forward, compose, and reply to email, as well as to open attachments— with all email scanned as usual for any content rules that were previously set. Such functionality means the outside world will have no idea when you’re experiencing technical difficulties, and your organization will experience business as usual. Download the Emergency Inbox PDF to learn more.
Instant Replay: access wrongly deleted emails
Retrieve successfully delivered emails received in the last 30 days that may have been mistakenly deleted or accidentally removed from servers. With a simple click of a button, every end user has the ability to resend any of these deleted emails in its original format. For partners and IT support administrators, this handy feature offers a much more effective and simpler alternative to performing time-consuming backup restores. Additionally, using our Instant Replay, avoid the problems that often accompany a complete restore, such as frequent gaps in the data and an unstable database.
Email Spooling and Failover: instant automatic activation and continuous protection
Be safeguarded by our continuous SMTP Deferral, Failover & Queue protection—and get instant and automatic email spooling and failover activation, and preserve email metadata during an outage, without requiring any administration intervention. Allow administrators access to control automatic failover order and status, and enable a quick, automatic reset to the primary site. Automatically detect and monitor destination server availability, and make the correct decision when to invoke failover configurations. With quick restoration of SMTP traffic to the primary site once recovery is detected, reduce system complexity and administrative headaches, and maintain a comprehensive, extremely low-maintenance answer to backup MX management needs.
Be secure using our 10-year cloud archive—where you can manage your data, prevent leakage, have easy access for discovery, achieve regulatory compliance, remove storage limitations, and reduce on-going costs. The archive can dramatically reduce the internal growth of pst files, with data stored separately from other users and secured with a unique encryption key.
Tamper-Proof and Offsite: create an unchangeable, encrypted format
Store data offsite in an encrypted format that does not allow for any changes to be made to the original—with individual and controlled global access, depending on a company’s needs and policies.
Have Control and Separate user archive with individual access
Be in charge of who has access to archived email. Let Administrators control who has the authority to search archived email. Keep track of who has been searching or attempting to access a company’s email archives. Also get a dedicated data store, and archive all email separately from other users, using a uniquely encrypted format. Each authorized user receives individual access to their own email, and entire company access can be granted to nominated search administrators.
eDiscovery: easily retrieve a specific email or attachment
Access data from our email archive that comes with advanced search capabilities for fast and easy retrieval of a specific email or attachment. This is particularly useful in civil and criminal litigation, as emails are often considered a particularly valuable source of evidence.
Complete Traceability and Retention Policy per company:
Use full journaling to archive email and capture every single message delivered outbound, inbound and internally. Avoid unsecured gaps in a company’s email data, and achieve full transparency.Also set specific retention policies, with the option to exclude certain messages for important purposes such as legal hold. And enforce these customized legal policies to ensure data isn’t lost or manipulated.