{"id":230467,"date":"2020-03-17T04:11:39","date_gmt":"2020-03-17T04:11:39","guid":{"rendered":"https:\/\/www.prominic.net\/?page_id=230467"},"modified":"2022-11-09T16:46:54","modified_gmt":"2022-11-09T16:46:54","slug":"proofpoint-essentials","status":"publish","type":"page","link":"https:\/\/wordpress.prominic.net\/proofpoint-essentials\/","title":{"rendered":"Proofpoint Essentials"},"content":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_direction=”163deg” background_color_gradient_stops=”#ffffff 62%|rgba(0,0,0,0.02) 66%” background_color_gradient_start=”#ffffff” background_color_gradient_start_position=”62%” background_color_gradient_end=”rgba(0,0,0,0.02)” background_color_gradient_end_position=”66%” background_image=”https:\/\/www.prominic.net\/wp-content\/uploads\/2019\/11\/web-dev-03.png” parallax=”on” global_colors_info=”{}”][et_pb_fullwidth_header title=”Protect Your Business Against Security Threats and Online Fraud with Proofpoint Essentials Email Security” subhead=”Enterprise-grade spam and phishing detection, multilayer anti-virus, and a robust filter rules engine tailored to the needs of smaller organizations.” button_one_text=”Get Started” button_one_url=”https:\/\/www.prominic.net\/prominic-sales\/” header_image_url=”https:\/\/www.prominic.net\/wp-content\/uploads\/2020\/01\/Anti-Virus-copy.png” content_max_width=”640px” _builder_version=”4.16″ title_level=”h3″ title_font=”Lato|900|||||||” title_font_size=”40px” title_line_height=”1.5em” content_font=”||||||||” content_line_height=”2em” subhead_font=”|700|||||||” subhead_text_color=”#000000″ subhead_font_size=”14px” subhead_letter_spacing=”1px” subhead_line_height=”2em” background_enable_color=”off” custom_button_one=”on” button_one_text_size=”14px” button_one_text_color=”#ffffff” button_one_bg_color=”#811937″ button_one_border_width=”14px” button_one_border_color=”rgba(0,0,0,0)” button_one_border_radius=”0px” button_one_letter_spacing=”2px” button_one_font=”|600||on|||||” button_one_icon=”9||divi||400″ button_one_on_hover=”off” custom_button_two=”on” button_two_text_size=”14px” button_two_text_color=”#811937″ button_two_bg_color=”rgba(255,255,255,0)” button_two_border_width=”12px” button_two_border_color=”rgba(0,0,0,0)” button_two_border_radius=”0px” button_two_letter_spacing=”2px” button_two_font=”|600||on|||||” button_two_icon=”9||divi||400″ button_two_on_hover=”off” background_layout=”light” custom_margin=”0px||-4px||false|false” custom_padding=”5vw|||||” title_font_size_tablet=”” title_font_size_phone=”25px” title_font_size_last_edited=”on|desktop” box_shadow_style_button_two=”preset1″ box_shadow_vertical_button_two=”0px” box_shadow_blur_button_two=”0px” box_shadow_spread_button_two=”2px” box_shadow_color_button_two=”#811937″ button_one_letter_spacing_hover=”2px” button_two_letter_spacing_hover=”2px” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”2px” button_two_letter_spacing__hover_enabled=”on” button_two_letter_spacing__hover=”2px” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|off” admin_label=”Hero” _builder_version=”4.16″ background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_direction=”135deg” background_color_gradient_stops=”#53a0fd 0%|#4161d4 100%” background_color_gradient_start=”#53a0fd” background_color_gradient_end=”#4161d4″ background_image=”https:\/\/www.prominic.net\/wp-content\/uploads\/2019\/12\/geometric-bg-overlay-01.jpg” background_blend=”overlay” custom_padding=”|0px|81px|0px|false|false” animation_direction=”bottom” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ custom_margin=”24px|auto||auto||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”Nunito Sans||||||||” text_text_color=”#ffffff” text_font_size=”18px” text_line_height=”1.8em” header_font=”Nunito Sans|700|||||||” header_font_size=”45px” header_line_height=”1.3em” header_2_font=”||||||||” text_orientation=”center” background_layout=”dark” max_width=”700px” module_alignment=”center” global_colors_info=”{}”]<\/p>\n

<\/h1>\n

Proofpoint Essentials protects organizations from today\u2019s advanced threats, compliance risks and digital fraud. It offers enterprise-grade security technology and infrastructure\u2014used to protect some of the largest organizations in the world\u2014tailored to the needs of smaller enterprises.<\/span><\/p>\n

<\/span><\/p>\n

Enhance your security with spam and phishing detection, multilayer anti-virus, a robust filter rules engine. S<\/span>tay compliant with policy-enforced encryption and a cloud-based email archive managed in a simple, intuitive user interface, and keep your business running with email continuity and Proofpoint’s Emergency Inbox.<\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ background_color=”#f5f6f9″ custom_margin=”-1px|||||” custom_padding=”14px||4px|||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ custom_margin=”-4px|auto||auto||” custom_padding=”31px|||||” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”||||||||” header_text_color=”#811937″ header_2_font=”|600||on|||||” header_2_text_color=”#811937″ header_2_font_size=”21px” header_2_letter_spacing=”3px” header_2_line_height=”1.8em” header_3_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center” animation_direction=”right” locked=”off” global_colors_info=”{}”]<\/p>\n

Proofpoint Security Features<\/strong><\/h2>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ custom_padding=”||2px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_accordion open_toggle_text_color=”#811937″ open_toggle_background_color=”rgba(0,0,0,0)” closed_toggle_text_color=”#811937″ closed_toggle_background_color=”rgba(0,0,0,0)” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”19px” module_id=”antivirus” _builder_version=”4.16″ toggle_text_color=”#811937″ toggle_font=”Lato|700||on|||||” toggle_letter_spacing=”2px” background_color=”rgba(0,0,0,0)” global_colors_info=”{}”][et_pb_accordion_item title=”Antivirus” open=”on” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}”]<\/p>\n

No security vendor stops viruses and other email-borne threats better than Proofpoint. <\/span><\/p>\n

Its sophisticated anti- virus engines are highly accurate, effective and fast. <\/span><\/p>\n

Because it runs in the cloud, it updates itself in real time and doesn’t require additional software or hardware installation. <\/span><\/p>\n

It blocks all known viruses and protects users from phishing, spoofing and spear phishing attacks, as well as prevents following links to malware bearing sites. <\/span><\/p>\n

Its heuristic scanning discovers and protects against never-before-seen viruses for added security.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Reporting” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Flexible online reporting dashboards and detailed email reporting is available with one click to give you actionable insights and more control. <\/span><\/p>\n

It\u00a0enables you to quickly and easily access relevant customer information and monitor results, as well as helps monitor customer usage and detect potential rogue users.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Content Filtering” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Proofpoint Essentials intelligent email Content Filter service enables organizations to use a flexible rules engine to enforce <\/span>email communication policies.\u00a0<\/span><\/p>\n

Policy-based approach designed to detect confidential or inappropriate text-based email content.\u00a0<\/span><\/p>\n

Scanning within email header, subject and body and detection of a large variety of attachments e<\/span>nsures employees do not jeopardize the security and reputation of the business.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”URL Defense” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Leveraging the advanced power of Proofpoint Targeted Attack Protection, the industry\u2019s most effective defense against advanced threats, stops and blocks malicious URLs. <\/span><\/p>\n

It uses predictive analysis to proactively identify threats and catches malicious URLs before users click and get Infected.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”EMAIL DATA LOSS PREVENTION (DLP)” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Block data loss and comply with regulations. <\/span><\/p>\n

DLP filters and DLP dictionaries and smart identifiers provide automatically undateable\u00a0policies for lowest administrative cost and highest accuracy.
<\/span><\/p>\n

Users simply send email, and the appropriate action is taken automatically. <\/span><\/p>\n

Always know where your private or proprietary data resides, including intellectual property, personal identification, patient information, financial information, and more.\u00a0<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”SOCIAL MEDIA ACCOUNT PROTECTION” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Advanced protection for your social media accounts.\u00a0<\/span><\/p>\n

ProfileLock continuously monitors for unusual posting patterns and unauthorized profile changes that signal that someone has taken over an account.\u00a0<\/span><\/p>\n

Social Media Account Protection automates the content and security moderation process and ensures\u00a0that customers and followers are not subjected to malicious or inappropriate content posted to your social sites.<\/span><\/p>\n

[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_accordion open_toggle_text_color=”#811937″ open_toggle_background_color=”rgba(0,0,0,0)” closed_toggle_text_color=”#811937″ closed_toggle_background_color=”rgba(0,0,0,0)” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”19px” module_id=”spamfiltering” _builder_version=”4.16″ toggle_text_color=”#811937″ toggle_font=”Lato|700||on|||||” toggle_letter_spacing=”2px” background_color=”rgba(0,0,0,0)” global_colors_info=”{}”][et_pb_accordion_item title=”Spam Filtering” open=”on” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}”]<\/p>\n

Powered by patented Proofpoint MLX machine-learning technology, Proofpoint’s spam and phishing technology efficiently analyzes hundreds of attributes in every email. <\/span><\/p>\n

This advanced scanning accurately filters emails by examining envelope headers and structure, content, email sender reputation, images and more, to prevent spam emails, malware, other malicious email and attachment-based spam from reaching inboxes.<\/span><\/p>\n

It saves time and resources otherwise wasted on unwanted mail and reporting.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Outbound Filtering” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Outbound filtering ensures all email sent through the Essentials platform is free from viruses, malware and other <\/span>malicious content. <\/span><\/p>\n

It protects against sent emails that could damage your customers\u2019 reputation or the security of email recipients. <\/span><\/p>\n

You can also\u00a0<\/span>view whether an email has been delivered, bounced, delayed or rejected.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Zero-Hour Outbreak” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

This feature instantly protects users against new, never-before-seen email threats as soon as they arise, so your inbox is always secure.<\/span><\/p>\n

It defends against new outbreaks before AV vendor updates with zero administration intervention required.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Attachment Defense” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Leveraging the advanced power of Targeted Attack Protection, the industry\u2019s most effective defense against advanced threats, Attachment Defense helps detect malicious attachments.\u00a0<\/span><\/p>\n

Intelligence gathered by the dynamic malware analysis is used to identify and block malicious attachments that are designed to evade traditional security solutions. <\/span><\/p>\n

It analyzes billions of messages on the cloud every day, providing global visibility and early protection for emerging threats.<\/span><\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Email Encryption” icon_color=”#811937″ use_icon_font_size=”on” icon_font_size=”21px” _builder_version=”4.16″ global_colors_info=”{}” open=”off”]<\/p>\n

Reduce the potential negative impacts of data loss by automatically encrypting email.\u00a0<\/span><\/p>\n

Create filters that automatically identify outbound emails that should be encrypted.\u00a0<\/span><\/p>\n

When sensitive data is identified, the email is automatically <\/span>encrypted. Security is maximized, without hindering end users.<\/span><\/p>\n

[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ custom_padding=”1px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ custom_padding=”44px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”Nunito Sans||||||||” text_font_size=”18px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Nunito Sans|700|||||||” header_2_font_size=”45px” header_2_line_height=”1.3em” text_orientation=”center” background_layout=”dark” max_width=”700px” module_alignment=”center” text_line_height_tablet=”1.7em” text_line_height_last_edited=”off|desktop” global_colors_info=”{}”]<\/p>\n

Continuity Features<\/span><\/h2>\n
\n
\n
\n

<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.16″ custom_padding=”1px|||||” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ custom_margin=”|-29px||||” custom_padding=”|4px||||” global_colors_info=”{}”]<\/p>\n

\"\"