Products
Datalogix work with our clients to identify and customise best-of-breed solutions to maximise your organisation’s IT investment. Datalogix provide reliable and robust solutions from market-leading vendors. By putting smart solutions in place from tried and tested companies we ensure the best functionality and reliability is available to your business.
Threat Protection
Download the MLX Technology Guide | Download Content Filtering Datasheet
Employ advanced threat protection technology that filters inbound and outbound email for spam, viruses, malware, phishing attacks, and more. Be confident that Proofpoint will provide the same high level protection for small and medium-sized enterprises as our large global enterprise customers have—with our patented MLX™ machine learning technology ensuring business email is protected every second of every day.
Removes all malicious and inappropriate email that could negatively impact an organization, before it reaches inboxes. Our interface logs all emails—Inbound and Outbound—which pass through a company’s system, enabling complete message traceability for users. Disclaimers can also be attached to all filtered email in line with each business’ own compliance guidelines. Outbound mail is scanned for any viruses, malware or other malicious content. As a result, a company can provide protection to the intended recipients while protecting the professional reputation of its organization.
Email threat protection automatic protection from various email threats
Guard against specific spam and security threats, including malicious spam and longline phishing attacks designed to deliver high volumes of dangerous email into organizations
Proofpoint MLX™ Technology: comprehensive spam detection
Get the enterprise-level protection needed for a small- or medium-sized enterprise with our email filtering feature, powered by our patented Proofpoint MLX™ technology, which uses advanced machine learning techniques to provide comprehensive spam detection. MLX™ continuously analyzes millions of messages and automatically adjusts its detection algorithms to identify even the newest, most cunning types of attacks. The result is a high rate of effectiveness and a very low rate of false positives. Download the MLX™ Technology Guide for more details.
Data Loss Prevention (DLP)
Proofpoint Data Loss Prevention software-as-a-service solution effectively manages both structured and unstructured data management with ease. Basic enterprise data management security policies can be handled as well advanced deep content analysis based on structured data such as protected health information (PHI) or primary account numbers (PAN) and unstructured data such as confidential documents. Structured and unstructured data management policies can be set based on the enterprise data being detected, then addressed accordingly.
Intelligent Content Filtering: an advanced email content filter with flexible rules engine
Address issues regarding confidential, malicious or inappropriate email content that is being sent or received. Establish a variety of filters, depending on a company’s needs—and block emails based on the size of the email, the type of attachment, the sender or recipient, the country of origin or destination, and the content within the subject line, body or header. This content filtering feature is completely configurable to each company’s needs and harnesses a range of proprietary technologies that determine whether or not each individual email may be allowed in or out of the organization. Also customize rules for a number of different situations. The Rules Engine allows emails to be filtered based on a series of select variables, such as message size, country of origin, and destination. The rules can be directed either to the user only, or a group of users chosen by the company administrator or even the entire organization. Users are also able to edit and order rules to their own preferences. Download Content Filtering Guide for more information.
Advanced Threat Protection
Download the URL Defense Datasheet | Download the Attachment Defense Datasheet
Targeted email attacks containing malicious links and attachments represent one of the most dangerous IT threats facing enterprises today. Proofpoint Essentials leverages advanced technology to provide smaller enterprises with a comprehensive URL and Attachment Defense service inclusive of predictive sandboxing, advanced malware detection and real-time dynamic analysis features.
Social Media Account Protection
Download the Social Media Account Protection Datasheet
With the growing reliance on social media to reach customers and prospects it is becoming necessary to secure this communication channel like any other. Social Media Account Protection can enable small enterprises to protect their social media presence against hacking, spam and malicious content; automatically removing any in appropriate content as it is posted.
Email Encryption
Download the Email Encryption Datasheet
Email Encryption within Proofpoint Essentials enables small enterprises to enforce data security policy transparently to end users. All emails that contain defined sensitive data are automatically encrypted and the communication made secure. This can prevent the potential loss of confidential data and the negative effects that could create.
Continuity
Download the Emergency Inbox Datasheet
Ensure that vital email communications are up and running like normal at all times—even when there is partial network failure.
Emergency Inbox: automatic access to email if unexpected downtime occurs
Make sure your business email is fully operational at all times, even if your server fails or unexpected downtime hits. Many email continuity systems only activate after a disaster, but our emergency inbox is activated the very moment a problem occurs. The result: your company won’t miss a single email. With our easy-to-use webmail client, gain full access to read, forward, compose, and reply to email, as well as to open attachments— with all email scanned as usual for any content rules that were previously set. Such functionality means the outside world will have no idea when you’re experiencing technical difficulties, and your organization will experience business as usual. Download the Emergency Inbox PDF to learn more.
Instant Replay: access wrongly deleted emails
Retrieve successfully delivered emails received in the last 30 days that may have been mistakenly deleted or accidentally removed from servers. With a simple click of a button, every end user has the ability to resend any of these deleted emails in its original format. For partners and IT support administrators, this handy feature offers a much more effective and simpler alternative to performing time-consuming backup restores. Additionally, using our Instant Replay, avoid the problems that often accompany a complete restore, such as frequent gaps in the data and an unstable database.
Email Spooling and Failover: instant automatic activation and continuous protection
Be safeguarded by our continuous SMTP Deferral, Failover & Queue protection—and get instant and automatic email spooling and failover activation, and preserve email metadata during an outage, without requiring any administration intervention. Allow administrators access to control automatic failover order and status, and enable a quick, automatic reset to the primary site. Automatically detect and monitor destination server availability, and make the correct decision when to invoke failover configurations. With quick restoration of SMTP traffic to the primary site once recovery is detected, reduce system complexity and administrative headaches, and maintain a comprehensive, extremely low-maintenance answer to backup MX management needs.
Archiving
Download the Archiving Datasheet
Be secure using our 10-year cloud archive—where you can manage your data, prevent leakage, have easy access for discovery, achieve regulatory compliance, remove storage limitations, and reduce on-going costs. The archive can dramatically reduce the internal growth of pst files, with data stored separately from other users and secured with a unique encryption key.
Tamper-Proof and Offsite: create an unchangeable, encrypted format
Store data offsite in an encrypted format that does not allow for any changes to be made to the original—with individual and controlled global access, depending on a company’s needs and policies.
Have Control and Separate user archive with individual access
Be in charge of who has access to archived email. Let Administrators control who has the authority to search archived email. Keep track of who has been searching or attempting to access a company’s email archives. Also get a dedicated data store, and archive all email separately from other users, using a uniquely encrypted format. Each authorized user receives individual access to their own email, and entire company access can be granted to nominated search administrators.
eDiscovery: easily retrieve a specific email or attachment
Access data from our email archive that comes with advanced search capabilities for fast and easy retrieval of a specific email or attachment. This is particularly useful in civil and criminal litigation, as emails are often considered a particularly valuable source of evidence.
Complete Traceability and Retention Policy per company:
Use full journaling to archive email and capture every single message delivered outbound, inbound and internally. Avoid unsecured gaps in a company’s email data, and achieve full transparency.Also set specific retention policies, with the option to exclude certain messages for important purposes such as legal hold. And enforce these customized legal policies to ensure data isn’t lost or manipulated.
Power of Teamwork
Be part of our partner program and sell our exclusively built information security solution to small or medium-sized enterprises. Sold 100% through partners, Proofpoint Essentials™ is the exciting new channel offering that services the smaller enterprise, providing everything from purpose-built technology to dedicated support and bespoke resources. As a Proofpoint Essentials™ partner, benefit from this 100% channel-focused offering—with competitive, monthly pricing plans and packages to suit a variety of customer needs and budgets.
Hassle-free Revenue that Scales with You: choose the licensing model that suits your current commercial needs
Experience black and white profit margins from the get-go when you partner with Proofpoint Essentials™. There are no start-up fees, price hikes, support costs, or maintenance costs. We’ll keep in touch regularly so that as your business grows or your circumstances change you can be sure still to be on the most beneficial licensing model for you.
Utility Billing Options: get the payment flexibility you want
Pay for what is actually used with either monthly, annual or quarterly billing. We offer a monthly utility billing option among other commercial options, meeting the flexibility our partners demand. We also offer volume discounts across your total user estate, not simply per customer. The result: as your investment in Proofpoint Essentials™ grows, so does your margin.
100% Channel Focused: join a select group of partners profiting from Proofpoint Essentials™ – and know we’re always available to help
The Proofpoint Essentials™ solution is only available through the channel. We work closely with select Distributors, VARs and MSPs, from initial qualification and training to dedicated growth campaigns, up-sell opportunities and help in closing deals. As long as you’re a Proofpoint Essentials™ partner, we will be here for you whatever the issue to help make cloud email security work better for you and keep your profits on the rise.
Your brand, our technology: put your own brand on our market-leading cloud security technology
Quickly and easily co-brand the Proofpoint Essentials™ interface. Make your customers immediately feel at home: simply upload your company logo and edit the color scheme from the options provided. In addition, the Proofpoint Essentials™ marketing team will supply all the branded marketing and sales collateral you need to make reselling our solution to your customers even easier.
Support: get help selling the Proofpoint Essential email security solution
Be treated as an integral part of our business. We’re with you every step of the way—from training and supplying branded sales collateral to helping make it easier for you to sell the Proofpoint Essentials™ email security solution even easier, with assistance that includes:
- Free managed setup with detailed product demo and non-obligation trials.
- Fully Scalable licensing models for MSPs and Resellers.
- A partner entry-level program to suit all types of partners: big, small, new or experienced.
- 24x7x365 expert technical support, with live support during your 9:00-5:00 office hours.
- Protect your network and your staff from undesirable Web content
- Drive productivity by limiting time spent on recreational surfing
- Optimize network resources by reducing bandwidth congestion caused by non-business related browsing
- Comprehensive reporting
- Ensure confidentiality by masking your usage to sites that collect information
Web Filtering is more than just stopping staff from wasting time. It’s about making sure the organization isn’t put at risk by their behaviour.
Cisco Network Systems are the foundation for the services and applications you need to realize the potential of your business. Cisco switches, routers, and software together, create an inherently intelligent integrated network to adapt for your current and future business needs by:
- Providing secure, but unconstrained, connectivity between employees, customers and information
- Delivering quality, real-time applications, such as voice and video, on a converged network platform
- Ensuring access to information and resources from anywhere
- Automating a manageable and self-defending network
- Reducing your operating expenses
However, virtualizing a single physical computer is just the beginning. VMware offers a robust virtualization platform that can scale across hundreds of interconnected physical computers and storage devices to form an entire virtual infrastructure.
Virtualization for Business Needs
VMware software is used by enterprises large and small to increase the efficiency and cost-effectiveness of their IT operations. Find out how VMware software can helpconsolidate servers, optimize software development and provide affordable business continuity.
- Server Consolidation Bring unmanageable server sprawl under control by using virtualization to run multiple workloads on fewer servers and to reduce future needs for physical servers.
- Energy Efficiency Reduce energy costs by 80% and go green while improving the flexibility and reliability of your IT infrastructure.
- Business Continuity Reduce downtime by making high availability and disaster recovery solutions more cost-effective, simpler, and more reliable.
- Desktop Management & Control Improve management and control of enterprise desktops to lower cost, reduce risk, and improve flexibility of desktop infrastructure.
- Virtual Lab Automation Streamline development and test lab infrastructure and operations through Virtual Lab Automation.
- Virtualized Enterprise Applications Optimize the management and operation of your enterprise applications and databases with a VMware infrastructure. RunOracle, SAP, Microsoft and Exchange on a VMware platform.
- Small & Medium Business Get a scalable and cost-effective way to optimize the use of your current technology assets, increase the productivity of your IT staff and protect the data and IT environments that you run.
- Remote & Branch Offices Control and manage remote servers and desktops from a central location with VMware remote and branch office solutions.
- Government Increase efficiency and cost-effectiveness of IT operations within government agencies and military installations.
- Hosting Providers Go beyond the limitations of traditional hosting and provide your customers on-demand access to IT resources with VMware hosting solutions.

Our next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.
Features and management are consistent across the portfolio. Integration with GlobalProtect™ mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire™ cloud-based malware analysis environment integration supports a rapid “feedback loop” that enables the firewall to stop advanced threats throughout the attack lifecycle.