Threat Protection

Download the MLX Technology Guide
Download Content Filtering Datasheet

Employ advanced threat protection technology that filters inbound and outbound email for spam, viruses, malware, phishing attacks, and more. Be confident that Proofpoint will provide the same high level protection for small and medium-sized enterprises as our large global enterprise customers have—with our patented MLX™ machine learning technology ensuring business email is protected every second of every day.

Removes all malicious and inappropriate email that could negatively impact an organization, before it reaches inboxes. Our interface logs all emails—Inbound and Outbound—which pass through a company’s system, enabling complete message traceability for users. Disclaimers can also be attached to all filtered email in line with each business’ own compliance guidelines. Outbound mail is scanned for any viruses, malware or other malicious content. As a result, a company can provide protection to the intended recipients while protecting the professional reputation of its organization.

Email threat protection automatic protection from various email threats
Guard against specific spam and security threats, including malicious spam and longline phishing attacks designed to deliver high volumes of dangerous email into organizations

Proofpoint MLX™ Technology: comprehensive spam detection
Get the enterprise-level protection needed for a small- or medium-sized enterprise with our email filtering feature, powered by our patented Proofpoint MLX™ technology, which uses advanced machine learning techniques to provide comprehensive spam detection. MLX™ continuously analyzes millions of messages and automatically adjusts its detection algorithms to identify even the newest, most cunning types of attacks. The result is a high rate of effectiveness and a very low rate of false positives. Download the MLX™ Technology Guide for more details.

Data Loss Prevention (DLP)
Proofpoint Data Loss Prevention software-as-a-service solution effectively manages both structured and unstructured data management with ease. Basic enterprise data management security policies can be handled as well advanced deep content analysis based on structured data such as protected health information (PHI) or primary account numbers (PAN) and unstructured data such as confidential documents. Structured and unstructured data management policies can be set based on the enterprise data being detected, then addressed accordingly.

Intelligent Content Filtering: an advanced email content filter with flexible rules engine
Address issues regarding confidential, malicious or inappropriate email content that is being sent or received. Establish a variety of filters, depending on a company’s needs—and block emails based on the size of the email, the type of attachment, the sender or recipient, the country of origin or destination, and the content within the subject line, body or header. This content filtering feature is completely configurable to each company’s needs and harnesses a range of proprietary technologies that determine whether or not each individual email may be allowed in or out of the organization. Also customize rules for a number of different situations. The Rules Engine allows emails to be filtered based on a series of select variables, such as message size, country of origin, and destination. The rules can be directed either to the user only, or a group of users chosen by the company administrator or even the entire organization. Users are also able to edit and order rules to their own preferences. Download Content Filtering Guide for more information.

Advanced Threat Protection

Download the URL Defense Datasheet
Download the Attachment Defense Datasheet

Targeted email attacks containing malicious links and attachments represent one of the most dangerous IT threats facing enterprises today. Proofpoint Essentials leverages advanced technology to provide smaller enterprises with a comprehensive URL and Attachment Defense service inclusive of predictive sandboxing, advanced malware detection and real-time dynamic analysis features.

Social Media Account Protection

Download the Social Media Account Protection Datasheet

With the growing reliance on social media to reach customers and prospects it is becoming necessary to secure this communication channel like any other. Social Media Account Protection can enable small enterprises to protect their social media presence against hacking, spam and malicious content; automatically removing any in appropriate content as it is posted.

Email Encryption

Download the Email Encryption Datasheet

Email Encryption within Proofpoint Essentials enables small enterprises to enforce data security policy transparently to end users. All emails that contain defined sensitive data are automatically encrypted and the communication made secure. This can prevent the potential loss of confidential data and the negative effects that could create.


Download the Emergency Inbox Datasheet

Ensure that vital email communications are up and running like normal at all times—even when there is partial network failure.

Emergency Inbox: automatic access to email if unexpected downtime occurs
Make sure your business email is fully operational at all times, even if your server fails or unexpected downtime hits. Many email continuity systems only activate after a disaster, but our emergency inbox is activated the very moment a problem occurs. The result: your company won’t miss a single email. With our easy-to-use webmail client, gain full access to read, forward, compose, and reply to email, as well as to open attachments— with all email scanned as usual for any content rules that were previously set. Such functionality means the outside world will have no idea when you’re experiencing technical difficulties, and your organization will experience business as usual. Download the Emergency Inbox PDF to learn more.

Instant Replay: access wrongly deleted emails
Retrieve successfully delivered emails received in the last 30 days that may have been mistakenly deleted or accidentally removed from servers. With a simple click of a button, every end user has the ability to resend any of these deleted emails in its original format. For partners and IT support administrators, this handy feature offers a much more effective and simpler alternative to performing time-consuming backup restores. Additionally, using our Instant Replay, avoid the problems that often accompany a complete restore, such as frequent gaps in the data and an unstable database.

Email Spooling and Failover: instant automatic activation and continuous protection
Be safeguarded by our continuous SMTP Deferral, Failover & Queue protection—and get instant and automatic email spooling and failover activation, and preserve email metadata during an outage, without requiring any administration intervention. Allow administrators access to control automatic failover order and status, and enable a quick, automatic reset to the primary site. Automatically detect and monitor destination server availability, and make the correct decision when to invoke failover configurations. With quick restoration of SMTP traffic to the primary site once recovery is detected, reduce system complexity and administrative headaches, and maintain a comprehensive, extremely low-maintenance answer to backup MX management needs.


Download the Archiving Datasheet

Be secure using our 10-year cloud archive—where you can manage your data, prevent leakage, have easy access for discovery, achieve regulatory compliance, remove storage limitations, and reduce on-going costs. The archive can dramatically reduce the internal growth of pst files, with data stored separately from other users and secured with a unique encryption key.

Tamper-Proof and Offsite: create an unchangeable, encrypted format
Store data offsite in an encrypted format that does not allow for any changes to be made to the original—with individual and controlled global access, depending on a company’s needs and policies.

Have Control and Separate user archive with individual access
Be in charge of who has access to archived email. Let Administrators control who has the authority to search archived email. Keep track of who has been searching or attempting to access a company’s email archives. Also get a dedicated data store, and archive all email separately from other users, using a uniquely encrypted format. Each authorized user receives individual access to their own email, and entire company access can be granted to nominated search administrators.

eDiscovery: easily retrieve a specific email or attachment
Access data from our email archive that comes with advanced search capabilities for fast and easy retrieval of a specific email or attachment. This is particularly useful in civil and criminal litigation, as emails are often considered a particularly valuable source of evidence.

Complete Traceability and Retention Policy per company:
Use full journaling to archive email and capture every single message delivered outbound, inbound and internally. Avoid unsecured gaps in a company’s email data, and achieve full transparency.Also set specific retention policies, with the option to exclude certain messages for important purposes such as legal hold. And enforce these customized legal policies to ensure data isn’t lost or manipulated.

Power of Teamwork

Be part of our partner program and sell our exclusively built information security solution to small or medium-sized enterprises. Sold 100% through partners, Proofpoint Essentials™ is the exciting new channel offering that services the smaller enterprise, providing everything from purpose-built technology to dedicated support and bespoke resources. As a Proofpoint Essentials™ partner, benefit from this 100% channel-focused offering—with competitive, monthly pricing plans and packages to suit a variety of customer needs and budgets.

Hassle-free Revenue that Scales with You: choose the licensing model that suits your current commercial needs
Experience black and white profit margins from the get-go when you partner with Proofpoint Essentials™. There are no start-up fees, price hikes, support costs, or maintenance costs. We’ll keep in touch regularly so that as your business grows or your circumstances change you can be sure still to be on the most beneficial licensing model for you.

Utility Billing Options: get the payment flexibility you want
Pay for what is actually used with either monthly, annual or quarterly billing. We offer a monthly utility billing option among other commercial options, meeting the flexibility our partners demand. We also offer volume discounts across your total user estate, not simply per customer. The result: as your investment in Proofpoint Essentials™ grows, so does your margin.

100% Channel Focused: join a select group of partners profiting from Proofpoint Essentials™ – and know we’re always available to help
The Proofpoint Essentials™ solution is only available through the channel. We work closely with select Distributors, VARs and MSPs, from initial qualification and training to dedicated growth campaigns, up-sell opportunities and help in closing deals. As long as you’re a Proofpoint Essentials™ partner, we will be here for you whatever the issue to help make cloud email security work better for you and keep your profits on the rise.

Your brand, our technology: put your own brand on our market-leading cloud security technology
Quickly and easily co-brand the Proofpoint Essentials™ interface. Make your customers immediately feel at home: simply upload your company logo and edit the color scheme from the options provided. In addition, the Proofpoint Essentials™ marketing team will supply all the branded marketing and sales collateral you need to make reselling our solution to your customers even easier.

Support: get help selling the Proofpoint Essential email security solution
Be treated as an integral part of our business. We’re with you every step of the way—from training and supplying branded sales collateral to helping make it easier for you to sell the Proofpoint Essentials™ email security solution even easier, with assistance that includes:

  • Free managed setup with detailed product demo and non-obligation trials.
  • Fully Scalable licensing models for MSPs and Resellers.
  • A partner entry-level program to suit all types of partners: big, small, new or experienced.
  • 24x7x365 expert technical support, with live support during your 9:00-5:00 office hours.