Product Description
Proofpoint Protection & Data Loss Prevention & Encryption with F-Secure Service Edition - Subscription License - 2 Year - HS-PP-B-EPDLPEF-S-B-201
Protect your organization from email-based threats, including phishing, spear phishing, malware, ransomware, and business email compromise with Proofpoint Protection & Data Loss Prevention & Encryption with F-Secure Service Edition. This subscription-based software includes all the features of Proofpoint Protection & Data Loss Prevention, plus F-Secure Encryption, to help you protect your sensitive data.
Proofpoint Protection & Data Loss Prevention & Encryption with F-Secure Service Edition uses a variety of techniques to protect your organization from email-based threats, including:
- Phishing protection: Proofpoint's phishing protection uses a variety of techniques to identify and block phishing emails, including:
- Content analysis: Proofpoint's content analysis engine analyzes emails for malicious content, such as links to phishing websites or malicious attachments.
- Reputation analysis: Proofpoint's reputation analysis engine checks emails against a blacklist of known phishing websites and malicious IP addresses.
- User behavior analysis: Proofpoint's user behavior analysis engine tracks user behavior to identify suspicious activity, such as clicking on links in phishing emails.
- Spear phishing protection: Proofpoint's spear phishing protection uses a variety of techniques to identify and block spear phishing emails, including:
- Content analysis: Proofpoint's content analysis engine analyzes emails for malicious content, such as links to spear phishing websites or malicious attachments.
- Reputation analysis: Proofpoint's reputation analysis engine checks emails against a blacklist of known spear phishing websites and malicious IP addresses.
- User behavior analysis: Proofpoint's user behavior analysis engine tracks user behavior to identify suspicious activity, such as clicking on links in spear phishing emails.
- Malware protection: Proofpoint's malware protection uses a variety of techniques to identify and block malware, including:
- Content analysis: Proofpoint's content analysis engine analyzes emails for malicious content, such as malicious links or attachments.
- Reputation analysis: Proofpoint's reputation analysis engine checks emails against a blacklist of known malware websites and malicious IP addresses.
- User behavior analysis: Proofpoint's user behavior analysis engine tracks user behavior to identify suspicious activity, such as downloading or running malicious files.
- Ransomware protection: Proofpoint's ransomware protection uses a variety of techniques to identify and block ransomware, including:
- Content analysis: Proofpoint's content analysis engine analyzes emails for malicious content, such as links to ransomware websites or malicious attachments.
- Reputation analysis: Proofpoint's reputation analysis engine checks emails against a blacklist of known ransomware websites and malicious IP addresses.
- User behavior analysis: Proofpoint's user behavior analysis engine tracks user behavior to identify suspicious activity, such as downloading or running ransomware files.
- Business email compromise protection: Proofpoint's business email compromise protection uses a variety of techniques to identify and block business email compromise attacks, including:
- Content analysis: Proofpoint's content analysis engine analyzes emails for malicious content, such as links to business email compromise websites or malicious attachments.
- Reputation analysis: Proofpoint's reputation analysis engine checks emails against a blacklist of known business email compromise websites and malicious IP addresses.
- User behavior analysis: Proofpoint's user behavior analysis engine tracks user behavior to identify suspicious activity, such as clicking on links in business email compromise emails.