Proofpoint Essentials Pricing

FeatureBusiness +$4.36/user/month PP-ESS-BUS2Advanced +$6.67/user/month PP-ESS-ADV2Professional + $8.91/user/month PP-ESS-PRO2
Anti-Spam/Anti-Virus
Custom Content Filtering
Impostor Email Protection
URL Defense
Predictive URL Defense New
Attachment Defense Reputation
Attachment Defense Sandboxing
Social Media Account Protection
Advanced BEC Detection New
Email Warning Tags New
One-Click Message Pull New
Outbound Filtering
Data Loss Prevention
Email Encryption
Emergency Inbox30 Days30 Days30 Days
Email Spooling30 Days30 Days30 Days
Email Archiving
Exchange and Microsoft 365 Support
Search and Discovery
Data Import and Export

Introducing Proofpoint Essentials Email Filtering

Proofpoint Essentials Cybersecurity

In a world filled with ever-evolving cyber threats, the need for robust email filtering has never been greater. With Proofpoint Essentials, you gain access to cutting-edge technology that identifies and neutralizes email-borne threats before they can cause any harm.

Picture a stage where your employees can work with peace of mind, knowing that their email communications are shielded by a formidable defense system. Proofpoint Essentials empowers your organization with the confidence to tackle any email-related security challenge.

Small and medium enterprises (SMEs) are being targeted by increasingly complex attacks and malware. The growing level of sophisticated, malicious emails is putting SMEs at risk.

Proofpoint Essentials is a cloud-based enterprise-class email security, continuity, and archiving product designed specifically for SMEs. It’s backed by Proofpoint’s enterprise class security and infrastructure – the same technology that protects some of the largest and most security conscious companies in the world.

Proofpoint Essentials Security Awareness for your business.

On Demand Training

  1. To keep your business and data safe, a company must prioritize security measures, policies, and procedures. A key is to remain proactive and vigilant in identifying and addressing security issues.
  2. It involves educating workers about the importance of taking security measures, policies, and procedures, seriously.
  3. Security awareness training is a strategic approach employed by IT and security experts to preemptively address and mitigate potential risks posed by users.

Email Security Templates, create a security campaign.

With thousands of different templates across 13 categories, you can assess users on multiple threat types, including:

  • Malicious email attachments.
  • Unsafe URLs embedded in emails.
  • Requests for personal data snatching.

End User Security Training

As a business, you also need to keep your end-user security awareness training up to date with the ever-changing email cyber security attacks.

Proofpoint Essentials Security Awareness Training (SAT) for end-users makes it easy with Campaigns, and you can set those campaigns a year out.

Proofpoint Essentials Security Awareness FAQ.

Q: Can I use this service, even though I do not have Proofpoint Essentials?

A: Yes, it is platform-agnostic and works with many filtering services.

Q: What is the pricing?

A: The price is per user per year and is $15.60.

Q; What can I see in reports?

A: You can see who clicked, didn't do well in training, and failed the org and put you at risk.

Q: What can I see with the Company Training Report Card?

A: The company training report card provides an at-a-glance view of average scores per module, users who are overdue on completing their assignments, and an assignment-level summary of users' progress status (not started, in progress, completed) and the completion rate.

Q: Do I need Proofpoint Essentials to run the Security Awareness?

A: You do not and can run it with Office 365, Exchange, and Google GMail.

Benefits

Quickly view the status of your training programs, including progress status (completed, not started, in progress), average scores, and completion rates. Quickly identify the users who are overdue on completing their assignments.

It's a lights-out service as your head hits the pillow, knowing this is in place for your business. Call today (888) 959-2825

Cybercrime Infograph Cost

Complete Defense Against Today’s Email Threats

End Spam and Ransomware with Proofpoint MLX™ Email Scanning.

Powered by Proofpoint MLX™ machine learning technology, Proofpoint Essentials spam and phishing detection offers maximum protection against email threats. It examines hundreds of thousands of attributes in every email to accurately detect text, image and attachment-based spam or phishing emails, while automatically adapting to new threats as they appear.

How can I protect against Email Ransomware?

The number one cause of ransomware is clicking on links in an email. If you do anything, you need a service to produce URL blocking and filtering. ProofPoint Essentials essentials email filtering service plans come with in-body blocking URL protection of email.

What level of protection can I get with Attachments?

Attachments, such as Microsoft Office documents, are often used in spear-phishing attacks to deliver banking Trojans, ransomware, or other malware. The Attachment Defense Capability leverages technology that powers the Proofpoint Targeted Attack Protection Solution. Intelligence gathered by the dynamic malware analysis is used to identify and block malicious attachments that are designed to evade traditional security solutions.

Anti Virus

Proofpoint's threat detection technology enables our email Anti-Virus to provide customers with unrivaled protection from viruses and other email-borne threats. Our sophisticated anti-virus engines operate at the highest accuracy, performance, and effectiveness levels, blocking all known viruses. Heuristic scanning additionally discovers and protects against currently unknown viruses for added security and reassurance.

Proofpoint Essentials Email Encryption

How does ProofPoint Email Encryption work?

It is required for your business to send all outbound emails through the ProofPoint cloud service. ProofPoint will scan all outgoing email, and Artificial Intelligence will look for specific, potentially sensitive content, such as credit card number, social security, or banking information. If an outgoing email is found to contain such material, the email is wrapped in an encryption package, and the email is sent to the recipients to direct them back to the encryption service where one can read and reply to your email. Responses are delivered to your inbox.

ProofPoint Essentials Advanced and Professional plan only come with Email Encryption.

Proofpoint Essentials Email Encryption is available to customers in both US and EU regions.

Technical Details:

  • Cryptographic Algorithms
  • Message Encryption: AES (256 bit)
  • Digital Signature: ECDSA

Ask Us to send you an encrypted email to you. Please fill out the contact us form below.

What are the steps of email encryption?

StepDescription
1The sender composes an email and hits send.
2The email is sent to Proofpoint Essentials (over TLS) where the content is analyzed to determine if there are any filters that apply to the message.
3An encryption filter has been created and applies to the email.
4If the filter conditions for encryption are not met, the message proceeds forward with standard routing.
5The email is delivered to and stored in the Encryption portal. (Expires after 15 days)
6A notification email is sent to the original sender (e.g., "Your email was encrypted").
7A notification email is sent to each recipient (e.g., "You have received an encrypted email").
8The recipient clicks on the link in the email to view the content via the Encryption portal.
9The recipient registers (one-time) to the service and reads the email.
10The recipient replies to the email.
11The reply is sent to the original sender (over TLS) and delivered to their inbox.
Key FeaturesBenefits
Automated and Policy-Driven Email EncryptionCompanies can automatically identify and secure sensitive outgoing information, such as PII, PHI, financial information, GDPR terms and many more with built-in term dictionaries and SmartSearch identifiers.
User-Defined EncryptionUsers can encrypt emails in one quick and easy step. They just add a simple identifier in the subject line of the email.
Secure Mail PortalRecipients of the encrypted emails are directed to our Secure Mail portal where they can read and respond to sent emails through an intuitive web portal.
Outlook Plug-In / Add-InUsers can trigger encryption by clicking a simple send button in their Outlook ribbon when composing a new email.

What version does the encryption outlook plugin work with?

Exchange VersionWindow's VersionOutlook VersionProofpoint Installer
Exchange 2010Windows 7, Windows 10Outlook 2010, Outlook 2013, Outlook 2016N/A
Exchange 2013Windows 7, Windows 10Outlook 2010, Outlook 2013, Outlook 2016N/A
Exchange 2016+Windows 7, Windows 10Outlook 2010, Outlook 2013, Outlook 2016N/A

This outlook plugin does not work with Outlook for mac or Apple or any IOS.

FAQ

Q: Does Proofpoint Email Encryption come with a read receipt?

A: Unfortunately, it does not come with a read receipt.

Q: Can I only want to use a subset of users for the essential email encryption service?

A: Unfortunately, it's domain-wide, and you can not select just a handful of users to use the email encryption service.

Q: What is BEC? (Identity Deception)

A: It is the ability to protect against Domain spoofing, lookalike domains, display name spoofing, and account compromise.

Q; What does BEC Defence look at when reviewing email headers?

A: Sender reputation by email domain. It will look at inconsistent reply-to-pivot where the domain and IP don't match. It will look at the IP of the untrustworthy locale. It will also look at urgencies and Authoritative languages, such as payment language and reference to a bank account or wire transfer reference.

Q: What is email warning Tags?

A: It provides an email warning lable to be careful about executing a command from the email such as "here is where to wire money". Its a take caution and an extra layer of information.

Q: Can Proofpoint Essentials protect against phishing attacks?

A: Yes, Proofpoint Essentials is highly effective in defending against phishing attacks. It employs real-time URL analysis, sender authentication, and pattern recognition to detect and block phishing attempts, reducing the risk of employees falling victim to scams.

Email Warning Tags: Use Cases

TagTypeDescriptionAvailability
External SendersInformationalThe sender of the email is external to your organization.Launch
GEOIPInformationalThe origin of the email may be coming from a Country of concern.Launch
Imposter (DMARC)WarningThe sending domain has some problems with its DMARC policy.Launch
Domain ageWarningThe sender domain was recently created.Launch
SuspiciousWarningThe email appears “suspicious”; recipient should be cautious with interaction.Q3 2023

Proofpoint Essentials Features PDF and Packages

Proofpoint Essentials Price PDF

Videos

Key Features Summary

Advanced BEC Defense

  • New Targeted Threat Engine, Supernova, available to Essentials
  • Adds new BEC classifier (Advanced BEC Defense)
  • 3X detection improvement of BEC in preliminary testing
  • Supernova also improves detection of Phishing,
  • Malware, Spam, etc

Email Warning Tags

  • Information and warning tags inserted into message body to inform user of potential risk
  • Helps reduce the organization risk by making users more cautious when interacting with certain emails

One-Click Message Pull

  • Allows administrators to remove delivered malicious message from a
  • Microsoft 365 mailbox Accessible through Email Logs
  • Ability to remove/restore
  • Support for Microsoft 365 only

Predictive URL Defense

  • Malicious URLs will be identified more quickly leading to improved predelivery detection
  • Improves phishing efficacy by sandboxing URLs associated with “suspicious” emails without waiting for user clicks

Talk to us

Phone & Hours

(888) 959-2825
Monday-Friday: 9am to 5pm

Address

8117 W. Manchester Ave
Suite 915
Playa Del Rey, CA 90293