Proofpoint Essentials

Advanced Email Threat Protection

With Proofpoint Essentials, you can protect your company from phishing, malware, spam and other malicious email threats. Proofpoint’s cloud-based enterprise class email security, continuity, encryption and archiving services is designed for businesses like yours. Today’s small and medium businesses and organizations face the same attacks as large enterprises. Proofpoint Essentials leverages enterprise security technology and infrastructure which is used by more than half of the Fortune 100 companies at a fraction of the cost.


Advanced Email Threat Protection

Proofpoint Essentials Advanced Email Threat Protection leverages the power of Targeted Attack Protection, which is Proofpoint’s industry-leading email analysis solution. It includes URL Defense and Attachment Defense. It’s the only solution that effectively detects, catches and analyses the malicious URLs and attachments that target your people and your organization.



No security vendor stops viruses and other email-borne threats better than Proofpoint. Their sophisticated multi-layered antivirus engines in the cloud are highly accurate, effective and fast. They block all known viruses and proactive heuristic scanning discovers and protects against never-before-seen viruses protects users from following links to malware-bearing websites for added security. Proofpoint’s language independent anti-virus engine also protects against phishing, spear phishing and spoofing attacks and updates in real time to protect against new and emerging attacks.


Spam Filtering

Powered by Proofpoint’s patented MLX machine-learning technology, their spam and phishing technology efficiently analyzes hundreds of attributes in every email. This advanced scanning accurately filters emails by examining envelope headers and structure, content, email sender reputation, images and more, to prevent spam emails, malware and other malicious email and attachment-based spam from reaching inboxes. It’s also backed by a comprehensive service-level agreement (SLA) that guarantees more than 99% spam capture rate. Proofpoint’s machine-learning technology also detects and combats new spam threats in real time. Individual, group and company-level spam sensitivity settings are available. Consolidated summary digest emails are also scheduled to forward to individual users with options to release, release and approve to whitelish sender, or block to reject sender emails.



Proofpoint offers flexible online reporting dashboards and detailed email reporting the includes the number of clean, spam or virus emails that have been sent, attempted and blocked is available with one click to give you actionable insights and more control over how emails are delivered.


Outbound Filtering

Outbound filtering ensures all email sent through the Proofpoint Essentials platform is free from viruses, malware and other malicious content. You can also view whether a specific email has been delivered, bounced, delayed or rejected.


Content Filtering

Proofpoint Essentials intelligent email Content Filter service enables businesses and organizations to use a flexible rules engine to enforce email communication policies. This policy-based approach designed to detect confidential or inappropriate text-based email content ensuring that your employees do not jeopardize the security and reputation of your business. Proofpoint’s Content Filtering service also detects a large variety of attachments including Microsoft Office, PDF attachments, compressed file types, executable (.exe) and all major media types.

zero hour

Zero-Hour Outbreak

Proofpoint Essentials instantly protects users against new, never-before-seen email threats as soon as they arise, so customers know that their inbox is always secure. This is fully automated real-time solution with no administration intervention required. There is also no need for broad file-blocking policies. Safe files flow freely. Only malicious attachments are blocked.

url defense

URL Defense

Leveraging the advanced power of Proofpoint Targeted Attack Protection, the industry’s most effective defense against advanced threats, stops and blocks malicious URLs. A frequent technique used by hackers has been to drive recipients to click on a link directing them to a website that is initially harmless but later turns malicious. Proofpoint Essentials offers real-time dynamic analysis by following each email that your users receive and checking for the URL destination’s safety.


Attachment Defense

Leveraging the advanced power of Targeted Attack Protection, the industry’s most effective defense against advanced email threats, Attachment Defense helps small to mid-sized enterprises detect malicious attachments. Intelligence gathered by Proofpoint Essential’s dynamic malware analysis is used to identify and block malicious attachments that are designed to evade traditional security solutions. Proofpoint analyzes billions of email messages every day, providing global visibility and early protection for emerging threats in terms of malicious attachments.

data loss

Email Data Loss Prevention (DLP)

Block data loss with a user-transparent, centrally based, policy-driven Data Loss Prevention (DLP) filter so you always know where your private or proprietary data resides, including intellectual property, personal identification, patient information and financial information to comply with regulatory requirements. Data Loss Prevention (DLP) dictionaries and smart identifiers provide automatically updateable Data Loss Prevention (DLP) policies.

email 2

Email Encryption

Losing confidential or customer information can result in fines, negative publicity and loss of customer trust. Reduce the potential negative impacts of data loss by automatically encrypting email. You can create filters that automatically identify outbound emails that should be encrypted. End-users can trigger encryption by using a predefined tag in the email subject line. End-users can also trigger encription by installing an Outlook plug-in providing them with access to a “Send Securely” button. Internal users, including the original sender and internal recipients, can compose, read and respond to all encrypted emails in their inbox. External users use Secure Mail (Proofpoint’s web-based interface) to read and respond to encrypted emails they have been sent.

social media

Social Media Account Protection

Proofpoint Essential’s ProfileLock continuously monitors for unusual posting patterns and unauthorized profile changes that signal that someone has taken over an account and also controld the applications that can access and publish content across your company’s social networks. Simple, click-and-comply policy controls and detailed reporting ensure compliance with industry regulations and corporate governance mandates. It helps you with account protection and compliance for up to 3 branded social media accounts including Facebook, Twitter, YouTube and Google Currents (Google+).


How would you keep your business running without email? You might be able to manage for a few minutes – but what about for a few hours or a few days? Proofpoint Essentials Advanced features keep your business going when disaster strikes.



Emergency Inbox

Proofpoint’s Emergency Inbox lets users access email as normal when their main email service goes down. Emergency Inbox is activated instantly and automatically. Users can open, read, download attachments and reply to any queued emails. Your end-users can also compose new emails and send them as if they were sent from their regular email server. It also quickly restores sent and received email using the Emergency Inbox to your primary email system. 30-day Emergency Inbox is available for users on all Proofpoint Essentials packages.


Instant Replay

With the Proofpoint Essentials Instant Replay feature, end-users can easily replay successfully delivered emails received in the last 30 days that may have been wrongly deleted or accidentally removed from servers. Individual users can access and recover individual emails without the need for administrator action.


Email Spooling

When your email server crashes or has a connection problem, Proofpoint Essentials automatically spools incoming email traffic to a backup server. Proofpoint’s email spooling and failover services provide a comprehensive, extremely low-maintenance answer to your email backup management needs. It preserves email metadata during an outage and delivers quick restoration of SMTP email traffic to the primary site once recovery is detected.


Eliminate data storage constraints and meet legal and regulatory obligations with Proofpoint Essential’s 10-year cloud archive with unlimited cloud storage ensures your business stays protected and compliant. Proofpoint’s cloud archive offers real-time envelope journaling for local Microsoft Exchange and Office 365 plus Support for Microsoft Small Business Server (SBS), Microsoft Exchange 2010, 2013 and 2016 plus Office 365. You can archive an unlimited volume of email in the cloud with up to 10 years retention for a single fixed cost per mailbox per year. You can also easily define your organization’s retention policy with their quick initial setup with no ongoing administration. You won’t need to deploy, manage and upgrade expensive hardware, software and client plug-ins. Using Proofpoint’s cloud infrastructure, Proofpoint Essentials offers an unlimited storage archive with in-territory archiving. European customers’ email is archived in the EU and US clients’ email is archived in the USA, supporting the requirements of the EU data protection directive.



Search and eDiscovery

Proofpoint Essentials’ Email Archive with scalable cloud-based processing resources comes with advance search capabilities for the super-fast and easy retrieval of specific emails and attachments. Proofpoint’s easy-to-use search archive audit log helps you easily understand what messages are being searched
for including what actions are taken with each archived message such as exported, forwarded to or redelivered. With Proofpoint’s Email Archive Legal Hold feature you can suspend disposition of email during important eDiscovery events. Users given permission to access Email Archive Users in the email archive can be granted various permissions including end users who can search their own archive, discovery users who can access the archive for the entire organization and administrators who can make configuration changes.


Proofpoint Essentials

Security Awareness Training

Meet the JumpCloud Agent

The JumpCloud agent is powerful for IT administrators but invisible to end users on managed devices. It unlocks capabilities for managed users and resources to give employees an easy, secure way to manage their identity and access their work resources on a secure device.

JumpCloud Agent Diagram

Enforce Policies

Leverage JumpCloud’s policies for Mac, Windows and Linux to implement security and configuration settings across your devices. Choose from a selection of point-and-click templates to manage screensaver settings, disable USB storage, enforce full-disk encryption and more.

extend identities through intergration

Device Centric Security

JumpCloud managed devices are trusted gateways to corporate resources. Employees have secure access to resources on their work devices using their single set of credentials to get to everything they need. Take advantage of JumpCloud Mobile Device Management (MDM) to configure and secure Mac laptops and workstations with Mac policies.

secure identities

Enforce Policies

Leverage JumpCloud’s policies for Mac, Windows and Linux to implement security and configuration settings across your devices. Choose from a selection of point-and-click templates to manage screensaver settings, disable USB storage, enforce full-disk encryption and more.

extend identities through intergration
Protecting People graphic

Download the Protecting People eBook

proofpoint packages


Create and execute scripts to manage your servers in the language of your choice and run commands on a scheduled or ad hoc basis.


Use point-and-click policies to set up security and configuration standards across your organization’s servers, individually or in groups.


Use Cloud LDAP to manage the access layer of container orchestration tools like Kubernetes and Docker.

Active Directory Integration

Pair JumpCloud with existing Active Directory domains to federate on-premise credentials to cloud infrastructure.

The Power of JumpCloud LDAP in the Cloud

Cloud-hosted LDAP provides you with all of the abilities of the LDAP protocol with none of the usual setup, maintenance, or failover requirements of traditional LDAP implementations. Since our cloud LDAP servers are already stood up and ready to use, all you need to do is point your LDAP-connected endpoints to JumpCloud and you’re on your way.

Complete Control

Manage LDAP access from your browser through the JumpCloud Admin Portal, as well as through your command line or JumpCloud’s RESTful APIs. With group-based access controls, you can streamline LDAP management to best suit your needs.

Hyper Secure

JumpCloud’s OpenLDAP RFC 2307 compliant cloud LDAP offering is encrypted by LDAPS & Start TLS, ensuring your LDAP authentication remains as secure as possible. What’s more, you can require multi-factor authentication upon entry to LDAP resources to keep your data locked down.

AuthN to Apps & Services

JumpCloud provides authentication for any application or service that can defer authentication via LDAP. Integrate with apps such as Atlassian Jira and Confluence or with DevOps infrastructure such as Jenkins, Ansible, Kubernetes, Docker, OpenVPN and thousands of others.

NAS Authentication with LDAP & Samba Attributes

LDAP-as-a-Service includes secure support for authentication and group-based authorization on Samba file servers or commercial NAS appliances such as Synology, QNAP, Morro Data and more.