474:
45:
2699:
369:
2331:
567:, announced in April 2007, that it had certified six anti-spam products under their new testing program, one of which was the Proofpoint Messaging Security Gateway. The goal of ICSA Labs' anti-spam product testing and certification is to evaluate product effectiveness in detecting and removing spam. The guidelines also address how well the products recognize e-mail messages from legitimate sources.
378:
36:
722:) channels to detect, prevent, malicious or unwanted content from undermining organizational efforts to build brand across all major social media platforms. On October 23, 2014 Proofpoint acquired Nexgate, Inc., a social media and security compliance vendor. On November 4, 2015 Proofpoint acquired Socialware Inc., a compliance workflow & content capture and review technology company.
327:
310:
292:
273:
249:
534:
Proofpoint introduced a new product, the
Network Content Sentry, as an add-on appliance to the Content Security Suite in August 2005. Designed to monitor online messaging other than email, the appliance monitors Web mail, message boards, blogs and FTP-based communications. Proofpoint also introduced
510:
In March 2004, Proofpoint introduced its first hardware appliance, the P-Series
Message Protection Appliance (later renamed Proofpoint Messaging Security Gateway), using a hardened Linux kernel and Proofpoint's Protection Server 2.0 software. It was tested by Infoworld and found to stop 94% of spam.
579:
business, Proofpoint introduced
Proofpoint on Demand, a hosted version of its email security and data loss prevention offerings. In May, 2008, the company's hosted offerings were expanded with the introduction of Proofpoint on Demand—Standard Edition. The product is targeted at small-to-medium size
636:
software for legal discovery, regulatory compliance and email storage management. Fortiva used
Exchange journaling to automatically archive all internal and external communications so that end users can search all archived messages, including attachments, directly from a search folder in Outlook.
624:
aimed at different facets of email security. Its flagship product the
Proofpoint Messaging Security Gateway. The Messaging Security Gateway is a web-based application that offers spam protection; based on both user defined rules as well as dynamically updated definitions, anti-virus scanning, and
514:
Another product introduction in
November 2004 included Protection Server 3.0, with Email Firewall and MLX-based Dynamic Reputation Analysis, and the Content Security Suite, plug-in modules designed for scanning outbound messages and their attachments to assist in compliance with data protection
694:
from impersonating their brand to harm customers, partners, and the brand's reputation. Its email digital risk portfolio includes authentication technology to prevent email domain spoofing. On social media, it stops scams in which fraudsters create fake customer-service accounts to find people
559:
Proofpoint
Messaging Security Gateway V5.0 was released in June 2007, and was based on a new, integrated architecture, combining all its capabilities into a single platform. It could be run either as a dedicated appliance, virtual appliance, or software suite.
661:, data-loss prevention and forensics-gathering tools are designed to speed incident response and mitigate the damage and costs of any threats that do get through. The portfolio also includes protection from social-media account takeovers, harmful
551:
on a host running VMware's virtual server software. Moving a dedicated hardware appliance to a virtual server eliminates problems associated with proprietary hardware and reduces upgrade costs, though it does require knowledge of VMware's
657:. It uses a blend of sandbox analysis, reputational analysis, automated threat data, human threat intelligence and attributes such as sender/recipient relationship, headers, and content, and more to detect potential threats. Automated
677:
Proofpoint's compliance products are designed to reduce the manual labor involved in identifying potentially sensitive data, managing and supervising it in compliance with government and industry rules, and producing it quickly in
625:
configurable email firewall rules. The spam-protection service, however, results in many false positives of legitimate email servers and blocks IPs. A webform is provided to request an IP be unblocked, but they are non-responsive.
506:
regulations governing financial disclosures and the privacy of health care data prompted
Proofpoint to begin developing new products that would automatically identify and intercept outbound email containing sensitive information.
2083:"Proofpoint Enters into Definitive Agreement to Acquire ObserveIT for $ 225 Million in Cash; Extending Leadership in People-Centric Security and Compliance to Deliver Post-Perimeter Data Loss Prevention | Proofpoint US"
494:
using 10,000 different attributes to differentiate between spam and valid email. The company joined dozens of other anti-spam software providers in a business opportunity fueled by an exponential increase in
1774:
2759:
1491:
499:
volume that was threatening worker productivity, making spam a top business priority. According to the 2004 National
Technology Readinesed the number of spam detection attributes to more than 50,000.
695:
seeking help over social media and trick them into handing over account credentials or visiting a malicious website. And in mobile, it finds counterfeit apps distributed through mobile app stores.
1362:
527:. In combination, this was known as the Proofpoint Messaging Security Gateway Appliance. It was reviewed by ChannelWeb, which observed that it used a "combination of technologies:
486:
The company's first product was the
Proofpoint Protection Server (PPS) for medium and large businesses. It incorporated what was described as "MLX Technology", proprietary
2754:
2002:
2734:
2769:
2739:
2764:
2027:
1393:
1153:
2218:
2082:
1810:
2749:
2219:"Proofpoint Enters into Definitive Agreement to Acquire Weblife for $ 60 million; Extends Protection Capabilities to Enterprise Users' Web-based Personal Email"
547:
In a step towards simpler operational requirements, the Proofpoint Messaging Security Gateway Virtual Edition was released in April 2007. The product runs as a
1169:
1499:
1067:
2714:
2245:
2193:
463:(IPO), the company's shares traded at $ 13 apiece; investors purchased more than 6.3 million shares through the IPO, raising more than $ 80 million.
2270:
2167:
1302:
1370:
473:
2724:
2719:
2304:
1976:
2552:
2450:
1925:
1677:
1243:
1225:
1188:
2367:
264:
1332:
1836:
1524:
1441:
1038:
524:
1811:"Proofpoint Announces Intelligent Supervision and Compliance Gateway to Help Customers with FINRA and SEC Audits | Proofpoint"
2774:
189:, United States (California, Colorado, Indiana, Massachusetts, New York, North Carolina, Pennsylvania, Texas, Utah, Virginia)
2479:
2432:
1466:
477:
Proofpoint Co-Founder & Chairman Eric Hahn with then CEO Gary Steele at Proofpoint's 15 year anniversary celebration.
1796:
237:
2309:
1401:
1907:
2414:
1748:
706:
product was included in an evaluation of the nine top vendors in this emerging market. These monitor "digital" (i.e.
2573:
1627:
1258:
1166:
2744:
2533:
1285:
444:
round, releasing its first product, and lining up six customers as references, and was backed by venture investors
2152:
1127:
2497:
2053:
1270:
650:
1730:
1652:
2285:
1951:
20:
1575:
1886:
528:
460:
44:
58:
1114:
2134:"Proofpoint acquires Meta Networks to strengthen its cloud-based architecture and its security platform"
593:
576:
393:
389:
120:
2133:
1310:
2594:
1703:
1089:
771:
466:
On April 26, 2021, Proofpoint announced that it had agreed to be acquired by the private equity firm
405:
401:
253:
233:
229:
182:
580:
businesses that need email security but do not run their own servers or have on-site IT personnel.
449:
516:
2729:
1790:
699:
2637:
1205:
758:
445:
1240:
1222:
1185:
564:
536:
487:
441:
319:
221:
1549:
1363:"Earth Times: show/icsa-labs-introduces-formal-testing-of-anti-spam-products,345941.shtml"
1340:
1289:
1247:
1229:
1192:
1173:
691:
633:
609:
548:
409:
225:
213:
2515:
2396:
2349:
1241:
BorderWare and Proofpoint boxes are both capable spam combatants, Infoworld, May 28, 2004
1009:
2698:
1861:
368:
1952:"Evolution of AI-Powered Email Defense: Proofpoint Announces Intent to Acquire Tessian"
916:
649:(delivered via malicious attachments and URLs) and socially engineered attacks—such as
596:, and brand-impostor fraud (which it calls "digital risk"). These products work across
397:
186:
2708:
2612:
2006:
1071:
605:
589:
539:
features, using identity-based encryption technology licensed from Voltage Security.
217:
66:
711:
707:
703:
601:
453:
2534:"Proofpoint to Acquire Armorize Technologies for $ 25 Million - SecurityWeek.Com"
2662:
679:
646:
467:
416:
377:
338:
178:
35:
2194:"Proofpoint completes Wombat acquisition, aims to increase revenue by millions"
1601:
2246:"Proofpoint acquires Cloudmark for $ 110M in cybersecurity consolidation play"
662:
658:
496:
491:
459:
Proofpoint became a publicly traded company in April 2012. At the time of its
283:
2168:"Wombat Security acquired for $ 225M by Silicon Valley cybersecurity company"
1678:"No response from proofpoint after ip addresss is blocked without any reason"
1167:
Fighting Spam, Fueling Growth, InformationWeek Research's Outlook 2004 Survey
645:
Proofpoint's security portfolio includes products that stop both traditional
1283:
CRN Test Center Review: A Virtual Solution To Spam, ChannelWeb, Apr 23, 2007
588:
Proofpoint products are designed to solve three business problems: advanced
433:
166:
138:
109:
1977:"Proofpoint Signs Definitive Agreement to Acquire Tessian | Proofpoint US"
1492:"Proofpoint releases Proofpoint Intelligent Supervision | Compliance Week"
690:
Proofpoint's digital risk products are aimed at companies seeking to stop
1223:
IronPort, Proofpoint appliances target spam, NetworkWorld, March 15, 2004
719:
437:
1282:
702:
Wave for Digital Risk Monitoring, Q3 2016 the Proofpoint digital risk /
2574:"Abaca Technology Corporation: Private Company Information - Bloomberg"
984:
715:
654:
629:
452:. An additional $ 9 million in Series B funding led by New York-based
150:
1423:
2305:"Proofpoint Battens Against Spoofers, Phishers With $ 18 Million Buy"
553:
174:
154:
146:
142:
72:
666:
597:
520:
503:
472:
376:
302:
170:
162:
158:
1862:"Social Media Phishing Soars, New Trend Is Fake Customer Service"
2108:
1115:
Proofpoint adds funding, San Jose Business Journal, Oct 14, 2003
621:
2692:
2553:"Proofpoint Seals $ 25 Million Deal For Armorize Technologies"
1186:
Proofpoint improves spam prevention, Nov 3, 2003, NetworkWorld
359:
2054:"Proofpoint's (PFPT) Q1 Earnings Top Estimates, View Slashed"
531:, a spam-filtering engine and adaptive learning technology."
1777:. June 16, 2016. Archived from the original on June 18, 2016
490:
algorithms applied to the problem of accurately identifying
2003:"Proofpoint Signs Definitive Agreement to Acquire Illusive"
2028:"Proofpoint Signs Definitive Agreement to Acquire Dathena"
2271:"Proofpoint acquires Israeli Firelayers for $ 55 million"
1083:
1081:
440:. It launched July 21, 2003, after raising a $ 7 million
388:
is an American enterprise cybersecurity company based in
1749:"FBI: Email Scams Take $ 3.1 Billion Toll on Businesses"
415:
In 2021, Proofpoint was acquired by private equity firm
49:
Proofpoint Headquarters located in Sunnyvale California.
2415:"Proofpoint Acquires Emerging Threats for $ 40 Million"
2760:
Software companies based in the San Francisco Bay Area
2350:"Cybersecurity Company Proofpoint Acquires Socialware"
2286:"Proofpoint pays $ 55 million for Israel's FireLayers"
1837:"The Forrester Wave: Digital Risk Monitoring, Q3 2016"
1525:"The Forrester Wave: Digital Risk Monitoring, Q3 2016"
2589:
2587:
2153:"Proofpoint Acquires Meta Networks for Nearly $ 120m"
1424:"Proofpoint Offers On Demand Email Security for SMBs"
1926:"nexgate-blog-proofpoint-acquires-socialware--expan"
1442:"Proofpoint Enterprise Protection: Product overview"
354:
344:
334:
317:
300:
281:
262:
243:
207:
193:
131:
115:
105:
87:
79:
64:
54:
2397:"Proofpoint to Acquire Emerging Threats for $ 40M"
1259:"ProofPoint Appliance Stands Guard At E-Mail Gate"
2077:
2075:
1154:"Proofpoint Agreed To Be Acquired By Thoma Bravo"
1068:"Thoma Bravo Completes Acquisition of Proofpoint"
2568:
2566:
2516:"Proofpoint Acquires Sendmail for $ 23M in Cash"
628:Additionally, in June 2008, Proofpoint acquired
1467:"Proofpoint Email Encryption: Product overview"
1271:"Proofpoint, Voltage Team on E-Mail Encryption"
2480:"Proofpoint acquires NetCitadel in $ 24M deal"
2433:"Proofpoint acquires Nexgate for $ 35 million"
1908:"Proofpoint acquires Nexgate for $ 35 million"
1394:"Proofpoint jumps into security services fray"
653:(BEC) and credential phishing—that do not use
1753:Threatpost | The first stop for security news
1033:
1031:
1029:
1027:
1025:
1023:
8:
28:
2638:"Proofpoint Acquires Secure Data In Motion"
2697:
367:
43:
34:
27:
2755:Networking companies of the United States
2595:"California company buys Utah's NextPage"
2109:"Software-Defined Perimeter in the Cloud"
2735:Companies based in Sunnyvale, California
2368:"Proofpoint acquires Texas social group"
1128:"Proofpoint and Infoblox Rise on Debuts"
864:$ 18M - Email Fraud Protection division
729:
432:The company was founded in July 2002 by
2770:Software companies of the United States
2740:Companies formerly listed on the Nasdaq
1001:
2765:Software companies established in 2002
2284:Press, Viva Sarah (October 25, 2016).
1887:"Mobile Devices: What Could Go Wrong?"
1788:
563:ICSA Labs, an independent division of
2551:Westervelt, Robert (August 9, 2013).
2166:Stacey, Federoff (February 6, 2018).
1519:
1517:
1039:"Proofpoint, Inc. 2020 Annual Report"
7:
2750:Computer security software companies
2451:"Proofpoint gets into social media"
2303:Gatlin, Allison (August 25, 2016).
2613:"Proofpoint Acquires Everyone.net"
1729:McMillan, Robert (June 24, 2008).
1628:"IP Address blocked by Proofpoint"
1392:Garretson, Cara (August 7, 2007).
1090:"Proofpoint Joins Anti-Spam Crowd"
817:Wombat Security Technologies, Inc
14:
2715:2002 establishments in California
1303:"When appliances get out of hand"
1950:Sadler, Tim (October 30, 2023).
1653:"ProofPoint won't unblock me..."
1333:"Proofpoint Intros Proofpoint 5"
809:$ 120 million in cash and stock
632:, Inc., a provider of on-demand
456:was announced in October, 2003.
326:
325:
309:
308:
291:
290:
272:
271:
248:
247:
1682:reddit.com proofpoint subreddit
1301:Dubie, Denise (April 4, 2007).
1261:, ChannelWeb, November 26, 2004
1632:linode.com community questions
1339:. June 4, 2007. Archived from
620:Proofpoint offers software or
16:American cybersecurity company
1:
2725:2021 mergers and acquisitions
2720:2012 initial public offerings
2663:"Proofpoint Acquires Fortiva"
2192:Bunny, Lian (March 1, 2018).
1731:"Proofpoint acquires Fortiva"
1656:reddit.com sysadmin subreddit
1088:Lacy, Sarah (July 20, 2003).
940:Abaca Technology Corporation
543:Virtual appliance development
238:Data loss prevention software
2151:Zurkus, Kacy (May 7, 2019).
1704:"Proofpoint - IP is blocked"
1602:"Proofpoint blocking emails"
1273:, eweek.com, August 1, 2005.
381:Proofpoint office in Toronto
1576:"Proofpoint Spam Detection"
554:virtual server architecture
400:, identity threat defense,
295:–US$ 163.809 million (2020)
93:; 22 years ago
2791:
1708:discourse.mailinabox.email
921:$ 23M (terms undisclosed)
886:$ 40M in Cash & Stock
853:$ 55M in Cash & Stock
330:US$ 441.744 million (2020)
276:–US$ 95.196 million (2020)
18:
2332:"451 Research User Login"
2310:Investor's Business Daily
2198:Pittsburgh Business Times
2172:Pittsburgh Business Times
1795:: CS1 maint: unfit URL (
1580:proofpoint Spam Detection
1172:December 8, 2009, at the
875:$ 9M (terms undisclosed)
651:business email compromise
42:
33:
1775:"Wiping out email fraud"
313:US$ 2.498 billion (2020)
21:Proofpoint Systems, Inc.
19:Not to be confused with
529:policy-based management
461:initial public offering
438:Netscape Communications
211:Identity threat defense
1246:June 16, 2008, at the
973:Secure Data In Motion
929:Armorize Technologies
820:$ 225M Cash and stock
798:$ 225 million in cash
787:Less than $ 5 million
478:
436:, formerly the CTO of
382:
2775:Thoma Bravo companies
2599:The Salt Lake Tribune
1606:discussions.apple.com
1288:June 7, 2008, at the
1228:May 31, 2008, at the
1210:MIT Technology Review
1191:May 31, 2008, at the
673:Regulatory compliance
577:software-as-a-service
571:Software as a service
476:
394:software as a service
390:Sunnyvale, California
380:
201:Marcel DePaolis (CTO)
121:Sunnyvale, California
1430:. November 17, 2015.
1204:Review, Technology.
592:threats, regulatory
515:regulations such as
502:In 2004, strict new
419:for $ 12.3 billion.
406:electronic discovery
402:data loss prevention
234:Electronic discovery
230:Anti-spam techniques
183:United Arab Emirates
137:Offices worldwide:
2439:. October 24, 2014.
2356:. November 4, 2015.
2336:sso.451research.com
2273:. October 21, 2016.
2225:. November 29, 2017
1914:. October 24, 2014.
1684:. February 18, 2022
1048:. December 31, 2020
784:The Defence Works
450:Stanford University
346:Number of employees
133:Number of locations
30:
2522:. October 2, 2013.
2460:. October 23, 2014
2377:. November 4, 2015
2089:. November 3, 2019
1983:. October 30, 2023
1658:. December 3, 2018
1556:. October 10, 2019
1550:"Email Protection"
1496:ComplianceWeek.com
1206:"E-Mail Inspector"
1132:The New York Times
1074:. August 31, 2021.
1016:. August 30, 2016.
1010:"Office Locations"
989:Undisclosed Terms
976:Undisclosed Terms
965:Undisclosed Terms
954:Undisclosed Terms
943:Undisclosed Terms
776:Undisclosed Terms
763:Undisclosed Terms
750:Undisclosed Terms
525:Gramm–Leach–Bliley
479:
383:
199:Sumit Dhawan (CEO)
2745:Computer archives
2540:. August 9, 2013.
2138:Help Net Security
2058:Finance.Yahoo.com
2005:(Press release).
1710:. August 22, 2022
1582:. Proofpoint, Inc
1502:on April 23, 2017
1156:. April 26, 2021.
1070:(Press release).
993:
992:
883:Emerging Threats
792:November 3, 2019
759:Illusive Networks
549:virtual appliance
446:Benchmark Capital
396:and products for
375:
374:
203:RĂ©mi Thomas (CFO)
83:Security software
2782:
2701:
2696:
2695:
2693:Official website
2678:
2677:
2675:
2673:
2659:
2653:
2652:
2650:
2648:
2634:
2628:
2627:
2625:
2623:
2609:
2603:
2602:
2591:
2582:
2581:
2570:
2561:
2560:
2548:
2542:
2541:
2538:SecurityWeek.com
2530:
2524:
2523:
2512:
2506:
2505:
2498:"Search Results"
2494:
2488:
2487:
2476:
2470:
2469:
2467:
2465:
2455:
2447:
2441:
2440:
2429:
2423:
2422:
2421:. March 3, 2015.
2411:
2405:
2404:
2403:. March 2, 2015.
2393:
2387:
2386:
2384:
2382:
2372:
2364:
2358:
2357:
2346:
2340:
2339:
2328:
2322:
2321:
2319:
2317:
2300:
2294:
2293:
2281:
2275:
2274:
2267:
2261:
2260:
2258:
2256:
2244:Lunden, Ingrid.
2241:
2235:
2234:
2232:
2230:
2215:
2209:
2208:
2206:
2204:
2189:
2183:
2182:
2180:
2178:
2163:
2157:
2156:
2148:
2142:
2141:
2130:
2124:
2123:
2121:
2119:
2105:
2099:
2098:
2096:
2094:
2079:
2070:
2069:
2067:
2065:
2050:
2044:
2043:
2041:
2039:
2024:
2018:
2017:
2015:
2013:
1999:
1993:
1992:
1990:
1988:
1973:
1967:
1966:
1964:
1962:
1947:
1941:
1940:
1938:
1936:
1922:
1916:
1915:
1904:
1898:
1897:
1895:
1893:
1883:
1877:
1876:
1874:
1872:
1858:
1852:
1851:
1849:
1847:
1833:
1827:
1826:
1824:
1822:
1807:
1801:
1800:
1794:
1786:
1784:
1782:
1771:
1765:
1764:
1762:
1760:
1745:
1739:
1738:
1726:
1720:
1719:
1717:
1715:
1700:
1694:
1693:
1691:
1689:
1674:
1668:
1667:
1665:
1663:
1649:
1643:
1642:
1640:
1638:
1624:
1618:
1617:
1615:
1613:
1598:
1592:
1591:
1589:
1587:
1572:
1566:
1565:
1563:
1561:
1546:
1540:
1539:
1537:
1535:
1521:
1512:
1511:
1509:
1507:
1498:. Archived from
1488:
1482:
1481:
1479:
1477:
1463:
1457:
1456:
1454:
1452:
1438:
1432:
1431:
1420:
1414:
1413:
1411:
1409:
1404:on June 12, 2008
1400:. Archived from
1389:
1383:
1382:
1380:
1378:
1369:. Archived from
1359:
1353:
1352:
1350:
1348:
1329:
1323:
1322:
1320:
1318:
1313:on June 14, 2008
1309:. Archived from
1298:
1292:
1280:
1274:
1268:
1262:
1256:
1250:
1238:
1232:
1220:
1214:
1213:
1201:
1195:
1183:
1177:
1164:
1158:
1157:
1150:
1144:
1143:
1141:
1139:
1134:. April 20, 2012
1124:
1118:
1112:
1106:
1105:
1103:
1101:
1096:. (fee required)
1085:
1076:
1075:
1064:
1058:
1057:
1055:
1053:
1043:
1035:
1018:
1017:
1006:
747:Tessian Limited
730:
682:legal requests.
575:Moving into the
565:Verizon Business
537:email encryption
488:machine learning
442:Series A funding
386:Proofpoint, Inc.
371:
366:
363:
361:
329:
328:
322:
312:
311:
305:
296:
294:
293:
277:
275:
274:
265:Operating income
257:
251:
250:
222:Email encryption
101:
99:
94:
47:
38:
31:
29:Proofpoint, Inc.
2790:
2789:
2785:
2784:
2783:
2781:
2780:
2779:
2705:
2704:
2691:
2690:
2687:
2682:
2681:
2671:
2669:
2661:
2660:
2656:
2646:
2644:
2636:
2635:
2631:
2621:
2619:
2611:
2610:
2606:
2593:
2592:
2585:
2580:. July 6, 2023.
2572:
2571:
2564:
2550:
2549:
2545:
2532:
2531:
2527:
2514:
2513:
2509:
2502:451research.com
2496:
2495:
2491:
2486:. May 20, 2014.
2478:
2477:
2473:
2463:
2461:
2458:BizJournals.com
2453:
2449:
2448:
2444:
2431:
2430:
2426:
2413:
2412:
2408:
2395:
2394:
2390:
2380:
2378:
2375:BizJournals.com
2370:
2366:
2365:
2361:
2348:
2347:
2343:
2330:
2329:
2325:
2315:
2313:
2302:
2301:
2297:
2283:
2282:
2278:
2269:
2268:
2264:
2254:
2252:
2243:
2242:
2238:
2228:
2226:
2217:
2216:
2212:
2202:
2200:
2191:
2190:
2186:
2176:
2174:
2165:
2164:
2160:
2150:
2149:
2145:
2132:
2131:
2127:
2117:
2115:
2107:
2106:
2102:
2092:
2090:
2081:
2080:
2073:
2063:
2061:
2052:
2051:
2047:
2037:
2035:
2034:(Press release)
2026:
2025:
2021:
2011:
2009:
2001:
2000:
1996:
1986:
1984:
1975:
1974:
1970:
1960:
1958:
1949:
1948:
1944:
1934:
1932:
1924:
1923:
1919:
1906:
1905:
1901:
1891:
1889:
1885:
1884:
1880:
1870:
1868:
1860:
1859:
1855:
1845:
1843:
1835:
1834:
1830:
1820:
1818:
1809:
1808:
1804:
1787:
1780:
1778:
1773:
1772:
1768:
1758:
1756:
1755:. June 15, 2016
1747:
1746:
1742:
1728:
1727:
1723:
1713:
1711:
1702:
1701:
1697:
1687:
1685:
1676:
1675:
1671:
1661:
1659:
1651:
1650:
1646:
1636:
1634:
1626:
1625:
1621:
1611:
1609:
1600:
1599:
1595:
1585:
1583:
1574:
1573:
1569:
1559:
1557:
1548:
1547:
1543:
1533:
1531:
1523:
1522:
1515:
1505:
1503:
1490:
1489:
1485:
1475:
1473:
1465:
1464:
1460:
1450:
1448:
1440:
1439:
1435:
1422:
1421:
1417:
1407:
1405:
1391:
1390:
1386:
1376:
1374:
1373:on May 20, 2011
1361:
1360:
1356:
1346:
1344:
1331:
1330:
1326:
1316:
1314:
1300:
1299:
1295:
1290:Wayback Machine
1281:
1277:
1269:
1265:
1257:
1253:
1248:Wayback Machine
1239:
1235:
1230:Wayback Machine
1221:
1217:
1203:
1202:
1198:
1193:Wayback Machine
1184:
1180:
1174:Wayback Machine
1165:
1161:
1152:
1151:
1147:
1137:
1135:
1126:
1125:
1121:
1113:
1109:
1099:
1097:
1094:BizJournals.com
1087:
1086:
1079:
1066:
1065:
1061:
1051:
1049:
1041:
1037:
1036:
1021:
1008:
1007:
1003:
998:
970:August 1, 2008
842:$ 110M in Cash
772:Dathena Science
728:
688:
675:
643:
634:email archiving
618:
586:
573:
545:
484:
482:Product history
430:
425:
410:email archiving
358:
347:
318:
301:
289:
286:
270:
267:
252:
236:
232:
228:
226:Email archiving
224:
220:
216:
214:Email filtering
212:
202:
200:
196:
134:
127:
123:
97:
95:
92:
69:
50:
24:
17:
12:
11:
5:
2788:
2786:
2778:
2777:
2772:
2767:
2762:
2757:
2752:
2747:
2742:
2737:
2732:
2727:
2722:
2717:
2707:
2706:
2703:
2702:
2686:
2685:External links
2683:
2680:
2679:
2654:
2629:
2604:
2583:
2562:
2543:
2525:
2507:
2489:
2471:
2442:
2424:
2406:
2388:
2359:
2341:
2323:
2295:
2276:
2262:
2236:
2223:Proofpoint.com
2210:
2184:
2158:
2143:
2140:. May 8, 2019.
2125:
2100:
2087:Proofpoint.com
2071:
2045:
2019:
1994:
1968:
1942:
1917:
1899:
1878:
1853:
1828:
1815:Proofpoint.com
1802:
1766:
1740:
1721:
1695:
1669:
1644:
1619:
1608:. June 5, 2013
1593:
1567:
1541:
1513:
1483:
1471:SearchSecurity
1458:
1446:SearchSecurity
1433:
1415:
1384:
1367:EarthTimes.org
1354:
1343:on May 9, 2008
1324:
1293:
1275:
1263:
1251:
1233:
1215:
1196:
1178:
1159:
1145:
1119:
1107:
1077:
1059:
1046:Proofpoint.com
1019:
1000:
999:
997:
994:
991:
990:
987:
982:
981:June 24, 2008
978:
977:
974:
971:
967:
966:
963:
960:
956:
955:
952:
949:
945:
944:
941:
938:
934:
933:
932:$ 25M in Cash
930:
927:
923:
922:
919:
917:Sendmail, Inc.
914:
910:
909:
908:$ 24M in Cash
906:
903:
899:
898:
897:$ 35M in Cash
895:
892:
888:
887:
884:
881:
877:
876:
873:
870:
866:
865:
862:
859:
858:Aug. 24, 2016
855:
854:
851:
848:
844:
843:
840:
837:
833:
832:
829:
826:
822:
821:
818:
815:
811:
810:
807:
806:Meta Networks
804:
800:
799:
796:
793:
789:
788:
785:
782:
778:
777:
774:
769:
765:
764:
761:
756:
755:December 2022
752:
751:
748:
745:
744:November 2023
741:
740:
737:
734:
727:
724:
692:cybercriminals
687:
684:
674:
671:
667:Wi-Fi networks
642:
639:
617:
616:Email security
614:
606:mobile devices
585:
582:
572:
569:
544:
541:
517:Sarbanes–Oxley
483:
480:
429:
426:
424:
421:
398:email security
392:that provides
373:
372:
356:
352:
351:
348:
345:
342:
341:
336:
332:
331:
323:
315:
314:
306:
298:
297:
287:
282:
279:
278:
268:
263:
260:
259:
245:
241:
240:
209:
205:
204:
197:
194:
191:
190:
187:United Kingdom
135:
132:
129:
128:
125:
119:
117:
113:
112:
107:
103:
102:
89:
85:
84:
81:
77:
76:
70:
65:
62:
61:
56:
52:
51:
48:
40:
39:
15:
13:
10:
9:
6:
4:
3:
2:
2787:
2776:
2773:
2771:
2768:
2766:
2763:
2761:
2758:
2756:
2753:
2751:
2748:
2746:
2743:
2741:
2738:
2736:
2733:
2731:
2728:
2726:
2723:
2721:
2718:
2716:
2713:
2712:
2710:
2700:
2694:
2689:
2688:
2684:
2668:
2664:
2658:
2655:
2643:
2639:
2633:
2630:
2618:
2614:
2608:
2605:
2600:
2596:
2590:
2588:
2584:
2579:
2578:Bloomberg.com
2575:
2569:
2567:
2563:
2558:
2554:
2547:
2544:
2539:
2535:
2529:
2526:
2521:
2517:
2511:
2508:
2503:
2499:
2493:
2490:
2485:
2481:
2475:
2472:
2459:
2452:
2446:
2443:
2438:
2434:
2428:
2425:
2420:
2416:
2410:
2407:
2402:
2398:
2392:
2389:
2376:
2369:
2363:
2360:
2355:
2351:
2345:
2342:
2337:
2333:
2327:
2324:
2312:
2311:
2306:
2299:
2296:
2291:
2287:
2280:
2277:
2272:
2266:
2263:
2251:
2247:
2240:
2237:
2224:
2220:
2214:
2211:
2199:
2195:
2188:
2185:
2173:
2169:
2162:
2159:
2154:
2147:
2144:
2139:
2135:
2129:
2126:
2114:
2113:Meta Networks
2110:
2104:
2101:
2088:
2084:
2078:
2076:
2072:
2060:. May 8, 2020
2059:
2055:
2049:
2046:
2033:
2029:
2023:
2020:
2008:
2007:GlobeNewswire
2004:
1998:
1995:
1982:
1978:
1972:
1969:
1957:
1953:
1946:
1943:
1931:
1927:
1921:
1918:
1913:
1909:
1903:
1900:
1888:
1882:
1879:
1867:
1866:Mediapost.com
1863:
1857:
1854:
1842:
1841:Forrester.com
1838:
1832:
1829:
1816:
1812:
1806:
1803:
1798:
1792:
1776:
1770:
1767:
1754:
1750:
1744:
1741:
1736:
1735:Network World
1732:
1725:
1722:
1709:
1705:
1699:
1696:
1683:
1679:
1673:
1670:
1657:
1654:
1648:
1645:
1633:
1629:
1623:
1620:
1607:
1603:
1597:
1594:
1581:
1577:
1571:
1568:
1555:
1551:
1545:
1542:
1530:
1529:Forrester.com
1526:
1520:
1518:
1514:
1501:
1497:
1493:
1487:
1484:
1472:
1468:
1462:
1459:
1447:
1443:
1437:
1434:
1429:
1425:
1419:
1416:
1403:
1399:
1398:Network World
1395:
1388:
1385:
1372:
1368:
1364:
1358:
1355:
1342:
1338:
1337:ByteandSwitch
1334:
1328:
1325:
1312:
1308:
1307:Network World
1304:
1297:
1294:
1291:
1287:
1284:
1279:
1276:
1272:
1267:
1264:
1260:
1255:
1252:
1249:
1245:
1242:
1237:
1234:
1231:
1227:
1224:
1219:
1216:
1211:
1207:
1200:
1197:
1194:
1190:
1187:
1182:
1179:
1175:
1171:
1168:
1163:
1160:
1155:
1149:
1146:
1133:
1129:
1123:
1120:
1116:
1111:
1108:
1095:
1091:
1084:
1082:
1078:
1073:
1072:GlobeNewswire
1069:
1063:
1060:
1047:
1040:
1034:
1032:
1030:
1028:
1026:
1024:
1020:
1015:
1011:
1005:
1002:
995:
988:
986:
983:
980:
979:
975:
972:
969:
968:
964:
962:Everyone.net
961:
959:Oct 31, 2009
958:
957:
953:
950:
948:Jan 28, 2012
947:
946:
942:
939:
937:Jul 25, 2013
936:
935:
931:
928:
925:
924:
920:
918:
915:
912:
911:
907:
904:
902:May 20, 2014
901:
900:
896:
893:
891:Oct 23, 2014
890:
889:
885:
882:
879:
878:
874:
871:
868:
867:
863:
860:
857:
856:
852:
849:
847:Oct 20, 2016
846:
845:
841:
838:
835:
834:
830:
827:
825:Nov 29, 2017
824:
823:
819:
816:
813:
812:
808:
805:
802:
801:
797:
794:
791:
790:
786:
783:
780:
779:
775:
773:
770:
768:January 2022
767:
766:
762:
760:
757:
754:
753:
749:
746:
743:
742:
738:
735:
732:
731:
725:
723:
721:
717:
713:
709:
705:
701:
696:
693:
685:
683:
681:
672:
670:
668:
664:
660:
656:
652:
648:
641:Cybersecurity
640:
638:
635:
631:
626:
623:
615:
613:
611:
607:
603:
599:
595:
591:
590:cybersecurity
583:
581:
578:
570:
568:
566:
561:
557:
555:
550:
542:
540:
538:
535:policy-based
532:
530:
526:
522:
518:
512:
508:
505:
500:
498:
493:
489:
481:
475:
471:
469:
464:
462:
457:
455:
451:
447:
443:
439:
435:
427:
422:
420:
418:
413:
411:
407:
403:
399:
395:
391:
387:
379:
370:
365:
357:
353:
349:
343:
340:
337:
333:
324:
321:
316:
307:
304:
299:
288:
285:
280:
269:
266:
261:
256:1.050 billion
255:
246:
242:
239:
235:
231:
227:
223:
219:
218:Email privacy
215:
210:
206:
198:
192:
188:
184:
180:
176:
172:
168:
164:
160:
156:
152:
148:
144:
140:
136:
130:
122:
118:
114:
111:
108:
104:
90:
86:
82:
78:
74:
71:
68:
63:
60:
57:
53:
46:
41:
37:
32:
26:
22:
2672:December 28,
2670:. Retrieved
2666:
2657:
2647:December 28,
2645:. Retrieved
2641:
2632:
2622:December 28,
2620:. Retrieved
2616:
2607:
2598:
2577:
2556:
2546:
2537:
2528:
2519:
2510:
2501:
2492:
2483:
2474:
2462:. Retrieved
2457:
2445:
2436:
2427:
2418:
2409:
2400:
2391:
2379:. Retrieved
2374:
2362:
2353:
2344:
2335:
2326:
2316:September 5,
2314:. Retrieved
2308:
2298:
2289:
2279:
2265:
2253:. Retrieved
2249:
2239:
2229:November 29,
2227:. Retrieved
2222:
2213:
2201:. Retrieved
2197:
2187:
2175:. Retrieved
2171:
2161:
2146:
2137:
2128:
2116:. Retrieved
2112:
2103:
2091:. Retrieved
2086:
2062:. Retrieved
2057:
2048:
2036:. Retrieved
2031:
2022:
2012:December 28,
2010:. Retrieved
1997:
1985:. Retrieved
1980:
1971:
1959:. Retrieved
1955:
1945:
1935:February 22,
1933:. Retrieved
1929:
1920:
1911:
1902:
1890:. Retrieved
1881:
1869:. Retrieved
1865:
1856:
1844:. Retrieved
1840:
1831:
1819:. Retrieved
1814:
1805:
1779:. Retrieved
1769:
1757:. Retrieved
1752:
1743:
1734:
1724:
1712:. Retrieved
1707:
1698:
1686:. Retrieved
1681:
1672:
1660:. Retrieved
1655:
1647:
1635:. Retrieved
1631:
1622:
1610:. Retrieved
1605:
1596:
1584:. Retrieved
1579:
1570:
1558:. Retrieved
1553:
1544:
1532:. Retrieved
1528:
1504:. Retrieved
1500:the original
1495:
1486:
1474:. Retrieved
1470:
1461:
1449:. Retrieved
1445:
1436:
1427:
1418:
1408:September 5,
1406:. Retrieved
1402:the original
1397:
1387:
1375:. Retrieved
1371:the original
1366:
1357:
1345:. Retrieved
1341:the original
1336:
1327:
1317:September 5,
1315:. Retrieved
1311:the original
1306:
1296:
1278:
1266:
1254:
1236:
1218:
1209:
1199:
1181:
1162:
1148:
1136:. Retrieved
1131:
1122:
1110:
1098:. Retrieved
1093:
1062:
1050:. Retrieved
1045:
1013:
1004:
926:Aug 9, 2013
913:Oct 1, 2013
880:Mar 2, 2015
869:Nov 4, 2015
861:Return Path
836:Nov 7, 2017
814:Feb 6, 2018
803:May 6, 2019
726:Acquisitions
704:social media
698:In the 2016
697:
689:
686:Digital risk
676:
665:, and rogue
647:cyberattacks
644:
627:
619:
602:social media
587:
574:
562:
558:
546:
533:
513:
509:
501:
485:
465:
458:
454:RRE Ventures
431:
414:
385:
384:
350:3,658 (2020)
320:Total equity
303:Total assets
116:Headquarters
55:Company type
25:
2255:November 7,
2177:February 6,
2093:November 6,
1987:October 30,
1961:October 30,
1817:. June 2016
1714:November 9,
1688:November 9,
1662:November 9,
1637:November 9,
1612:November 9,
1586:November 9,
1560:November 9,
905:NetCitadel
872:Socialware
850:FireLayers
831:$ 60M Cash
828:Weblife.io
795:ObserveIT
680:e-discovery
663:mobile apps
468:Thoma Bravo
417:Thoma Bravo
362:.proofpoint
339:Thoma Bravo
179:Netherlands
75:: PFPT
2709:Categories
2250:TechCrunch
2038:January 9,
2032:Proofpoint
1981:Proofpoint
1554:Proofpoint
1052:August 31,
1014:Proofpoint
996:References
839:Cloudmark
659:encryption
608:, and the
594:compliance
492:spam email
284:Net income
195:Key people
2730:Anti-spam
2290:Israel21c
1930:Owler.com
1892:March 24,
1871:March 24,
1846:March 24,
1821:March 24,
1791:cite news
1781:March 24,
1759:March 24,
1534:March 14,
1506:March 24,
1476:March 24,
1451:March 24,
1428:EBizQ.net
1100:August 3,
951:NextPage
781:May 2020
700:Forrester
434:Eric Hahn
167:Singapore
139:Australia
110:Eric Hahn
67:Traded as
2484:SC Media
2437:SC Media
2203:March 1,
1912:SC Media
1286:Archived
1244:Archived
1226:Archived
1189:Archived
1170:Archived
1138:July 14,
894:Nexgate
736:Company
720:dark web
584:Products
208:Products
80:Industry
2520:WSJ.com
2464:June 9,
2401:WSJ.com
2381:June 9,
2354:WSJ.com
2118:June 1,
1956:Tessian
1377:June 6,
1347:June 6,
985:Fortiva
655:malware
630:Fortiva
428:Company
423:History
355:Website
244:Revenue
151:Germany
106:Founder
96: (
88:Founded
59:Private
2064:May 8,
739:Terms
718:, and
712:mobile
708:social
523:, and
408:, and
258:(2020)
177:, The
175:Sweden
155:Israel
147:France
143:Canada
73:Nasdaq
2667:Mergr
2642:Mergr
2617:Mergr
2454:(PDF)
2419:eWEEK
2371:(PDF)
1042:(PDF)
733:Date
610:cloud
598:email
521:HIPAA
504:HIPAA
335:Owner
171:Spain
163:Japan
159:Italy
2674:2022
2649:2022
2624:2022
2466:2019
2383:2019
2318:2019
2257:2017
2231:2017
2205:2018
2179:2018
2120:2019
2095:2019
2066:2020
2040:2024
2014:2022
1989:2023
1963:2023
1937:2018
1894:2017
1873:2017
1848:2017
1823:2017
1797:link
1783:2017
1761:2017
1716:2023
1690:2023
1664:2023
1639:2023
1614:2023
1588:2020
1562:2020
1536:2017
1508:2017
1478:2017
1453:2017
1410:2019
1379:2008
1349:2008
1319:2019
1140:2012
1102:2020
1054:2021
622:SaaS
497:spam
448:and
364:.com
254:US$
126:U.S.
98:2002
91:2002
2557:CRN
716:web
360:www
2711::
2665:.
2640:.
2615:.
2597:.
2586:^
2576:.
2565:^
2555:.
2536:.
2518:.
2500:.
2482:.
2456:.
2435:.
2417:.
2399:.
2373:.
2352:.
2334:.
2307:.
2288:.
2248:.
2221:.
2196:.
2170:.
2136:.
2111:.
2085:.
2074:^
2056:.
2030:.
1979:.
1954:.
1928:.
1910:.
1864:.
1839:.
1813:.
1793:}}
1789:{{
1751:.
1733:.
1706:.
1680:.
1630:.
1604:.
1578:.
1552:.
1527:.
1516:^
1494:.
1469:.
1444:.
1426:.
1396:.
1365:.
1335:.
1305:.
1208:.
1130:.
1092:.
1080:^
1044:.
1022:^
1012:.
714:,
710:,
669:.
612:.
604:,
600:,
556:.
519:,
470:.
412:.
404:,
185:,
181:,
173:,
169:,
165:,
161:,
157:,
153:,
149:,
145:,
141:,
124:,
2676:.
2651:.
2626:.
2601:.
2559:.
2504:.
2468:.
2385:.
2338:.
2320:.
2292:.
2259:.
2233:.
2207:.
2181:.
2155:.
2122:.
2097:.
2068:.
2042:.
2016:.
1991:.
1965:.
1939:.
1896:.
1875:.
1850:.
1825:.
1799:)
1785:.
1763:.
1737:.
1718:.
1692:.
1666:.
1641:.
1616:.
1590:.
1564:.
1538:.
1510:.
1480:.
1455:.
1412:.
1381:.
1351:.
1321:.
1212:.
1176:.
1142:.
1117:.
1104:.
1056:.
100:)
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.