Knowledge

Proofpoint, Inc.

Source đź“ť

474: 45: 2699: 369: 2331: 567:, announced in April 2007, that it had certified six anti-spam products under their new testing program, one of which was the Proofpoint Messaging Security Gateway. The goal of ICSA Labs' anti-spam product testing and certification is to evaluate product effectiveness in detecting and removing spam. The guidelines also address how well the products recognize e-mail messages from legitimate sources. 378: 36: 722:) channels to detect, prevent, malicious or unwanted content from undermining organizational efforts to build brand across all major social media platforms. On October 23, 2014 Proofpoint acquired Nexgate, Inc., a social media and security compliance vendor. On November 4, 2015 Proofpoint acquired Socialware Inc., a compliance workflow & content capture and review technology company. 327: 310: 292: 273: 249: 534:
Proofpoint introduced a new product, the Network Content Sentry, as an add-on appliance to the Content Security Suite in August 2005. Designed to monitor online messaging other than email, the appliance monitors Web mail, message boards, blogs and FTP-based communications. Proofpoint also introduced
510:
In March 2004, Proofpoint introduced its first hardware appliance, the P-Series Message Protection Appliance (later renamed Proofpoint Messaging Security Gateway), using a hardened Linux kernel and Proofpoint's Protection Server 2.0 software. It was tested by Infoworld and found to stop 94% of spam.
579:
business, Proofpoint introduced Proofpoint on Demand, a hosted version of its email security and data loss prevention offerings. In May, 2008, the company's hosted offerings were expanded with the introduction of Proofpoint on Demand—Standard Edition. The product is targeted at small-to-medium size
636:
software for legal discovery, regulatory compliance and email storage management. Fortiva used Exchange journaling to automatically archive all internal and external communications so that end users can search all archived messages, including attachments, directly from a search folder in Outlook.
624:
aimed at different facets of email security. Its flagship product the Proofpoint Messaging Security Gateway. The Messaging Security Gateway is a web-based application that offers spam protection; based on both user defined rules as well as dynamically updated definitions, anti-virus scanning, and
514:
Another product introduction in November 2004 included Protection Server 3.0, with Email Firewall and MLX-based Dynamic Reputation Analysis, and the Content Security Suite, plug-in modules designed for scanning outbound messages and their attachments to assist in compliance with data protection
694:
from impersonating their brand to harm customers, partners, and the brand's reputation. Its email digital risk portfolio includes authentication technology to prevent email domain spoofing. On social media, it stops scams in which fraudsters create fake customer-service accounts to find people
559:
Proofpoint Messaging Security Gateway V5.0 was released in June 2007, and was based on a new, integrated architecture, combining all its capabilities into a single platform. It could be run either as a dedicated appliance, virtual appliance, or software suite.
661:, data-loss prevention and forensics-gathering tools are designed to speed incident response and mitigate the damage and costs of any threats that do get through. The portfolio also includes protection from social-media account takeovers, harmful 551:
on a host running VMware's virtual server software. Moving a dedicated hardware appliance to a virtual server eliminates problems associated with proprietary hardware and reduces upgrade costs, though it does require knowledge of VMware's
657:. It uses a blend of sandbox analysis, reputational analysis, automated threat data, human threat intelligence and attributes such as sender/recipient relationship, headers, and content, and more to detect potential threats. Automated 677:
Proofpoint's compliance products are designed to reduce the manual labor involved in identifying potentially sensitive data, managing and supervising it in compliance with government and industry rules, and producing it quickly in
625:
configurable email firewall rules. The spam-protection service, however, results in many false positives of legitimate email servers and blocks IPs. A webform is provided to request an IP be unblocked, but they are non-responsive.
506:
regulations governing financial disclosures and the privacy of health care data prompted Proofpoint to begin developing new products that would automatically identify and intercept outbound email containing sensitive information.
2083:"Proofpoint Enters into Definitive Agreement to Acquire ObserveIT for $ 225 Million in Cash; Extending Leadership in People-Centric Security and Compliance to Deliver Post-Perimeter Data Loss Prevention | Proofpoint US" 494:
using 10,000 different attributes to differentiate between spam and valid email. The company joined dozens of other anti-spam software providers in a business opportunity fueled by an exponential increase in
1774: 2759: 1491: 499:
volume that was threatening worker productivity, making spam a top business priority. According to the 2004 National Technology Readinesed the number of spam detection attributes to more than 50,000.
695:
seeking help over social media and trick them into handing over account credentials or visiting a malicious website. And in mobile, it finds counterfeit apps distributed through mobile app stores.
1362: 527:. In combination, this was known as the Proofpoint Messaging Security Gateway Appliance. It was reviewed by ChannelWeb, which observed that it used a "combination of technologies: 486:
The company's first product was the Proofpoint Protection Server (PPS) for medium and large businesses. It incorporated what was described as "MLX Technology", proprietary
2754: 2002: 2734: 2769: 2739: 2764: 2027: 1393: 1153: 2218: 2082: 1810: 2749: 2219:"Proofpoint Enters into Definitive Agreement to Acquire Weblife for $ 60 million; Extends Protection Capabilities to Enterprise Users' Web-based Personal Email" 547:
In a step towards simpler operational requirements, the Proofpoint Messaging Security Gateway Virtual Edition was released in April 2007. The product runs as a
1169: 1499: 1067: 2714: 2245: 2193: 463:(IPO), the company's shares traded at $ 13 apiece; investors purchased more than 6.3 million shares through the IPO, raising more than $ 80 million. 2270: 2167: 1302: 1370: 473: 2724: 2719: 2304: 1976: 2552: 2450: 1925: 1677: 1243: 1225: 1188: 2367: 264: 1332: 1836: 1524: 1441: 1038: 524: 1811:"Proofpoint Announces Intelligent Supervision and Compliance Gateway to Help Customers with FINRA and SEC Audits | Proofpoint" 2774: 189:, United States (California, Colorado, Indiana, Massachusetts, New York, North Carolina, Pennsylvania, Texas, Utah, Virginia) 2479: 2432: 1466: 477:
Proofpoint Co-Founder & Chairman Eric Hahn with then CEO Gary Steele at Proofpoint's 15 year anniversary celebration.
1796: 237: 2309: 1401: 1907: 2414: 1748: 706:
product was included in an evaluation of the nine top vendors in this emerging market. These monitor "digital" (i.e.
2573: 1627: 1258: 1166: 2744: 2533: 1285: 444:
round, releasing its first product, and lining up six customers as references, and was backed by venture investors
2152: 1127: 2497: 2053: 1270: 650: 1730: 1652: 2285: 1951: 20: 1575: 1886: 528: 460: 44: 58: 1114: 2134:"Proofpoint acquires Meta Networks to strengthen its cloud-based architecture and its security platform" 593: 576: 393: 389: 120: 2133: 1310: 2594: 1703: 1089: 771: 466:
On April 26, 2021, Proofpoint announced that it had agreed to be acquired by the private equity firm
405: 401: 253: 233: 229: 182: 580:
businesses that need email security but do not run their own servers or have on-site IT personnel.
449: 516: 2729: 1790: 699: 2637: 1205: 758: 445: 1240: 1222: 1185: 564: 536: 487: 441: 319: 221: 1549: 1363:"Earth Times: show/icsa-labs-introduces-formal-testing-of-anti-spam-products,345941.shtml" 1340: 1289: 1247: 1229: 1192: 1173: 691: 633: 609: 548: 409: 225: 213: 2515: 2396: 2349: 1241:
BorderWare and Proofpoint boxes are both capable spam combatants, Infoworld, May 28, 2004
1009: 2698: 1861: 368: 1952:"Evolution of AI-Powered Email Defense: Proofpoint Announces Intent to Acquire Tessian" 916: 649:(delivered via malicious attachments and URLs) and socially engineered attacks—such as 596:, and brand-impostor fraud (which it calls "digital risk"). These products work across 397: 186: 2708: 2612: 2006: 1071: 605: 589: 539:
features, using identity-based encryption technology licensed from Voltage Security.
217: 66: 711: 707: 703: 601: 453: 2534:"Proofpoint to Acquire Armorize Technologies for $ 25 Million - SecurityWeek.Com" 2662: 679: 646: 467: 416: 377: 338: 178: 35: 2194:"Proofpoint completes Wombat acquisition, aims to increase revenue by millions" 1601: 2246:"Proofpoint acquires Cloudmark for $ 110M in cybersecurity consolidation play" 662: 658: 496: 491: 459:
Proofpoint became a publicly traded company in April 2012. At the time of its
283: 2168:"Wombat Security acquired for $ 225M by Silicon Valley cybersecurity company" 1678:"No response from proofpoint after ip addresss is blocked without any reason" 1167:
Fighting Spam, Fueling Growth, InformationWeek Research's Outlook 2004 Survey
645:
Proofpoint's security portfolio includes products that stop both traditional
1283:
CRN Test Center Review: A Virtual Solution To Spam, ChannelWeb, Apr 23, 2007
588:
Proofpoint products are designed to solve three business problems: advanced
433: 166: 138: 109: 1977:"Proofpoint Signs Definitive Agreement to Acquire Tessian | Proofpoint US" 1492:"Proofpoint releases Proofpoint Intelligent Supervision | Compliance Week" 690:
Proofpoint's digital risk products are aimed at companies seeking to stop
1223:
IronPort, Proofpoint appliances target spam, NetworkWorld, March 15, 2004
719: 437: 1282: 702:
Wave for Digital Risk Monitoring, Q3 2016 the Proofpoint digital risk /
2574:"Abaca Technology Corporation: Private Company Information - Bloomberg" 984: 715: 654: 629: 452:. An additional $ 9 million in Series B funding led by New York-based 150: 1423: 2305:"Proofpoint Battens Against Spoofers, Phishers With $ 18 Million Buy" 553: 174: 154: 146: 142: 72: 666: 597: 520: 503: 472: 376: 302: 170: 162: 158: 1862:"Social Media Phishing Soars, New Trend Is Fake Customer Service" 2108: 1115:
Proofpoint adds funding, San Jose Business Journal, Oct 14, 2003
621: 2692: 2553:"Proofpoint Seals $ 25 Million Deal For Armorize Technologies" 1186:
Proofpoint improves spam prevention, Nov 3, 2003, NetworkWorld
359: 2054:"Proofpoint's (PFPT) Q1 Earnings Top Estimates, View Slashed" 531:, a spam-filtering engine and adaptive learning technology." 1777:. June 16, 2016. Archived from the original on June 18, 2016 490:
algorithms applied to the problem of accurately identifying
2003:"Proofpoint Signs Definitive Agreement to Acquire Illusive" 2028:"Proofpoint Signs Definitive Agreement to Acquire Dathena" 2271:"Proofpoint acquires Israeli Firelayers for $ 55 million" 1083: 1081: 440:. It launched July 21, 2003, after raising a $ 7 million 388:
is an American enterprise cybersecurity company based in
1749:"FBI: Email Scams Take $ 3.1 Billion Toll on Businesses" 415:
In 2021, Proofpoint was acquired by private equity firm
49:
Proofpoint Headquarters located in Sunnyvale California.
2415:"Proofpoint Acquires Emerging Threats for $ 40 Million" 2760:
Software companies based in the San Francisco Bay Area
2350:"Cybersecurity Company Proofpoint Acquires Socialware" 2286:"Proofpoint pays $ 55 million for Israel's FireLayers" 1837:"The Forrester Wave: Digital Risk Monitoring, Q3 2016" 1525:"The Forrester Wave: Digital Risk Monitoring, Q3 2016" 2589: 2587: 2153:"Proofpoint Acquires Meta Networks for Nearly $ 120m" 1424:"Proofpoint Offers On Demand Email Security for SMBs" 1926:"nexgate-blog-proofpoint-acquires-socialware--expan" 1442:"Proofpoint Enterprise Protection: Product overview" 354: 344: 334: 317: 300: 281: 262: 243: 207: 193: 131: 115: 105: 87: 79: 64: 54: 2397:"Proofpoint to Acquire Emerging Threats for $ 40M" 1259:"ProofPoint Appliance Stands Guard At E-Mail Gate" 2077: 2075: 1154:"Proofpoint Agreed To Be Acquired By Thoma Bravo" 1068:"Thoma Bravo Completes Acquisition of Proofpoint" 2568: 2566: 2516:"Proofpoint Acquires Sendmail for $ 23M in Cash" 628:Additionally, in June 2008, Proofpoint acquired 1467:"Proofpoint Email Encryption: Product overview" 1271:"Proofpoint, Voltage Team on E-Mail Encryption" 2480:"Proofpoint acquires NetCitadel in $ 24M deal" 2433:"Proofpoint acquires Nexgate for $ 35 million" 1908:"Proofpoint acquires Nexgate for $ 35 million" 1394:"Proofpoint jumps into security services fray" 653:(BEC) and credential phishing—that do not use 1753:Threatpost | The first stop for security news 1033: 1031: 1029: 1027: 1025: 1023: 8: 28: 2638:"Proofpoint Acquires Secure Data In Motion" 2697: 367: 43: 34: 27: 2755:Networking companies of the United States 2595:"California company buys Utah's NextPage" 2109:"Software-Defined Perimeter in the Cloud" 2735:Companies based in Sunnyvale, California 2368:"Proofpoint acquires Texas social group" 1128:"Proofpoint and Infoblox Rise on Debuts" 864:$ 18M - Email Fraud Protection division 729: 432:The company was founded in July 2002 by 2770:Software companies of the United States 2740:Companies formerly listed on the Nasdaq 1001: 2765:Software companies established in 2002 2284:Press, Viva Sarah (October 25, 2016). 1887:"Mobile Devices: What Could Go Wrong?" 1788: 563:ICSA Labs, an independent division of 2551:Westervelt, Robert (August 9, 2013). 2166:Stacey, Federoff (February 6, 2018). 1519: 1517: 1039:"Proofpoint, Inc. 2020 Annual Report" 7: 2750:Computer security software companies 2451:"Proofpoint gets into social media" 2303:Gatlin, Allison (August 25, 2016). 2613:"Proofpoint Acquires Everyone.net" 1729:McMillan, Robert (June 24, 2008). 1628:"IP Address blocked by Proofpoint" 1392:Garretson, Cara (August 7, 2007). 1090:"Proofpoint Joins Anti-Spam Crowd" 817:Wombat Security Technologies, Inc 14: 2715:2002 establishments in California 1303:"When appliances get out of hand" 1950:Sadler, Tim (October 30, 2023). 1653:"ProofPoint won't unblock me..." 1333:"Proofpoint Intros Proofpoint 5" 809:$ 120 million in cash and stock 632:, Inc., a provider of on-demand 456:was announced in October, 2003. 326: 325: 309: 308: 291: 290: 272: 271: 248: 247: 1682:reddit.com proofpoint subreddit 1301:Dubie, Denise (April 4, 2007). 1261:, ChannelWeb, November 26, 2004 1632:linode.com community questions 1339:. June 4, 2007. Archived from 620:Proofpoint offers software or 16:American cybersecurity company 1: 2725:2021 mergers and acquisitions 2720:2012 initial public offerings 2663:"Proofpoint Acquires Fortiva" 2192:Bunny, Lian (March 1, 2018). 1731:"Proofpoint acquires Fortiva" 1656:reddit.com sysadmin subreddit 1088:Lacy, Sarah (July 20, 2003). 940:Abaca Technology Corporation 543:Virtual appliance development 238:Data loss prevention software 2151:Zurkus, Kacy (May 7, 2019). 1704:"Proofpoint - IP is blocked" 1602:"Proofpoint blocking emails" 1273:, eweek.com, August 1, 2005. 381:Proofpoint office in Toronto 1576:"Proofpoint Spam Detection" 554:virtual server architecture 400:, identity threat defense, 295:–US$ 163.809 million (2020) 93:; 22 years ago 2791: 1708:discourse.mailinabox.email 921:$ 23M (terms undisclosed) 886:$ 40M in Cash & Stock 853:$ 55M in Cash & Stock 330:US$ 441.744 million (2020) 276:–US$ 95.196 million (2020) 18: 2332:"451 Research User Login" 2310:Investor's Business Daily 2198:Pittsburgh Business Times 2172:Pittsburgh Business Times 1795:: CS1 maint: unfit URL ( 1580:proofpoint Spam Detection 1172:December 8, 2009, at the 875:$ 9M (terms undisclosed) 651:business email compromise 42: 33: 1775:"Wiping out email fraud" 313:US$ 2.498 billion (2020) 21:Proofpoint Systems, Inc. 19:Not to be confused with 529:policy-based management 461:initial public offering 438:Netscape Communications 211:Identity threat defense 1246:June 16, 2008, at the 973:Secure Data In Motion 929:Armorize Technologies 820:$ 225M Cash and stock 798:$ 225 million in cash 787:Less than $ 5 million 478: 436:, formerly the CTO of 382: 2775:Thoma Bravo companies 2599:The Salt Lake Tribune 1606:discussions.apple.com 1288:June 7, 2008, at the 1228:May 31, 2008, at the 1210:MIT Technology Review 1191:May 31, 2008, at the 673:Regulatory compliance 577:software-as-a-service 571:Software as a service 476: 394:software as a service 390:Sunnyvale, California 380: 201:Marcel DePaolis (CTO) 121:Sunnyvale, California 1430:. November 17, 2015. 1204:Review, Technology. 592:threats, regulatory 515:regulations such as 502:In 2004, strict new 419:for $ 12.3 billion. 406:electronic discovery 402:data loss prevention 234:Electronic discovery 230:Anti-spam techniques 183:United Arab Emirates 137:Offices worldwide: 2439:. October 24, 2014. 2356:. November 4, 2015. 2336:sso.451research.com 2273:. October 21, 2016. 2225:. November 29, 2017 1914:. October 24, 2014. 1684:. February 18, 2022 1048:. December 31, 2020 784:The Defence Works 450:Stanford University 346:Number of employees 133:Number of locations 30: 2522:. October 2, 2013. 2460:. October 23, 2014 2377:. November 4, 2015 2089:. November 3, 2019 1983:. October 30, 2023 1658:. December 3, 2018 1556:. October 10, 2019 1550:"Email Protection" 1496:ComplianceWeek.com 1206:"E-Mail Inspector" 1132:The New York Times 1074:. August 31, 2021. 1016:. August 30, 2016. 1010:"Office Locations" 989:Undisclosed Terms 976:Undisclosed Terms 965:Undisclosed Terms 954:Undisclosed Terms 943:Undisclosed Terms 776:Undisclosed Terms 763:Undisclosed Terms 750:Undisclosed Terms 525:Gramm–Leach–Bliley 479: 383: 199:Sumit Dhawan (CEO) 2745:Computer archives 2540:. August 9, 2013. 2138:Help Net Security 2058:Finance.Yahoo.com 2005:(Press release). 1710:. August 22, 2022 1582:. Proofpoint, Inc 1502:on April 23, 2017 1156:. April 26, 2021. 1070:(Press release). 993: 992: 883:Emerging Threats 792:November 3, 2019 759:Illusive Networks 549:virtual appliance 446:Benchmark Capital 396:and products for 375: 374: 203:RĂ©mi Thomas (CFO) 83:Security software 2782: 2701: 2696: 2695: 2693:Official website 2678: 2677: 2675: 2673: 2659: 2653: 2652: 2650: 2648: 2634: 2628: 2627: 2625: 2623: 2609: 2603: 2602: 2591: 2582: 2581: 2570: 2561: 2560: 2548: 2542: 2541: 2538:SecurityWeek.com 2530: 2524: 2523: 2512: 2506: 2505: 2498:"Search Results" 2494: 2488: 2487: 2476: 2470: 2469: 2467: 2465: 2455: 2447: 2441: 2440: 2429: 2423: 2422: 2421:. March 3, 2015. 2411: 2405: 2404: 2403:. March 2, 2015. 2393: 2387: 2386: 2384: 2382: 2372: 2364: 2358: 2357: 2346: 2340: 2339: 2328: 2322: 2321: 2319: 2317: 2300: 2294: 2293: 2281: 2275: 2274: 2267: 2261: 2260: 2258: 2256: 2244:Lunden, Ingrid. 2241: 2235: 2234: 2232: 2230: 2215: 2209: 2208: 2206: 2204: 2189: 2183: 2182: 2180: 2178: 2163: 2157: 2156: 2148: 2142: 2141: 2130: 2124: 2123: 2121: 2119: 2105: 2099: 2098: 2096: 2094: 2079: 2070: 2069: 2067: 2065: 2050: 2044: 2043: 2041: 2039: 2024: 2018: 2017: 2015: 2013: 1999: 1993: 1992: 1990: 1988: 1973: 1967: 1966: 1964: 1962: 1947: 1941: 1940: 1938: 1936: 1922: 1916: 1915: 1904: 1898: 1897: 1895: 1893: 1883: 1877: 1876: 1874: 1872: 1858: 1852: 1851: 1849: 1847: 1833: 1827: 1826: 1824: 1822: 1807: 1801: 1800: 1794: 1786: 1784: 1782: 1771: 1765: 1764: 1762: 1760: 1745: 1739: 1738: 1726: 1720: 1719: 1717: 1715: 1700: 1694: 1693: 1691: 1689: 1674: 1668: 1667: 1665: 1663: 1649: 1643: 1642: 1640: 1638: 1624: 1618: 1617: 1615: 1613: 1598: 1592: 1591: 1589: 1587: 1572: 1566: 1565: 1563: 1561: 1546: 1540: 1539: 1537: 1535: 1521: 1512: 1511: 1509: 1507: 1498:. Archived from 1488: 1482: 1481: 1479: 1477: 1463: 1457: 1456: 1454: 1452: 1438: 1432: 1431: 1420: 1414: 1413: 1411: 1409: 1404:on June 12, 2008 1400:. Archived from 1389: 1383: 1382: 1380: 1378: 1369:. Archived from 1359: 1353: 1352: 1350: 1348: 1329: 1323: 1322: 1320: 1318: 1313:on June 14, 2008 1309:. Archived from 1298: 1292: 1280: 1274: 1268: 1262: 1256: 1250: 1238: 1232: 1220: 1214: 1213: 1201: 1195: 1183: 1177: 1164: 1158: 1157: 1150: 1144: 1143: 1141: 1139: 1134:. April 20, 2012 1124: 1118: 1112: 1106: 1105: 1103: 1101: 1096:. (fee required) 1085: 1076: 1075: 1064: 1058: 1057: 1055: 1053: 1043: 1035: 1018: 1017: 1006: 747:Tessian Limited 730: 682:legal requests. 575:Moving into the 565:Verizon Business 537:email encryption 488:machine learning 442:Series A funding 386:Proofpoint, Inc. 371: 366: 363: 361: 329: 328: 322: 312: 311: 305: 296: 294: 293: 277: 275: 274: 265:Operating income 257: 251: 250: 222:Email encryption 101: 99: 94: 47: 38: 31: 29:Proofpoint, Inc. 2790: 2789: 2785: 2784: 2783: 2781: 2780: 2779: 2705: 2704: 2691: 2690: 2687: 2682: 2681: 2671: 2669: 2661: 2660: 2656: 2646: 2644: 2636: 2635: 2631: 2621: 2619: 2611: 2610: 2606: 2593: 2592: 2585: 2580:. July 6, 2023. 2572: 2571: 2564: 2550: 2549: 2545: 2532: 2531: 2527: 2514: 2513: 2509: 2502:451research.com 2496: 2495: 2491: 2486:. May 20, 2014. 2478: 2477: 2473: 2463: 2461: 2458:BizJournals.com 2453: 2449: 2448: 2444: 2431: 2430: 2426: 2413: 2412: 2408: 2395: 2394: 2390: 2380: 2378: 2375:BizJournals.com 2370: 2366: 2365: 2361: 2348: 2347: 2343: 2330: 2329: 2325: 2315: 2313: 2302: 2301: 2297: 2283: 2282: 2278: 2269: 2268: 2264: 2254: 2252: 2243: 2242: 2238: 2228: 2226: 2217: 2216: 2212: 2202: 2200: 2191: 2190: 2186: 2176: 2174: 2165: 2164: 2160: 2150: 2149: 2145: 2132: 2131: 2127: 2117: 2115: 2107: 2106: 2102: 2092: 2090: 2081: 2080: 2073: 2063: 2061: 2052: 2051: 2047: 2037: 2035: 2034:(Press release) 2026: 2025: 2021: 2011: 2009: 2001: 2000: 1996: 1986: 1984: 1975: 1974: 1970: 1960: 1958: 1949: 1948: 1944: 1934: 1932: 1924: 1923: 1919: 1906: 1905: 1901: 1891: 1889: 1885: 1884: 1880: 1870: 1868: 1860: 1859: 1855: 1845: 1843: 1835: 1834: 1830: 1820: 1818: 1809: 1808: 1804: 1787: 1780: 1778: 1773: 1772: 1768: 1758: 1756: 1755:. June 15, 2016 1747: 1746: 1742: 1728: 1727: 1723: 1713: 1711: 1702: 1701: 1697: 1687: 1685: 1676: 1675: 1671: 1661: 1659: 1651: 1650: 1646: 1636: 1634: 1626: 1625: 1621: 1611: 1609: 1600: 1599: 1595: 1585: 1583: 1574: 1573: 1569: 1559: 1557: 1548: 1547: 1543: 1533: 1531: 1523: 1522: 1515: 1505: 1503: 1490: 1489: 1485: 1475: 1473: 1465: 1464: 1460: 1450: 1448: 1440: 1439: 1435: 1422: 1421: 1417: 1407: 1405: 1391: 1390: 1386: 1376: 1374: 1373:on May 20, 2011 1361: 1360: 1356: 1346: 1344: 1331: 1330: 1326: 1316: 1314: 1300: 1299: 1295: 1290:Wayback Machine 1281: 1277: 1269: 1265: 1257: 1253: 1248:Wayback Machine 1239: 1235: 1230:Wayback Machine 1221: 1217: 1203: 1202: 1198: 1193:Wayback Machine 1184: 1180: 1174:Wayback Machine 1165: 1161: 1152: 1151: 1147: 1137: 1135: 1126: 1125: 1121: 1113: 1109: 1099: 1097: 1094:BizJournals.com 1087: 1086: 1079: 1066: 1065: 1061: 1051: 1049: 1041: 1037: 1036: 1021: 1008: 1007: 1003: 998: 970:August 1, 2008 842:$ 110M in Cash 772:Dathena Science 728: 688: 675: 643: 634:email archiving 618: 586: 573: 545: 484: 482:Product history 430: 425: 410:email archiving 358: 347: 318: 301: 289: 286: 270: 267: 252: 236: 232: 228: 226:Email archiving 224: 220: 216: 214:Email filtering 212: 202: 200: 196: 134: 127: 123: 97: 95: 92: 69: 50: 24: 17: 12: 11: 5: 2788: 2786: 2778: 2777: 2772: 2767: 2762: 2757: 2752: 2747: 2742: 2737: 2732: 2727: 2722: 2717: 2707: 2706: 2703: 2702: 2686: 2685:External links 2683: 2680: 2679: 2654: 2629: 2604: 2583: 2562: 2543: 2525: 2507: 2489: 2471: 2442: 2424: 2406: 2388: 2359: 2341: 2323: 2295: 2276: 2262: 2236: 2223:Proofpoint.com 2210: 2184: 2158: 2143: 2140:. May 8, 2019. 2125: 2100: 2087:Proofpoint.com 2071: 2045: 2019: 1994: 1968: 1942: 1917: 1899: 1878: 1853: 1828: 1815:Proofpoint.com 1802: 1766: 1740: 1721: 1695: 1669: 1644: 1619: 1608:. June 5, 2013 1593: 1567: 1541: 1513: 1483: 1471:SearchSecurity 1458: 1446:SearchSecurity 1433: 1415: 1384: 1367:EarthTimes.org 1354: 1343:on May 9, 2008 1324: 1293: 1275: 1263: 1251: 1233: 1215: 1196: 1178: 1159: 1145: 1119: 1107: 1077: 1059: 1046:Proofpoint.com 1019: 1000: 999: 997: 994: 991: 990: 987: 982: 981:June 24, 2008 978: 977: 974: 971: 967: 966: 963: 960: 956: 955: 952: 949: 945: 944: 941: 938: 934: 933: 932:$ 25M in Cash 930: 927: 923: 922: 919: 917:Sendmail, Inc. 914: 910: 909: 908:$ 24M in Cash 906: 903: 899: 898: 897:$ 35M in Cash 895: 892: 888: 887: 884: 881: 877: 876: 873: 870: 866: 865: 862: 859: 858:Aug. 24, 2016 855: 854: 851: 848: 844: 843: 840: 837: 833: 832: 829: 826: 822: 821: 818: 815: 811: 810: 807: 806:Meta Networks 804: 800: 799: 796: 793: 789: 788: 785: 782: 778: 777: 774: 769: 765: 764: 761: 756: 755:December 2022 752: 751: 748: 745: 744:November 2023 741: 740: 737: 734: 727: 724: 692:cybercriminals 687: 684: 674: 671: 667:Wi-Fi networks 642: 639: 617: 616:Email security 614: 606:mobile devices 585: 582: 572: 569: 544: 541: 517:Sarbanes–Oxley 483: 480: 429: 426: 424: 421: 398:email security 392:that provides 373: 372: 356: 352: 351: 348: 345: 342: 341: 336: 332: 331: 323: 315: 314: 306: 298: 297: 287: 282: 279: 278: 268: 263: 260: 259: 245: 241: 240: 209: 205: 204: 197: 194: 191: 190: 187:United Kingdom 135: 132: 129: 128: 125: 119: 117: 113: 112: 107: 103: 102: 89: 85: 84: 81: 77: 76: 70: 65: 62: 61: 56: 52: 51: 48: 40: 39: 15: 13: 10: 9: 6: 4: 3: 2: 2787: 2776: 2773: 2771: 2768: 2766: 2763: 2761: 2758: 2756: 2753: 2751: 2748: 2746: 2743: 2741: 2738: 2736: 2733: 2731: 2728: 2726: 2723: 2721: 2718: 2716: 2713: 2712: 2710: 2700: 2694: 2689: 2688: 2684: 2668: 2664: 2658: 2655: 2643: 2639: 2633: 2630: 2618: 2614: 2608: 2605: 2600: 2596: 2590: 2588: 2584: 2579: 2578:Bloomberg.com 2575: 2569: 2567: 2563: 2558: 2554: 2547: 2544: 2539: 2535: 2529: 2526: 2521: 2517: 2511: 2508: 2503: 2499: 2493: 2490: 2485: 2481: 2475: 2472: 2459: 2452: 2446: 2443: 2438: 2434: 2428: 2425: 2420: 2416: 2410: 2407: 2402: 2398: 2392: 2389: 2376: 2369: 2363: 2360: 2355: 2351: 2345: 2342: 2337: 2333: 2327: 2324: 2312: 2311: 2306: 2299: 2296: 2291: 2287: 2280: 2277: 2272: 2266: 2263: 2251: 2247: 2240: 2237: 2224: 2220: 2214: 2211: 2199: 2195: 2188: 2185: 2173: 2169: 2162: 2159: 2154: 2147: 2144: 2139: 2135: 2129: 2126: 2114: 2113:Meta Networks 2110: 2104: 2101: 2088: 2084: 2078: 2076: 2072: 2060:. May 8, 2020 2059: 2055: 2049: 2046: 2033: 2029: 2023: 2020: 2008: 2007:GlobeNewswire 2004: 1998: 1995: 1982: 1978: 1972: 1969: 1957: 1953: 1946: 1943: 1931: 1927: 1921: 1918: 1913: 1909: 1903: 1900: 1888: 1882: 1879: 1867: 1866:Mediapost.com 1863: 1857: 1854: 1842: 1841:Forrester.com 1838: 1832: 1829: 1816: 1812: 1806: 1803: 1798: 1792: 1776: 1770: 1767: 1754: 1750: 1744: 1741: 1736: 1735:Network World 1732: 1725: 1722: 1709: 1705: 1699: 1696: 1683: 1679: 1673: 1670: 1657: 1654: 1648: 1645: 1633: 1629: 1623: 1620: 1607: 1603: 1597: 1594: 1581: 1577: 1571: 1568: 1555: 1551: 1545: 1542: 1530: 1529:Forrester.com 1526: 1520: 1518: 1514: 1501: 1497: 1493: 1487: 1484: 1472: 1468: 1462: 1459: 1447: 1443: 1437: 1434: 1429: 1425: 1419: 1416: 1403: 1399: 1398:Network World 1395: 1388: 1385: 1372: 1368: 1364: 1358: 1355: 1342: 1338: 1337:ByteandSwitch 1334: 1328: 1325: 1312: 1308: 1307:Network World 1304: 1297: 1294: 1291: 1287: 1284: 1279: 1276: 1272: 1267: 1264: 1260: 1255: 1252: 1249: 1245: 1242: 1237: 1234: 1231: 1227: 1224: 1219: 1216: 1211: 1207: 1200: 1197: 1194: 1190: 1187: 1182: 1179: 1175: 1171: 1168: 1163: 1160: 1155: 1149: 1146: 1133: 1129: 1123: 1120: 1116: 1111: 1108: 1095: 1091: 1084: 1082: 1078: 1073: 1072:GlobeNewswire 1069: 1063: 1060: 1047: 1040: 1034: 1032: 1030: 1028: 1026: 1024: 1020: 1015: 1011: 1005: 1002: 995: 988: 986: 983: 980: 979: 975: 972: 969: 968: 964: 962:Everyone.net 961: 959:Oct 31, 2009 958: 957: 953: 950: 948:Jan 28, 2012 947: 946: 942: 939: 937:Jul 25, 2013 936: 935: 931: 928: 925: 924: 920: 918: 915: 912: 911: 907: 904: 902:May 20, 2014 901: 900: 896: 893: 891:Oct 23, 2014 890: 889: 885: 882: 879: 878: 874: 871: 868: 867: 863: 860: 857: 856: 852: 849: 847:Oct 20, 2016 846: 845: 841: 838: 835: 834: 830: 827: 825:Nov 29, 2017 824: 823: 819: 816: 813: 812: 808: 805: 802: 801: 797: 794: 791: 790: 786: 783: 780: 779: 775: 773: 770: 768:January 2022 767: 766: 762: 760: 757: 754: 753: 749: 746: 743: 742: 738: 735: 732: 731: 725: 723: 721: 717: 713: 709: 705: 701: 696: 693: 685: 683: 681: 672: 670: 668: 664: 660: 656: 652: 648: 641:Cybersecurity 640: 638: 635: 631: 626: 623: 615: 613: 611: 607: 603: 599: 595: 591: 590:cybersecurity 583: 581: 578: 570: 568: 566: 561: 557: 555: 550: 542: 540: 538: 535:policy-based 532: 530: 526: 522: 518: 512: 508: 505: 500: 498: 493: 489: 481: 475: 471: 469: 464: 462: 457: 455: 451: 447: 443: 439: 435: 427: 422: 420: 418: 413: 411: 407: 403: 399: 395: 391: 387: 379: 370: 365: 357: 353: 349: 343: 340: 337: 333: 324: 321: 316: 307: 304: 299: 288: 285: 280: 269: 266: 261: 256:1.050 billion 255: 246: 242: 239: 235: 231: 227: 223: 219: 218:Email privacy 215: 210: 206: 198: 192: 188: 184: 180: 176: 172: 168: 164: 160: 156: 152: 148: 144: 140: 136: 130: 122: 118: 114: 111: 108: 104: 90: 86: 82: 78: 74: 71: 68: 63: 60: 57: 53: 46: 41: 37: 32: 26: 22: 2672:December 28, 2670:. Retrieved 2666: 2657: 2647:December 28, 2645:. Retrieved 2641: 2632: 2622:December 28, 2620:. Retrieved 2616: 2607: 2598: 2577: 2556: 2546: 2537: 2528: 2519: 2510: 2501: 2492: 2483: 2474: 2462:. Retrieved 2457: 2445: 2436: 2427: 2418: 2409: 2400: 2391: 2379:. Retrieved 2374: 2362: 2353: 2344: 2335: 2326: 2316:September 5, 2314:. Retrieved 2308: 2298: 2289: 2279: 2265: 2253:. Retrieved 2249: 2239: 2229:November 29, 2227:. Retrieved 2222: 2213: 2201:. Retrieved 2197: 2187: 2175:. Retrieved 2171: 2161: 2146: 2137: 2128: 2116:. Retrieved 2112: 2103: 2091:. Retrieved 2086: 2062:. Retrieved 2057: 2048: 2036:. Retrieved 2031: 2022: 2012:December 28, 2010:. Retrieved 1997: 1985:. Retrieved 1980: 1971: 1959:. Retrieved 1955: 1945: 1935:February 22, 1933:. Retrieved 1929: 1920: 1911: 1902: 1890:. Retrieved 1881: 1869:. Retrieved 1865: 1856: 1844:. Retrieved 1840: 1831: 1819:. Retrieved 1814: 1805: 1779:. Retrieved 1769: 1757:. Retrieved 1752: 1743: 1734: 1724: 1712:. Retrieved 1707: 1698: 1686:. Retrieved 1681: 1672: 1660:. Retrieved 1655: 1647: 1635:. Retrieved 1631: 1622: 1610:. Retrieved 1605: 1596: 1584:. Retrieved 1579: 1570: 1558:. Retrieved 1553: 1544: 1532:. Retrieved 1528: 1504:. Retrieved 1500:the original 1495: 1486: 1474:. Retrieved 1470: 1461: 1449:. Retrieved 1445: 1436: 1427: 1418: 1408:September 5, 1406:. Retrieved 1402:the original 1397: 1387: 1375:. Retrieved 1371:the original 1366: 1357: 1345:. Retrieved 1341:the original 1336: 1327: 1317:September 5, 1315:. Retrieved 1311:the original 1306: 1296: 1278: 1266: 1254: 1236: 1218: 1209: 1199: 1181: 1162: 1148: 1136:. Retrieved 1131: 1122: 1110: 1098:. Retrieved 1093: 1062: 1050:. Retrieved 1045: 1013: 1004: 926:Aug 9, 2013 913:Oct 1, 2013 880:Mar 2, 2015 869:Nov 4, 2015 861:Return Path 836:Nov 7, 2017 814:Feb 6, 2018 803:May 6, 2019 726:Acquisitions 704:social media 698:In the 2016 697: 689: 686:Digital risk 676: 665:, and rogue 647:cyberattacks 644: 627: 619: 602:social media 587: 574: 562: 558: 546: 533: 513: 509: 501: 485: 465: 458: 454:RRE Ventures 431: 414: 385: 384: 350:3,658 (2020) 320:Total equity 303:Total assets 116:Headquarters 55:Company type 25: 2255:November 7, 2177:February 6, 2093:November 6, 1987:October 30, 1961:October 30, 1817:. June 2016 1714:November 9, 1688:November 9, 1662:November 9, 1637:November 9, 1612:November 9, 1586:November 9, 1560:November 9, 905:NetCitadel 872:Socialware 850:FireLayers 831:$ 60M Cash 828:Weblife.io 795:ObserveIT 680:e-discovery 663:mobile apps 468:Thoma Bravo 417:Thoma Bravo 362:.proofpoint 339:Thoma Bravo 179:Netherlands 75:: PFPT 2709:Categories 2250:TechCrunch 2038:January 9, 2032:Proofpoint 1981:Proofpoint 1554:Proofpoint 1052:August 31, 1014:Proofpoint 996:References 839:Cloudmark 659:encryption 608:, and the 594:compliance 492:spam email 284:Net income 195:Key people 2730:Anti-spam 2290:Israel21c 1930:Owler.com 1892:March 24, 1871:March 24, 1846:March 24, 1821:March 24, 1791:cite news 1781:March 24, 1759:March 24, 1534:March 14, 1506:March 24, 1476:March 24, 1451:March 24, 1428:EBizQ.net 1100:August 3, 951:NextPage 781:May 2020 700:Forrester 434:Eric Hahn 167:Singapore 139:Australia 110:Eric Hahn 67:Traded as 2484:SC Media 2437:SC Media 2203:March 1, 1912:SC Media 1286:Archived 1244:Archived 1226:Archived 1189:Archived 1170:Archived 1138:July 14, 894:Nexgate 736:Company 720:dark web 584:Products 208:Products 80:Industry 2520:WSJ.com 2464:June 9, 2401:WSJ.com 2381:June 9, 2354:WSJ.com 2118:June 1, 1956:Tessian 1377:June 6, 1347:June 6, 985:Fortiva 655:malware 630:Fortiva 428:Company 423:History 355:Website 244:Revenue 151:Germany 106:Founder 96: ( 88:Founded 59:Private 2064:May 8, 739:Terms 718:, and 712:mobile 708:social 523:, and 408:, and 258:(2020) 177:, The 175:Sweden 155:Israel 147:France 143:Canada 73:Nasdaq 2667:Mergr 2642:Mergr 2617:Mergr 2454:(PDF) 2419:eWEEK 2371:(PDF) 1042:(PDF) 733:Date 610:cloud 598:email 521:HIPAA 504:HIPAA 335:Owner 171:Spain 163:Japan 159:Italy 2674:2022 2649:2022 2624:2022 2466:2019 2383:2019 2318:2019 2257:2017 2231:2017 2205:2018 2179:2018 2120:2019 2095:2019 2066:2020 2040:2024 2014:2022 1989:2023 1963:2023 1937:2018 1894:2017 1873:2017 1848:2017 1823:2017 1797:link 1783:2017 1761:2017 1716:2023 1690:2023 1664:2023 1639:2023 1614:2023 1588:2020 1562:2020 1536:2017 1508:2017 1478:2017 1453:2017 1410:2019 1379:2008 1349:2008 1319:2019 1140:2012 1102:2020 1054:2021 622:SaaS 497:spam 448:and 364:.com 254:US$ 126:U.S. 98:2002 91:2002 2557:CRN 716:web 360:www 2711:: 2665:. 2640:. 2615:. 2597:. 2586:^ 2576:. 2565:^ 2555:. 2536:. 2518:. 2500:. 2482:. 2456:. 2435:. 2417:. 2399:. 2373:. 2352:. 2334:. 2307:. 2288:. 2248:. 2221:. 2196:. 2170:. 2136:. 2111:. 2085:. 2074:^ 2056:. 2030:. 1979:. 1954:. 1928:. 1910:. 1864:. 1839:. 1813:. 1793:}} 1789:{{ 1751:. 1733:. 1706:. 1680:. 1630:. 1604:. 1578:. 1552:. 1527:. 1516:^ 1494:. 1469:. 1444:. 1426:. 1396:. 1365:. 1335:. 1305:. 1208:. 1130:. 1092:. 1080:^ 1044:. 1022:^ 1012:. 714:, 710:, 669:. 612:. 604:, 600:, 556:. 519:, 470:. 412:. 404:, 185:, 181:, 173:, 169:, 165:, 161:, 157:, 153:, 149:, 145:, 141:, 124:, 2676:. 2651:. 2626:. 2601:. 2559:. 2504:. 2468:. 2385:. 2338:. 2320:. 2292:. 2259:. 2233:. 2207:. 2181:. 2155:. 2122:. 2097:. 2068:. 2042:. 2016:. 1991:. 1965:. 1939:. 1896:. 1875:. 1850:. 1825:. 1799:) 1785:. 1763:. 1737:. 1718:. 1692:. 1666:. 1641:. 1616:. 1590:. 1564:. 1538:. 1510:. 1480:. 1455:. 1412:. 1381:. 1351:. 1321:. 1212:. 1176:. 1142:. 1117:. 1104:. 1056:. 100:) 23:.

Index

Proofpoint Systems, Inc.


Private
Traded as
Nasdaq
Eric Hahn
Sunnyvale, California
Australia
Canada
France
Germany
Israel
Italy
Japan
Singapore
Spain
Sweden
Netherlands
United Arab Emirates
United Kingdom
Email filtering
Email privacy
Email encryption
Email archiving
Anti-spam techniques
Electronic discovery
Data loss prevention software
US$
Operating income

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑