Proofpoint.com - SEO Checker

Overview of the SEO Check
Meta information
80% 
Page quality
77% 
Page structure
58% 
Link structure
75% 
Server
68% 
External factors
100% 
SEO Score
Response time
1.22 s
File size
91.20 kB
Words
1405
Media files
18
Number of links
112 internal / 17 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Enterprise Cybersecurity Solutions, Services & Training | Proofpoint US
The page title should be shorter than 580 pixels. It is 639 pixels long. Optimize title
There are no duplicate words in the title
Meta description
(Critically important)
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
The length of the meta description is perfect. (940 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.proofpoint.com/us
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: en
Language defined in HTML: en-us
Server location: United States of America
The following language is defined by HTML: en-us
Alternate/Hreflang Links
(Somewhat important)
The specified alternate links have no errors.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
The favicon is linked correctly.

Meta tags

NameValue
descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
facebook-domain-verificationl349mr2tyecyl7w3a1146378lqxru1
MobileOptimizedwidth
HandheldFriendlytrue
viewportwidth=device-width, initial-scale=1.0
langen-us
twitter:cardsummary_large_image
twitter:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
twitter:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
twitter:site@proofpoint
twitter:urlhttps://www.proofpoint.com/us
twitter:imageEmpty
og:site_nameProofpoint
og:typewebsite
og:urlhttps://www.proofpoint.com/us
og:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
og:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
og:imageEmpty
og:image:urlEmpty
og:image:secure_urlEmpty
charsetutf-8

Test up to 1.000 webpages of proofpoint.com with our free plan!

Try For Free
No trial. It's just free!

Page quality

Content
(Critically important)
Some words from the page title are not used within the pages content
This page contains 1405 words. That's ok.
25.3% of the text are stop words.
Words from the H1 heading are used in the page content.
The page contains a listing, which indicates a good text layout.
9 paragraphs were found on this page.
No placeholders texts or images were found.
There are no duplicates on the site.
The average number of words per sentence of 17.63 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
This page loads 11 JavaScript files. This may affect the load time negatively.
A viewport "width=device-width, initial-scale=1.0" is provided.
At least one Apple touch icon is specified.
Bold and strong tags
(Somewhat important)
The following tag is repeated too often: products
Image SEO
(Somewhat important)
Alt text (alternative text) is correctly used on all found images.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Page structure

H1 heading
(Critically important)
The leader in human-centric cybersecurity
The H1 heading is perfect.
Headings
(Important)
Some headings occur twice on the page.
The structure of headings is missing one or more levels. Do not skip heading levels.
There are 29 headings on the page. The amount of headings should be in a more proper relation to the amount of text.
Some headings do not have any content.

Heading structure

Heading levelContent
H1 The leader in human-centric cybersecurity
H2 Today’s integrated cyber attacks target people, not just technology
H2 Half a million customers, including 87 of the Fortune 100, trust Proofpoint.
H2 We’re recognized as an industry leader by leading analyst firms and customers alike.
H2 Empty heading
H2 The latest industry insights, reports
 and press releases
H2 Start protecting your people today
H3 Solutions By Use Case
H3 Solutions By Industry
H3 Proofpoint vs. the competition
H3 Partners
H3 Resources
H3 Company
H3 Protect People
H3 Mitigate Human Risk
H3 Defend Data
H3 Nexus AI
H3 Products Protect People
H3 Protect People Duplicate text
H3 Products Defend Data
H3 Defend Data Duplicate text
H3 Products Mitigate Human Risk
H3 Mitigate Human Risk Duplicate text
H3 HOW WE DO IT Nexus AI
H3 Nexus AI Duplicate text
H3 More than One-Quarter of the Global 2000 Are Not Ready for Upcoming Stringent Email Authentication Rules
H5 Proofpoint is Recognized as a 2024 Gartner® Peer Insights™ Customers’ Choice for Data Loss Prevention
H5 Proofpoint Recognized as Overall Market Leader Frost Radar™: Email Security, 2024
H5 Cybersecurity Awareness Kit
H5 Proofpoint Announces Availability of its Human-Centric Security Solutions in AWS Marketplace
Some internal link anchor texts are too long.
Some internal links have dynamic parameters. All internal URLs, which are not marked as nofollow, should not contain dynamic parameters.
Some anchor texts are used more than once.
There are 1 links with a trivial anchor text.
The number of internal links is ok.
There are 17 external links on this page.
LinkAttributesAnchor text
https://www.proofpoint.com/usAnchor Skip to main content
https://www.proofpoint.com/usProofpoint
/us/contactContact
/us/products/protect-peopleProtect People Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.
/us/products/threat-defenseEmail Security
/us/products/impersonation-pro...Impersonation Protection
/us/products/defend-dataDefend Data Transform your information protection with a human-centric, omni-channel approach.
/us/products/data-loss-preventionEnterprise DLP
/us/products/adaptive-email-dlpAdaptive Email DLP
/us/products/insider-threat-ma...Insider Threat Management
/us/products/compliance-and-ar...Intelligent Compliance
/us/products/mitigate-human-riskSecurity Awareness
/us/products/premium-servicesManaged Services
/us/products/packagesProduct Packages
/us/products/identity-protectionAccount Take-Over and Identity Protection
/us/products/adaptive-email-se...Adaptive Email Security
/us/products/email-security-an...Secure Email Relay
/us/solutions/email-authentica...Authenticate Your Email
/us/solutions/combat-email-and...Combat Email and Cloud Threats
/us/solutions/federalFederal Government
/us/solutions/state-and-local-...State and Local Government
/us/compareComparing Proofpoint Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
/us/solutions/change-user-beha...Change User Behavior
/us/solutions/combat-data-loss...Combat Data Loss and Insider Risk
/us/solutions/enable-intellige...Modernize Compliance and Archiving
/us/solutions/protect-cloud-appsProtect Cloud Apps
/us/solutions/prevent-loss-fro...Prevent Loss from Ransomware
/us/solutions/secure-microsoft...Secure Microsoft 365
/us/solutions/higher-education...Higher Education
/us/solutions/financial-servic...Financial Services
/us/solutions/healthcare-infor...Healthcare
/us/solutions/mobile-message-s...Mobile Operators
/us/solutions/email-security-s...Internet Service Providers
/us/solutions/protection-compl...Small and Medium Businesses
/us/compare/proofpoint-vs-abno...Proofpoint vs. Abnormal Security
/us/compare/proofpoint-vs-mime...Proofpoint vs. Mimecast
/us/compare/proofpoint-vs-ciscoProofpoint vs. Cisco
/us/compare/proofpoint-vs-micr...Proofpoint vs Microsoft
/us/compare/proofpoint-vs-micr...Proofpoint vs. Microsoft Purview
/us/compare/proofpoint-vs-lega...Proofpoint vs. Legacy DLP
https://partners.proofpoint.com/External Subdomain Channel Partners
/us/partners/trusted-data-solu...Archive Extraction Partners
/us/global-system-integrator-g...GSI and MSP Partners
/us/partners/technology-allian...Technology and Alliance Partners
/us/partners/digital-risk-and-...Social Media Protection Partners
/us/channel-partners-small-and...Proofpoint Essentials Partner Programs
https://partners.proofpoint.co...External Subdomain Become a Channel Partner
/us/resourcesResource Library
/us/blogBlog
/us/webinarsWebinars
/us/cybersecurity-academyCybersecurity Academy
/us/podcastsPodcasts
/us/new-perimetersNew Perimeters Magazine
/us/threat-referenceThreat Glossary
/us/eventsEvents
/us/customer-storiesCustomer Stories
/us/company/aboutAbout Proofpoint
/us/why-proofpointWhy Proofpoint
/us/company/careersCareers
/us/newsroomNews Center
/us/legal/trustPrivacy and Trust
/us/legal/esgEnvironmental, Social, and Governance
/us/support-servicesSupport
/us/search?content[query]=Emai...Text duplicate Email Security
/us/search?content[query]=Phis...Phishing
/us/search?content[query]=DLPDLP
/us/search?content[query]=Emai...Email Fraud
https://proofpoint.my.site.com...New window External Subdomain Support Log-in
https://proofpointcybersecurit...New window External Subdomain Proofpoint Cybersecurity Academy
https://digitalrisk.proofpoint...New window External Subdomain Digital Risk Portal
https://emaildefense.proofpoin...New window External Subdomain Email Fraud Defense
https://threatintel.proofpoint...New window External Subdomain ET Intelligence
https://us1.proofpointessentia...New window External Subdomain Proofpoint Essentials
https://proofpointcommunities....New window External Subdomain Sendmail Support Log-in
https://www.proofpoint.com/usEnglish (Americas)
https://www.proofpoint.com/ukEnglish (Europe, Middle East, Africa)
https://www.proofpoint.com/auEnglish (Asia-Pacific)
https://www.proofpoint.com/esEspañol
https://www.proofpoint.com/deDeutsch
https://www.proofpoint.com/frFrançais
https://www.proofpoint.com/itItaliano
https://www.proofpoint.com/brPortuguês
https://www.proofpoint.com/jp日本語
https://www.proofpoint.com/kr한국어
/us/events/protectLearn more
/us/free-trial-requestGet In Touch
/us/events/protectFeatured Event Protect 2024: Join us to begin your human-centric cybersecurity journey.
IMG-ALT Protect 2024
/us/reduce-insider-risk/inside...Featured Starter Pack Find everything you need to get started with a proactive approach to insider threats.
IMG-ALT ITM Starter Pack
https://go.proofpoint.com/Powe...External Subdomain Featured Virtual Event Series Proofpoint Power Series - Powering up the security community
IMG-ALT Proofpoint Power Series - Powering Up the Security Community
https://www.proofpoint.com/usAnchor The Challenge
https://www.proofpoint.com/usAnchor Text duplicate Why Proofpoint
https://www.proofpoint.com/usAnchor The Proof
https://www.proofpoint.com/usAnchor Customers
https://www.proofpoint.com/usAnchor The Latest
/us/products/protect-peopleLearn More
/us/products/defend-dataText duplicate Learn More
/us/products/mitigate-human-riskText duplicate Learn More
/us/newsroom/press-releases/pr...News Article 04.11.24 Proofpoint is Recognized as a 2024 Gartner® Peer Insights™ Customers’ Choice for Data Loss Prevention
IMG-ALT Gartner
/us/resources/analyst-reports/...Resource Proofpoint Recognized as Overall Market Leader Frost Radar™: Email Security, 2024
IMG-ALT Frost Radar
/us/customer-storiesView all customer stories
/us/blog/email-and-cloud-threa...Trivial anchor text
Read More
/us/resources/awareness-materi...Resource Cybersecurity Awareness Kit
IMG-ALT cybersecurity awareness month
/us/newsroom/press-releases/pr...News Article 05.02.24 Proofpoint Announces Availability of its Human-Centric Security Solutions in AWS Marketplace
IMG-ALT About Proofpoint
/us/contactGet in Touch
/us/products/protect-peopleProtect People
/us/products/defend-dataDefend Data
/us/products/mitigate-human-riskMitigate Human Risk
/us/products/premium-servicesPremium Services
https://proofpoint.my.site.com...New window External Subdomain Product Support Login
/us/support-servicesSupport Services
https://ipcheck.proofpoint.com/New window External Subdomain IP Address Blocked?
/us/eventsAttend an Event
/us/contactContact Us
/us/free-demo-requestFree Demo Request
/us/company/aboutText duplicate About Proofpoint
/us/why-proofpointText duplicate Why Proofpoint
/us/company/careersText duplicate Careers
/us/leadership-teamLeadership Team
/us/newsroomText duplicate News Center
/us/legal/trustText duplicate Privacy and Trust
https://www.proofpoint.com/usNo Text
/us/legal/licenseTerms and conditions
/us/legal/privacy-policyPrivacy Policy
/us/sitemapSitemap
http://www.facebook.com/proofp...New window External Subdomain No Text
http://www.twitter.com/proofpointNew window External Subdomain No Text
https://www.linkedin.com/compa...New window External Subdomain No Text
https://www.youtube.com/channe...New window External Subdomain No Text
https://www.instagram.com/proo...New window External Subdomain No Text

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.proofpoint.com/us"
HTTP header
(Important)
No X-Powered HTTP header is sent.
This page uses GZip for compressed data transmission.
Performance
(Somewhat important)
The page response time is slow (1.22 seconds). The response time should be less than 0.4 seconds. Slow websites are bad for search engine bots and also result in bad user experience.
This page loads 11 JavaScript files. This may affect the load time negatively.
This page only loads 2 CSS files. That's ok.
The file size of the HTML document is fine (91 kB).

HTTP Response Header

NameValue
etagW/"1725676195-gzip"
last-modifiedSat, 07 Sep 2024 02:29:55 GMT
content-typetext/html; charset=UTF-8
content-length16911
content-encodinggzip
cache-controlmax-age=56529, public
expiresSun, 08 Sep 2024 20:28:48 GMT
dateSun, 08 Sep 2024 04:46:39 GMT
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-permitted-cross-domain-policiesnone
x-imperva-purge-tagsfk0h,2171,rsmc,0plh,r6o8,li2r,ebfb,unor,vunp,j093,jamf,p7tt,khv0,8qo7,eken,6bqn,bvs8,5hj9,iraa,1a9q,5idp,t2gt,mq1l,sg0n,hpm4,gqk3,geaj,0q09,49mb,ta08,6o2q,b47l,dakn,u7nb,oe85,3han,k1g7,60ne,q9bn,b0ik,hpj1,8g9j,87nt,4uej,dk80,7nqj,lvpg,70b2,njk3,b3jk,gl8k,p50t,jqk2,rb8c,l4sn,1bmv,ihdg,7c4s,l9j8,is2d,a443,dt9q,sihn,5mgr,e4s0,um5n,0i9v,7lpb,q7jj,97js,pmf2,bevd,vkr1,rhcc,ajkr,h51a,8p0e,kn7e,vkns,617g,oloi,cd3i,ageb,65b6,n7th,13r5,bpno,o8qk,hqc1,72h3,m5is,0kui,qdrp,3vgh,87u3,mm8h,nerf,og9b,8jv9,2hd8,4edn,5m2b,srfq,cc6e,seu2,pup5,r2nb,bk7t,d9gk,e37u,003h,d7bv,jr7i,hbge,vrvr,5hoc,ciei,le63,q574,ufnb,h8s9,shg1,k0qo,ilg5,qfnt,6u82,uc0p,nmot,shcs,vkkb,v2on,prna,bn8e,jo4m,l2u0,5cr3,80b8,mu60,us5v
content-security-policydefault-src 'self' blob:; script-src 'self' 'unsafe-inline' 'unsafe-eval' blob: https://www.google-analytics.com/analytics.js https://www.googleoptimize.com/optimize.js https://www.googletagmanager.com https://munchkin.marketo.net https://app-abj.marketo.com https://www.googleadservices.com https://googleads.g.doubleclick.net https://geoip-js.com https://ads.avocet.io https://trk.techtarget.com https://j.6sc.co/6si.min.js https://tags.srv.stackadapt.com https://ads.avct.cloud https://js.driftt.com https://js-agent.newrelic.com https://bam.nr-data.net https://cdn.jsdelivr.net/simplemde/latest/simplemde.min.js https://cdn.jsdelivr.net/npm/@json-editor/json-editor@latest/dist/jsoneditor.min.js https://js.adsrvr.org/up_loader.1.1.0.js https://go.affec.tv https://bat.bing.com/bat.js https://s7.addthis.com/js/300/addthis_widget.js https://m.addthis.com https://z.moatads.com https://cdn.jsdelivr.net/npm/datalist-polyfill@latest/datalist-polyfill.min.js https://snap.licdn.com https://tracking.g2crowd.com https://bat.bing.com https://connect.facebook.net https://tags.srv.stackadapt.com https://widget.spreaker.com *.visualwebsiteoptimizer.com app.vwo.com *.sharethis.com https://unpkg.com/dropzone@5/dist/min/dropzone.min.js https://d1hgczpbubj217.cloudfront.net/video-widget/ https://www.youtube.com/ https://app-static.turtl.co/embed/turtl.embed.v1.js https://js.zi-scripts.com/zi-tag.js *.mutinycdn.com https://www.clarity.ms; object-src 'self'; style-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com s3.amazonaws.com *; img-src 'self' 'unsafe-inline' data: blob: *.visualwebsiteoptimizer.com chart.googleapis.com wingify-assets.s3.amazonaws.com app.vwo.com * *.mutinycdn.com; media-src 'self'; frame-src 'self' 'unsafe-inline' app.vwo.com *.visualwebsiteoptimizer.com *; frame-ancestors 'self' https://app.mutinyhq.com; child-src 'self' 'unsafe-inline' blob:; worker-src 'self' blob:; font-src 'self' 'unsafe-inline' data: *; connect-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com * *.mutinyhq.com *.mutinyhq.io *.mutinycdn.com; report-uri /report-csp-violation
referrer-policyorigin-when-cross-origin
feature-policygeolocation 'self'
set-cookie187 Characters
strict-transport-securitymax-age=31536000; includeSubDomains; preload
x-cdnImperva
x-iinfo2-18720284-0 0CNN RT(1725770798677 691) q(0 -1 -1 0) r(0 -1)
statuscode200
http_versionHTTP/1.1

External factors

Blacklists
(Nice to have)
This website is not classified "for adult only".
This page is referenced by wikipedia.
This website has excellent links from other websites.
This page has backlinks from 1,424 referring domains.
This page has 23,465 backlinks.
This page has backlinks from 1,108 different ip addresses.
Facebook popularity
(Somewhat important)
The page has 0 shares and comments on Facebook.

Robots.txt

#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used:    http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/robotstxt.html

User-agent: *
Crawl-delay: 10
# CSS, JS, Images
Allow: /core/*.css$
Allow: /core/*.css?
Allow: /core/*.js$
Allow: /core/*.js?
Allow: /core/*.gif
Allow: /core/*.jpg
Allow: /core/*.jpeg
Allow: /core/*.png
Allow: /core/*.svg
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /profiles/*.svg
Allow: /misc/*.css$
Allow: /misc/*.css?
Allow: /misc/*.js$
Allow: /misc/*.js?
Allow: /misc/*.gif
Allow: /misc/*.jpg
Allow: /misc/*.jpeg
Allow: /misc/*.png
Allow: /modules/*.css$
Allow: /modules/*.css?
Allow: /modules/*.js$
Allow: /modules/*.js?
Allow: /modules/*.gif
Allow: /modules/*.jpg
Allow: /modules/*.jpeg
Allow: /modules/*.png
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /themes/*.css$
Allow: /themes/*.css?
Allow: /themes/*.js$
Allow: /themes/*.js?
Allow: /themes/*.gif
Allow: /themes/*.jpg
Allow: /themes/*.jpeg
Allow: /themes/*.png
# Directories
Disallow: /core/
Disallow: /profiles/
# Files
Disallow: /README.txt
Disallow: /web.config
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /INSTALL.sqlite.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
Disallow: /sites/default/files/*gtd-*.pdf
Disallow: /sites/default/files/*lgy-*.pdf
Disallow: /thank-you-*
Disallow: /sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf
Disallow: /sites/default/files/mail-routing-agent-datasheet-v2.pdf
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /filter/tips
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
Disallow: /user/logout/
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register*
Disallow: /user/password*
Disallow: /user/login*
Disallow: /user/logout*
Disallow: /events/*
Disallow: /upcoming-events/*
Disallow: /lp/*
Disallow: /conquer
Disallow: /merck
Disallow: /johnson-controls
Disallow: /baxter
Disallow: /sutter-health
Disallow: /chevron
Disallow: /meeting-request
# Paths (no clean URLs)
Disallow: /index.php/admin/
Disallow: /index.php/comment/reply/
Disallow: /index.php/filter/tips
Disallow: /index.php/node/add/
Disallow: /index.php/search/
Disallow: /index.php/user/password/
Disallow: /index.php/user/register/
Disallow: /index.php/user/login/
Disallow: /index.php/user/logout/
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=filter/tips/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/
Disallow: /?q=user/logout/
Disallow: /?q=events/*
Disallow: /?q=upcoming-events/*
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-dr-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-de-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/RemoteWorkAlliance_Webinar.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dr-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-calculated-risks.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-ja-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/misc/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/infographics/Pfpt-Phishing%20Infographic%20Poster-17x24-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-calculated-risks.pdf
Disallow: /sites/default/files/white-papers/gtyd-pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-es-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/securityawarenesskit/Cybersecurity-Awareness-Kit-BEC.zip
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-eval_2020-evaluation-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-us-tr-healthcare-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-jp-a4-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-es-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-fr-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-it-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-setting-up-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-a4-sb-solutions-bundles_201111a.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-cyber-risk-alliance-research-report.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-uk-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-au-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-de-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-setting-up-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-radicati-secure-email-gateway-market-quadrant-2020.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview-v5.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-fr-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-uk-eb-role-of-itm.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-a4-da-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3754_fr_RethinkingIT_GIG_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3773_FinServ_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-FinServ_eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-healthcare-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/misc/pfpt-2020-type2-soc2-report-clickwrap.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-healthcare-report.pdf
Disallow: /sites/default/files/2020-05/pfpt-us-wp-how-proofpoint-helps-organizations-meet-NIST-cybersecurity-guidelines.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaborations.pdf
Disallow: /sites/default/files/2020-06/pfpt-us-eb-the-definitive-email-security-guide.pdf
Disallow: /sites/default/files/ciso_ebook_sponsored_by_proofpoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-financial-services-and-insurance.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector-.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-uk-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-de-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-fr-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/Proofpoint-jp-a4-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/0503-001-01-01-pfpt-A4-e-book-youve-got-BEC-JP-30APR2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-overview.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/220252.37-pfpt-jp-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-business-impact-brief.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-us-wp-people-centric-cybersecurity-federal-perspective.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-wp-a4-people-centric-approach-insider-threat-management-3.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/misc/pfpt-es-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-macdonald_20210426a.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-mcdonald_20210426a.pdf
Disallow: /sites/default/files/misc/Password%20Day%20Awareness%20Kit.zip
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-us-wp-getting-started-with-casb-v33.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security-v3.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-frost-sullivan-guarding-the-virtual-doorway.pdf
Disallow: /sites/default/files/awareness-materials/Email%20Fraud%20and%20Security%20Awareness%20Kit%202021.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_0.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-vpn-securing-your-remote-workforce.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-segasammy_20210622.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/event-materials/210713_CYBERGYMxProofpoint.zip
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/event-materials/210713Webinar_Crowdstrike-Netskope-Okta-Proofpoint.zip
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-three-information-protection-use-cases-in-the-cloud-era.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ige-modern-blueprint-to-information-protection.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-japanese-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2020-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-esg-ediscovery-market-trends-and-challenges.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-user-risk-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-sullivan-market-leadership-award.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-a-strategic-approach-to-zero-trust-security-the-spectra-alliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/misc/2021%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-fall-winter-2021-threat-update.pdf
Disallow: /sites/default/files/e-books/biggest-and-boldest-insider-threats-2020-2021-jp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-paper-fed-58.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/awareness-materials/DE_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/awareness-materials/UK_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-getting-started-with-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-youve-got-bec.pdf
Disallow: /sites/default/files/misc/ISMG%20-%20Proofpoint%20-%20Matt%20Cooke%20eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-social-media-threats-ismg.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-current-state-of-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-making-sense-of-sase-and-sse.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-spotlight-higher-education.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-%20dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-crowd.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-jan-2022.xlsx
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-risk-and-resilience.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/infographics/PP_jp_InsiderThreat_Infographic_final_ysohta0309a.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-report-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-gartner-how-to-succeed-with-data-classification.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-dlp-right.pdf
Disallow: /sites/default/files/threat-reports/2022-CISO-REPORT_Final_jp_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/white-papers/pfpt-kr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity%20Awareness%20Kit_jp.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20190724.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-20180806.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-20180521.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-20201110.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-20171006.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-20190516.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-premium-support-for-cloudmark-products.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program-202103.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula-20201009.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions-201108.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-protection-audit-and-compliance-policy-20220502.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla-201603.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program-2019.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-customer-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-japan.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-eu.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-uk.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-essentials-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-digital-risk-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-cloud-security-platform-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-web-security-sla-20220429.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla-20220426.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement-20220407_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-partner-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-compliant-policy-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-disclosure-statement-20220419.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cloudmark-smc-cpsaas-sla-20200827.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-itm-saas-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-presigned-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-idta-20220409.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-data-processing-presigned-addendum.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-data-sensitivity.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook_2020-b.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-and-web-attacks.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment-20201028.pdf
Disallow: /sites/default/files/legal-documents/pfpt-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-third-party-providers-and-subprocessors-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-customer-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-partner-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc-202208.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-wp-ebook-third-party-oauthpps-qa-security-checklist.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-managed-services-for-information-protection.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-UAE-REPORT-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-misc-guide-to-global-digital-comm-regs.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-amendment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-sg-eb-user-risk-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-spr-summ-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-px-sla.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-securing-microsoft-365.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Cybersecurity-Deutschland-Menschen-Daten-besser-sch%C3%BCtzen.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-uk-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum.pdf
Disallow: /sites/default/files/misc/pfpt-jp-cs-psat-iris-ohyamama_20220916a_FINAL_wo.address.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-iris-ohyamama.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-ITM-Softbank_20221024a.pdf
Disallow: /sites/default/files/white-papers/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-sla.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-avoid-mistakes-that-expose-data.pdf
Disallow: /sites/default/files/misc/2022%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-covid-research_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-complaint-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Italy-CISO-Survey.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-email-fraud-defense.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-jgc-holdings.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-a4-rpt-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-pt-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ch-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-law-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-casb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-gettting-started-with-dmarc.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-2023-security-awareness-study.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit_2023_jp.zip
Disallow: /sites/default/files/e-books/Proofpoint-Cybersecurity-ABC-Picturebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/analyst-reports/Frost%20Radar%20-%20Email%20Security%2C%202022%2C%20ProofPoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/misc/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-ko-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp_20230310a.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-zero-trust.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2022.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-sb-securing-the-messenger.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-report_2023.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-202112-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change..pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-%28poc%29-terms-of-use.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-terms-of-use_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-poc-terms-of-use.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-board-perspective-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-in-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-sep-2023.docx
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-ds-threat-response-auto-pull_2310.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-on-thin-ices.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inbound-outbound.pdf
Disallow: /sites/default/files/white-papers/pfpt-en-wp-achieving-cyber-resiliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-customer-agreement-for-aws-marketplace.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shiseido.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2023-issue-6.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-5.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-4.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-3.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-2.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-1.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/%20pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/white-papers/PROO6061_jp_Ransomware_Survival_Guide_A4.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-website-support-services-exhibit.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/pfpt-a4-eb-definitive-email-security-strategy-guide-180514.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-singapore-personal-data-protection-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gramm-leach-bliley-act-safeguards-rule-new-breach-reporting-requirements-for-non-bank-financial-institutions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cyber-incident-reporting-for-critical-infrastructure-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-prc-data-privacy-framework.pdf
Disallow: /sites/default/files/proofpoint_best_practices_for_writing_secure_ios_and_android_apps_whitepaper-a4-jp-cm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-transforming-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-may-2024.docx
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-2024-report.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-efd-interspace.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit-Guide-2024-jp.zip
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata_240806.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-au-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shueisha.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/securityawarenesskit/2024-Proofpoint-Cybersecurity-Awareness-Kit-jp.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-information-protection-rfp-rfi-template-september-2024.docx
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-browser-isolation.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-partner-dpa.pdf
Sitemap: https://www.proofpoint.com/us/sitemap.xml
Sitemap: https://www.proofpoint.com/uk/sitemap.xml
Sitemap: https://www.proofpoint.com/fr/sitemap.xml
Sitemap: https://www.proofpoint.com/de/sitemap.xml
Sitemap: https://www.proofpoint.com/es/sitemap.xml
Sitemap: https://www.proofpoint.com/jp/sitemap.xml
Sitemap: https://www.proofpoint.com/au/sitemap.xml
Sitemap: https://www.proofpoint.com/it/sitemap.xml
Sitemap: https://www.proofpoint.com/br/sitemap.xml
Sitemap: https://www.proofpoint.com/kr/sitemap.xml

Search preview

www.proofpoint.com
Enterprise Cybersecurity Solutions, Services & Training | Proof...
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
Cybersecurity79%Check
Proofpoint74%Check
Cybersecurity Solutions73%Check
Solutions68%Check
Email Security68%Check
Enterprise Cybersecurity Solutions67%Check
human-centric cybersecurity66%Check
cyber attacks66%Check
human-centric security66%Check
Proofpoint US66%Check

Test up to 1.000 webpages of proofpoint.com with our free plan!

Try For Free
No trial. It's just free!

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions