Proofpoint.com - SEO Checker

Visión general del análisis SEO
Metadatos
80% 
Calidad de la página
77% 
Estructura
58% 
Enlazado
75% 
Servidor
68% 
Factores externos
100% 
Puntuación SEO
Tiempo de carga
1,22 s
Tamaño HTML
91,20 kB
Palabras
1405
Medios
18
Cantidad de enlaces
112 internos / 17 externos

Lista de tareas pendientes para mejorar tu SEO

Metadatos

Título
(Extremadamente importante)
Enterprise Cybersecurity Solutions, Services & Training | Proofpoint US
Con 639 píxeles, el título de esta página es demasiado largo. Optimizar el título
No se repite ninguna palabra en el título.
Meta descripción
(Extremadamente importante)
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
La longitud de la meta descripción es óptima (940 píxeles de una longitud máxima de 1000 píxeles).
Rastreabilidad
(Extremadamente importante)
No se detectan problemas para acceder al sitio web.
Redirección canónica
(Importante)
https://www.proofpoint.com/us
La página tiene una redirección canónica correcta.
Idioma
(Poco importante)
Idioma reconocido automáticamente en el contenido: en
Idioma declarado en el código HTML: en-us
Ubicación geográfica del servidor: Estados Unidos de América
El idioma ha sido correctamente declarado en el código HTML: en-us.
Enlaces Alternate/Hreflang
(Poco importante)
No se identifica ningún error en los enlaces alternate/hreflang.
Otras Metaetiquetas
(Poco importante)
No se detecta ninguna metaetiqueta de paginación rel next en la página.
No se detecta ninguna metaetiqueta de paginación rel prev en la página.
Dominio
(Poco importante)
El dominio no es un subdominio.
La longitud del nombre del dominio es buena.
El dominio no contiene caracteres especiales.
URL de la página
(Poco importante)
No se detecta ningún parámetro dinámico en la URL.
No se detecta ningún ID de sesión en la URL.
La URL no contiene demasiados subdirectorios.
Codificación de caracteres
(Poco importante)
La codificación de caracteres (UTF-8) ha sido declarada correctamente.
Doctype
(Deseable)
La etiqueta doctype HTML 5 está configurada correctamente.
La declaración del doctype se ubica al inicio del código HTML.
Favicon
(Deseable)
El favicon está enlazado correctamente.

Metaetiquetas

NombreValor
descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
facebook-domain-verificationl349mr2tyecyl7w3a1146378lqxru1
MobileOptimizedwidth
HandheldFriendlytrue
viewportwidth=device-width, initial-scale=1.0
langen-us
twitter:cardsummary_large_image
twitter:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
twitter:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
twitter:site@proofpoint
twitter:urlhttps://www.proofpoint.com/us
twitter:imageVacío
og:site_nameProofpoint
og:typewebsite
og:urlhttps://www.proofpoint.com/us
og:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
og:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
og:imageVacío
og:image:urlVacío
og:image:secure_urlVacío
charsetutf-8

¡Analiza ya gratis hasta 1.000 páginas de proofpoint.com!

Registrarme Gratis
Puedes usar la suscripción Básica por tiempo ilimitado.

Calidad de la página

Contenido
(Extremadamente importante)
Algunas palabras del título no se repiten en el cuerpo del texto.
El número total de palabras en la página es bueno: 1405 palabras.
Un 25.3% del contenido está constituido por palabras vacías.
Las palabras del encabezado H1 también aparecen en el cuerpo del texto.
La página contiene un listado, lo que indica una buena estructuración del contenido.
Se han encontrado 9 párrafos en esta página.
No se detecta ningún placeholder de texto ni imagen.
No se detecta contenido duplicado.
La cantidad media de palabras por frase es buena: 17.63 palabras.
Frames
(Extremadamente importante)
Esta página no utiliza ningún frameset.
Optimización para móviles
(Poco importante)
Esta página carga 11 archivos JavaScript. Esto puede afectar negativamente a la velocidad de carga.
El valor de la etiqueta viewport es correcto: (width=device-width, initial-scale=1.0).
Al menos un icono de Apple-Touch ha sido especificado.
Etiquetas Bold y Strong
(Poco importante)
Algunas etiquetas se repiten, como por ejemplo: products.
Optimización de imágenes
(Poco importante)
La descripción del atributo ALT se utiliza correctamente en todas las imágenes rastreadas.
Redes Sociales
(Deseable)
Esta página apenas ofrece posibilidades de compartir el contenido en redes sociales. Con la integración de widgets puedes conseguir que tus contenidos se popularicen en redes.
Etiquetas markup adicionales
(Deseable)
No se detecta ninguna etiqueta markup (de Schema.org) adicional.
HTTPS
(Poco importante)
El sitio utiliza HTTPS para transferir datos de forma segura.
Todos los archivos incluidos se transfieren a través de HTTPS.

Estructura de la página

Encabezado H1
(Extremadamente importante)
The leader in human-centric cybersecurity
El encabezado H1 es óptimo.
Encabezados
(Importante)
Algunos de los encabezados H se repiten dos veces.
En la estructura de los encabezados H faltan uno o varios niveles.
Hay 29 encabezados H en esta página. La cantidad de encabezados debería guardar una mejor proporción en relación al texto.
Algunos encabezados H están vacíos.

Estructura de los encabezados

Jerarquía de encabezadosContenido
H1 The leader in human-centric cybersecurity
H2 Today’s integrated cyber attacks target people, not just technology
H2 Half a million customers, including 87 of the Fortune 100, trust Proofpoint.
H2 We’re recognized as an industry leader by leading analyst firms and customers alike.
H2 Encabezado vacío
H2 The latest industry insights, reports
 and press releases
H2 Start protecting your people today
H3 Solutions By Use Case
H3 Solutions By Industry
H3 Proofpoint vs. the competition
H3 Partners
H3 Resources
H3 Company
H3 Protect People
H3 Mitigate Human Risk
H3 Defend Data
H3 Nexus AI
H3 Products Protect People
H3 Protect People Texto duplicado
H3 Products Defend Data
H3 Defend Data Texto duplicado
H3 Products Mitigate Human Risk
H3 Mitigate Human Risk Texto duplicado
H3 HOW WE DO IT Nexus AI
H3 Nexus AI Texto duplicado
H3 More than One-Quarter of the Global 2000 Are Not Ready for Upcoming Stringent Email Authentication Rules
H5 Proofpoint is Recognized as a 2024 Gartner® Peer Insights™ Customers’ Choice for Data Loss Prevention
H5 Proofpoint Recognized as Overall Market Leader Frost Radar™: Email Security, 2024
H5 Cybersecurity Awareness Kit
H5 Proofpoint Announces Availability of its Human-Centric Security Solutions in AWS Marketplace
Algunos textos ancla son demasiado largos.
Algunos enlaces internos contienen parámetros dinámicos. Las URL internas no deberían contener parámetros dinámicos, salvo que estén marcadas como nofollow.
Algunos textos ancla se repiten más de una vez en varios enlaces.
Hay 1 links con un texto ancla que no es suficientemente relevante.
La cantidad de enlaces internos es adecuada.
Hay 17 enlaces externos en esta página.
EnlacePropiedadesTexto ancla
https://www.proofpoint.com/usTexto ancla Skip to main content
https://www.proofpoint.com/usProofpoint
/us/contactContact
/us/products/protect-peopleProtect People Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.
/us/products/threat-defenseEmail Security
/us/products/impersonation-pro...Impersonation Protection
/us/products/defend-dataDefend Data Transform your information protection with a human-centric, omni-channel approach.
/us/products/data-loss-preventionEnterprise DLP
/us/products/adaptive-email-dlpAdaptive Email DLP
/us/products/insider-threat-ma...Insider Threat Management
/us/products/compliance-and-ar...Intelligent Compliance
/us/products/mitigate-human-riskSecurity Awareness
/us/products/premium-servicesManaged Services
/us/products/packagesProduct Packages
/us/products/identity-protectionAccount Take-Over and Identity Protection
/us/products/adaptive-email-se...Adaptive Email Security
/us/products/email-security-an...Secure Email Relay
/us/solutions/email-authentica...Authenticate Your Email
/us/solutions/combat-email-and...Combat Email and Cloud Threats
/us/solutions/federalFederal Government
/us/solutions/state-and-local-...State and Local Government
/us/compareComparing Proofpoint Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
/us/solutions/change-user-beha...Change User Behavior
/us/solutions/combat-data-loss...Combat Data Loss and Insider Risk
/us/solutions/enable-intellige...Modernize Compliance and Archiving
/us/solutions/protect-cloud-appsProtect Cloud Apps
/us/solutions/prevent-loss-fro...Prevent Loss from Ransomware
/us/solutions/secure-microsoft...Secure Microsoft 365
/us/solutions/higher-education...Higher Education
/us/solutions/financial-servic...Financial Services
/us/solutions/healthcare-infor...Healthcare
/us/solutions/mobile-message-s...Mobile Operators
/us/solutions/email-security-s...Internet Service Providers
/us/solutions/protection-compl...Small and Medium Businesses
/us/compare/proofpoint-vs-abno...Proofpoint vs. Abnormal Security
/us/compare/proofpoint-vs-mime...Proofpoint vs. Mimecast
/us/compare/proofpoint-vs-ciscoProofpoint vs. Cisco
/us/compare/proofpoint-vs-micr...Proofpoint vs Microsoft
/us/compare/proofpoint-vs-micr...Proofpoint vs. Microsoft Purview
/us/compare/proofpoint-vs-lega...Proofpoint vs. Legacy DLP
https://partners.proofpoint.com/Externo Subdominio Channel Partners
/us/partners/trusted-data-solu...Archive Extraction Partners
/us/global-system-integrator-g...GSI and MSP Partners
/us/partners/technology-allian...Technology and Alliance Partners
/us/partners/digital-risk-and-...Social Media Protection Partners
/us/channel-partners-small-and...Proofpoint Essentials Partner Programs
https://partners.proofpoint.co...Externo Subdominio Become a Channel Partner
/us/resourcesResource Library
/us/blogBlog
/us/webinarsWebinars
/us/cybersecurity-academyCybersecurity Academy
/us/podcastsPodcasts
/us/new-perimetersNew Perimeters Magazine
/us/threat-referenceThreat Glossary
/us/eventsEvents
/us/customer-storiesCustomer Stories
/us/company/aboutAbout Proofpoint
/us/why-proofpointWhy Proofpoint
/us/company/careersCareers
/us/newsroomNews Center
/us/legal/trustPrivacy and Trust
/us/legal/esgEnvironmental, Social, and Governance
/us/support-servicesSupport
/us/search?content[query]=Emai...Texto duplicado Email Security
/us/search?content[query]=Phis...Phishing
/us/search?content[query]=DLPDLP
/us/search?content[query]=Emai...Email Fraud
https://proofpoint.my.site.com...Nueva ventana Externo Subdominio Support Log-in
https://proofpointcybersecurit...Nueva ventana Externo Subdominio Proofpoint Cybersecurity Academy
https://digitalrisk.proofpoint...Nueva ventana Externo Subdominio Digital Risk Portal
https://emaildefense.proofpoin...Nueva ventana Externo Subdominio Email Fraud Defense
https://threatintel.proofpoint...Nueva ventana Externo Subdominio ET Intelligence
https://us1.proofpointessentia...Nueva ventana Externo Subdominio Proofpoint Essentials
https://proofpointcommunities....Nueva ventana Externo Subdominio Sendmail Support Log-in
https://www.proofpoint.com/usEnglish (Americas)
https://www.proofpoint.com/ukEnglish (Europe, Middle East, Africa)
https://www.proofpoint.com/auEnglish (Asia-Pacific)
https://www.proofpoint.com/esEspañol
https://www.proofpoint.com/deDeutsch
https://www.proofpoint.com/frFrançais
https://www.proofpoint.com/itItaliano
https://www.proofpoint.com/brPortuguês
https://www.proofpoint.com/jp日本語
https://www.proofpoint.com/kr한국어
/us/events/protectLearn more
/us/free-trial-requestGet In Touch
/us/events/protectFeatured Event Protect 2024: Join us to begin your human-centric cybersecurity journey.
IMG-ALT Protect 2024
/us/reduce-insider-risk/inside...Featured Starter Pack Find everything you need to get started with a proactive approach to insider threats.
IMG-ALT ITM Starter Pack
https://go.proofpoint.com/Powe...Externo Subdominio Featured Virtual Event Series Proofpoint Power Series - Powering up the security community
IMG-ALT Proofpoint Power Series - Powering Up the Security Community
https://www.proofpoint.com/usTexto ancla The Challenge
https://www.proofpoint.com/usTexto ancla Texto duplicado Why Proofpoint
https://www.proofpoint.com/usTexto ancla The Proof
https://www.proofpoint.com/usTexto ancla Customers
https://www.proofpoint.com/usTexto ancla The Latest
/us/products/protect-peopleLearn More
/us/products/defend-dataTexto duplicado Learn More
/us/products/mitigate-human-riskTexto duplicado Learn More
/us/newsroom/press-releases/pr...News Article 04.11.24 Proofpoint is Recognized as a 2024 Gartner® Peer Insights™ Customers’ Choice for Data Loss Prevention
IMG-ALT Gartner
/us/resources/analyst-reports/...Resource Proofpoint Recognized as Overall Market Leader Frost Radar™: Email Security, 2024
IMG-ALT Frost Radar
/us/customer-storiesView all customer stories
/us/blog/email-and-cloud-threa...Texto ancla no relevante
Read More
/us/resources/awareness-materi...Resource Cybersecurity Awareness Kit
IMG-ALT cybersecurity awareness month
/us/newsroom/press-releases/pr...News Article 05.02.24 Proofpoint Announces Availability of its Human-Centric Security Solutions in AWS Marketplace
IMG-ALT About Proofpoint
/us/contactGet in Touch
/us/products/protect-peopleProtect People
/us/products/defend-dataDefend Data
/us/products/mitigate-human-riskMitigate Human Risk
/us/products/premium-servicesPremium Services
https://proofpoint.my.site.com...Nueva ventana Externo Subdominio Product Support Login
/us/support-servicesSupport Services
https://ipcheck.proofpoint.com/Nueva ventana Externo Subdominio IP Address Blocked?
/us/eventsAttend an Event
/us/contactContact Us
/us/free-demo-requestFree Demo Request
/us/company/aboutTexto duplicado About Proofpoint
/us/why-proofpointTexto duplicado Why Proofpoint
/us/company/careersTexto duplicado Careers
/us/leadership-teamLeadership Team
/us/newsroomTexto duplicado News Center
/us/legal/trustTexto duplicado Privacy and Trust
https://www.proofpoint.com/usSin texto
/us/legal/licenseTerms and conditions
/us/legal/privacy-policyPrivacy Policy
/us/sitemapSitemap
http://www.facebook.com/proofp...Nueva ventana Externo Subdominio Sin texto
http://www.twitter.com/proofpointNueva ventana Externo Subdominio Sin texto
https://www.linkedin.com/compa...Nueva ventana Externo Subdominio Sin texto
https://www.youtube.com/channe...Nueva ventana Externo Subdominio Sin texto
https://www.instagram.com/proo...Nueva ventana Externo Subdominio Sin texto

Configuración del servidor

Redirecciones HTTP
(Extremadamente importante)
Esta página redirige a "https://www.proofpoint.com/us".
Cabecera HTTP
(Importante)
La cabecera X-Powered-by no se envía en la cabecera de la página.
Esta página utiliza GZip para la transmisión de datos comprimidos.
Rendimiento
(Poco importante)
Con 1,22 segundos, el tiempo de respuesta de la página es superior al límite recomendado de 0,4 segundos. Un tiempo de respuesta elevado ralentiza innecesariamente el rastreo de los buscadores y propicia una mala experiencia de uso.
Esta página carga 11 archivos JavaScript. Esto puede afectar negativamente a la velocidad de carga.
Esta página solo carga 2 archivos CSS, lo cual está bien.
El tamaño HTML de la página es adecuado: 91 kB.

Cabecera HTTP

NombreValor
etagW/"1725676195-gzip"
last-modifiedSat, 07 Sep 2024 02:29:55 GMT
content-typetext/html; charset=UTF-8
content-length16911
content-encodinggzip
cache-controlmax-age=56529, public
expiresSun, 08 Sep 2024 20:28:48 GMT
dateSun, 08 Sep 2024 04:46:39 GMT
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-permitted-cross-domain-policiesnone
x-imperva-purge-tagsfk0h,2171,rsmc,0plh,r6o8,li2r,ebfb,unor,vunp,j093,jamf,p7tt,khv0,8qo7,eken,6bqn,bvs8,5hj9,iraa,1a9q,5idp,t2gt,mq1l,sg0n,hpm4,gqk3,geaj,0q09,49mb,ta08,6o2q,b47l,dakn,u7nb,oe85,3han,k1g7,60ne,q9bn,b0ik,hpj1,8g9j,87nt,4uej,dk80,7nqj,lvpg,70b2,njk3,b3jk,gl8k,p50t,jqk2,rb8c,l4sn,1bmv,ihdg,7c4s,l9j8,is2d,a443,dt9q,sihn,5mgr,e4s0,um5n,0i9v,7lpb,q7jj,97js,pmf2,bevd,vkr1,rhcc,ajkr,h51a,8p0e,kn7e,vkns,617g,oloi,cd3i,ageb,65b6,n7th,13r5,bpno,o8qk,hqc1,72h3,m5is,0kui,qdrp,3vgh,87u3,mm8h,nerf,og9b,8jv9,2hd8,4edn,5m2b,srfq,cc6e,seu2,pup5,r2nb,bk7t,d9gk,e37u,003h,d7bv,jr7i,hbge,vrvr,5hoc,ciei,le63,q574,ufnb,h8s9,shg1,k0qo,ilg5,qfnt,6u82,uc0p,nmot,shcs,vkkb,v2on,prna,bn8e,jo4m,l2u0,5cr3,80b8,mu60,us5v
content-security-policydefault-src 'self' blob:; script-src 'self' 'unsafe-inline' 'unsafe-eval' blob: https://www.google-analytics.com/analytics.js https://www.googleoptimize.com/optimize.js https://www.googletagmanager.com https://munchkin.marketo.net https://app-abj.marketo.com https://www.googleadservices.com https://googleads.g.doubleclick.net https://geoip-js.com https://ads.avocet.io https://trk.techtarget.com https://j.6sc.co/6si.min.js https://tags.srv.stackadapt.com https://ads.avct.cloud https://js.driftt.com https://js-agent.newrelic.com https://bam.nr-data.net https://cdn.jsdelivr.net/simplemde/latest/simplemde.min.js https://cdn.jsdelivr.net/npm/@json-editor/json-editor@latest/dist/jsoneditor.min.js https://js.adsrvr.org/up_loader.1.1.0.js https://go.affec.tv https://bat.bing.com/bat.js https://s7.addthis.com/js/300/addthis_widget.js https://m.addthis.com https://z.moatads.com https://cdn.jsdelivr.net/npm/datalist-polyfill@latest/datalist-polyfill.min.js https://snap.licdn.com https://tracking.g2crowd.com https://bat.bing.com https://connect.facebook.net https://tags.srv.stackadapt.com https://widget.spreaker.com *.visualwebsiteoptimizer.com app.vwo.com *.sharethis.com https://unpkg.com/dropzone@5/dist/min/dropzone.min.js https://d1hgczpbubj217.cloudfront.net/video-widget/ https://www.youtube.com/ https://app-static.turtl.co/embed/turtl.embed.v1.js https://js.zi-scripts.com/zi-tag.js *.mutinycdn.com https://www.clarity.ms; object-src 'self'; style-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com s3.amazonaws.com *; img-src 'self' 'unsafe-inline' data: blob: *.visualwebsiteoptimizer.com chart.googleapis.com wingify-assets.s3.amazonaws.com app.vwo.com * *.mutinycdn.com; media-src 'self'; frame-src 'self' 'unsafe-inline' app.vwo.com *.visualwebsiteoptimizer.com *; frame-ancestors 'self' https://app.mutinyhq.com; child-src 'self' 'unsafe-inline' blob:; worker-src 'self' blob:; font-src 'self' 'unsafe-inline' data: *; connect-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com * *.mutinyhq.com *.mutinyhq.io *.mutinycdn.com; report-uri /report-csp-violation
referrer-policyorigin-when-cross-origin
feature-policygeolocation 'self'
set-cookie187 Caracteres
strict-transport-securitymax-age=31536000; includeSubDomains; preload
x-cdnImperva
x-iinfo2-18720284-0 0CNN RT(1725770798677 691) q(0 -1 -1 0) r(0 -1)
statuscode200
http_versionHTTP/1.1

Factores externos

Listas negras
(Deseable)
Esta página no está clasificada como “contenido para adultos”.
Wikipedia enlaza esta página en sus fuentes.
Esta página recibe enlaces de calidad de otros sitios web.
Esta página recibe backlinks de 1.424 dominios de referencia.
Esta página recibe un total de 23.465 backlinks.
Esta página recibe backlinks de 1.108 direcciones IP distintas.
Popularidad en Facebook
(Poco importante)
Esta página tiene 0 compartir y comentarios en Facebook.

Robots.txt

#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used:    http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/robotstxt.html

User-agent: *
Crawl-delay: 10
# CSS, JS, Images
Allow: /core/*.css$
Allow: /core/*.css?
Allow: /core/*.js$
Allow: /core/*.js?
Allow: /core/*.gif
Allow: /core/*.jpg
Allow: /core/*.jpeg
Allow: /core/*.png
Allow: /core/*.svg
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /profiles/*.svg
Allow: /misc/*.css$
Allow: /misc/*.css?
Allow: /misc/*.js$
Allow: /misc/*.js?
Allow: /misc/*.gif
Allow: /misc/*.jpg
Allow: /misc/*.jpeg
Allow: /misc/*.png
Allow: /modules/*.css$
Allow: /modules/*.css?
Allow: /modules/*.js$
Allow: /modules/*.js?
Allow: /modules/*.gif
Allow: /modules/*.jpg
Allow: /modules/*.jpeg
Allow: /modules/*.png
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /themes/*.css$
Allow: /themes/*.css?
Allow: /themes/*.js$
Allow: /themes/*.js?
Allow: /themes/*.gif
Allow: /themes/*.jpg
Allow: /themes/*.jpeg
Allow: /themes/*.png
# Directories
Disallow: /core/
Disallow: /profiles/
# Files
Disallow: /README.txt
Disallow: /web.config
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /INSTALL.sqlite.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
Disallow: /sites/default/files/*gtd-*.pdf
Disallow: /sites/default/files/*lgy-*.pdf
Disallow: /thank-you-*
Disallow: /sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf
Disallow: /sites/default/files/mail-routing-agent-datasheet-v2.pdf
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /filter/tips
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
Disallow: /user/logout/
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register*
Disallow: /user/password*
Disallow: /user/login*
Disallow: /user/logout*
Disallow: /events/*
Disallow: /upcoming-events/*
Disallow: /lp/*
Disallow: /conquer
Disallow: /merck
Disallow: /johnson-controls
Disallow: /baxter
Disallow: /sutter-health
Disallow: /chevron
Disallow: /meeting-request
# Paths (no clean URLs)
Disallow: /index.php/admin/
Disallow: /index.php/comment/reply/
Disallow: /index.php/filter/tips
Disallow: /index.php/node/add/
Disallow: /index.php/search/
Disallow: /index.php/user/password/
Disallow: /index.php/user/register/
Disallow: /index.php/user/login/
Disallow: /index.php/user/logout/
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=filter/tips/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/
Disallow: /?q=user/logout/
Disallow: /?q=events/*
Disallow: /?q=upcoming-events/*
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-dr-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-de-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/RemoteWorkAlliance_Webinar.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dr-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-calculated-risks.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-ja-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/misc/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/infographics/Pfpt-Phishing%20Infographic%20Poster-17x24-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-calculated-risks.pdf
Disallow: /sites/default/files/white-papers/gtyd-pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-es-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/securityawarenesskit/Cybersecurity-Awareness-Kit-BEC.zip
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-eval_2020-evaluation-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-us-tr-healthcare-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-jp-a4-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-es-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-fr-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-it-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-setting-up-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-a4-sb-solutions-bundles_201111a.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-cyber-risk-alliance-research-report.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-uk-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-au-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-de-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-setting-up-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-radicati-secure-email-gateway-market-quadrant-2020.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview-v5.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-fr-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-uk-eb-role-of-itm.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-a4-da-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3754_fr_RethinkingIT_GIG_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3773_FinServ_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-FinServ_eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-healthcare-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/misc/pfpt-2020-type2-soc2-report-clickwrap.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-healthcare-report.pdf
Disallow: /sites/default/files/2020-05/pfpt-us-wp-how-proofpoint-helps-organizations-meet-NIST-cybersecurity-guidelines.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaborations.pdf
Disallow: /sites/default/files/2020-06/pfpt-us-eb-the-definitive-email-security-guide.pdf
Disallow: /sites/default/files/ciso_ebook_sponsored_by_proofpoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-financial-services-and-insurance.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector-.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-uk-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-de-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-fr-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/Proofpoint-jp-a4-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/0503-001-01-01-pfpt-A4-e-book-youve-got-BEC-JP-30APR2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-overview.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/220252.37-pfpt-jp-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-business-impact-brief.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-us-wp-people-centric-cybersecurity-federal-perspective.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-wp-a4-people-centric-approach-insider-threat-management-3.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/misc/pfpt-es-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-macdonald_20210426a.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-mcdonald_20210426a.pdf
Disallow: /sites/default/files/misc/Password%20Day%20Awareness%20Kit.zip
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-us-wp-getting-started-with-casb-v33.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security-v3.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-frost-sullivan-guarding-the-virtual-doorway.pdf
Disallow: /sites/default/files/awareness-materials/Email%20Fraud%20and%20Security%20Awareness%20Kit%202021.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_0.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-vpn-securing-your-remote-workforce.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-segasammy_20210622.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/event-materials/210713_CYBERGYMxProofpoint.zip
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/event-materials/210713Webinar_Crowdstrike-Netskope-Okta-Proofpoint.zip
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-three-information-protection-use-cases-in-the-cloud-era.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ige-modern-blueprint-to-information-protection.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-japanese-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2020-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-esg-ediscovery-market-trends-and-challenges.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-user-risk-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-sullivan-market-leadership-award.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-a-strategic-approach-to-zero-trust-security-the-spectra-alliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/misc/2021%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-fall-winter-2021-threat-update.pdf
Disallow: /sites/default/files/e-books/biggest-and-boldest-insider-threats-2020-2021-jp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-paper-fed-58.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/awareness-materials/DE_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/awareness-materials/UK_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-getting-started-with-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-youve-got-bec.pdf
Disallow: /sites/default/files/misc/ISMG%20-%20Proofpoint%20-%20Matt%20Cooke%20eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-social-media-threats-ismg.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-current-state-of-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-making-sense-of-sase-and-sse.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-spotlight-higher-education.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-%20dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-crowd.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-jan-2022.xlsx
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-risk-and-resilience.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/infographics/PP_jp_InsiderThreat_Infographic_final_ysohta0309a.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-report-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-gartner-how-to-succeed-with-data-classification.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-dlp-right.pdf
Disallow: /sites/default/files/threat-reports/2022-CISO-REPORT_Final_jp_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/white-papers/pfpt-kr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity%20Awareness%20Kit_jp.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20190724.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-20180806.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-20180521.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-20201110.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-20171006.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-20190516.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-premium-support-for-cloudmark-products.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program-202103.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula-20201009.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions-201108.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-protection-audit-and-compliance-policy-20220502.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla-201603.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program-2019.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-customer-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-japan.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-eu.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-uk.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-essentials-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-digital-risk-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-cloud-security-platform-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-web-security-sla-20220429.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla-20220426.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement-20220407_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-partner-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-compliant-policy-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-disclosure-statement-20220419.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cloudmark-smc-cpsaas-sla-20200827.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-itm-saas-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-presigned-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-idta-20220409.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-data-processing-presigned-addendum.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-data-sensitivity.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook_2020-b.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-and-web-attacks.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment-20201028.pdf
Disallow: /sites/default/files/legal-documents/pfpt-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-third-party-providers-and-subprocessors-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-customer-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-partner-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc-202208.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-wp-ebook-third-party-oauthpps-qa-security-checklist.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-managed-services-for-information-protection.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-UAE-REPORT-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-misc-guide-to-global-digital-comm-regs.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-amendment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-sg-eb-user-risk-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-spr-summ-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-px-sla.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-securing-microsoft-365.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Cybersecurity-Deutschland-Menschen-Daten-besser-sch%C3%BCtzen.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-uk-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum.pdf
Disallow: /sites/default/files/misc/pfpt-jp-cs-psat-iris-ohyamama_20220916a_FINAL_wo.address.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-iris-ohyamama.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-ITM-Softbank_20221024a.pdf
Disallow: /sites/default/files/white-papers/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-sla.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-avoid-mistakes-that-expose-data.pdf
Disallow: /sites/default/files/misc/2022%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-covid-research_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-complaint-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Italy-CISO-Survey.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-email-fraud-defense.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-jgc-holdings.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-a4-rpt-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-pt-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ch-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-law-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-casb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-gettting-started-with-dmarc.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-2023-security-awareness-study.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit_2023_jp.zip
Disallow: /sites/default/files/e-books/Proofpoint-Cybersecurity-ABC-Picturebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/analyst-reports/Frost%20Radar%20-%20Email%20Security%2C%202022%2C%20ProofPoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/misc/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-ko-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp_20230310a.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-zero-trust.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2022.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-sb-securing-the-messenger.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-report_2023.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-202112-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change..pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-%28poc%29-terms-of-use.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-terms-of-use_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-poc-terms-of-use.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-board-perspective-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-in-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-sep-2023.docx
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-ds-threat-response-auto-pull_2310.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-on-thin-ices.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inbound-outbound.pdf
Disallow: /sites/default/files/white-papers/pfpt-en-wp-achieving-cyber-resiliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-customer-agreement-for-aws-marketplace.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shiseido.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2023-issue-6.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-5.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-4.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-3.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-2.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-1.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/%20pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/white-papers/PROO6061_jp_Ransomware_Survival_Guide_A4.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-website-support-services-exhibit.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/pfpt-a4-eb-definitive-email-security-strategy-guide-180514.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-singapore-personal-data-protection-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gramm-leach-bliley-act-safeguards-rule-new-breach-reporting-requirements-for-non-bank-financial-institutions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cyber-incident-reporting-for-critical-infrastructure-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-prc-data-privacy-framework.pdf
Disallow: /sites/default/files/proofpoint_best_practices_for_writing_secure_ios_and_android_apps_whitepaper-a4-jp-cm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-transforming-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-may-2024.docx
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-2024-report.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-efd-interspace.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit-Guide-2024-jp.zip
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata_240806.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-au-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shueisha.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/securityawarenesskit/2024-Proofpoint-Cybersecurity-Awareness-Kit-jp.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-information-protection-rfp-rfi-template-september-2024.docx
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-browser-isolation.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-partner-dpa.pdf
Sitemap: https://www.proofpoint.com/us/sitemap.xml
Sitemap: https://www.proofpoint.com/uk/sitemap.xml
Sitemap: https://www.proofpoint.com/fr/sitemap.xml
Sitemap: https://www.proofpoint.com/de/sitemap.xml
Sitemap: https://www.proofpoint.com/es/sitemap.xml
Sitemap: https://www.proofpoint.com/jp/sitemap.xml
Sitemap: https://www.proofpoint.com/au/sitemap.xml
Sitemap: https://www.proofpoint.com/it/sitemap.xml
Sitemap: https://www.proofpoint.com/br/sitemap.xml
Sitemap: https://www.proofpoint.com/kr/sitemap.xml

Snippet (vista previa de los resultados de búsqueda)

www.proofpoint.com
Enterprise Cybersecurity Solutions, Services & Training | Proof...
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.

Palabras clave más importantes

Se han encontrado las siguientes palabras clave. Comprueba si esta página está bien optimizada para cada palabra clave en concreto.

Palabra claveResultadoComprobar
Cybersecurity79%Check
Proofpoint74%Check
Cybersecurity Solutions73%Check
Solutions68%Check
Email Security68%Check
Enterprise Cybersecurity Solutions67%Check
human-centric cybersecurity66%Check
cyber attacks66%Check
human-centric security66%Check
Proofpoint US66%Check

¡Analiza ya gratis hasta 1.000 páginas de proofpoint.com!

Registrarme Gratis
Puedes usar la suscripción Básica por tiempo ilimitado.

Política de cookies

Utilizamos cookies para el buen funcionamiento de nuestra web y con fines analíticos y publicitarios. Puedes activar o desactivar las cookies opcionales. Para más información consulta los siguientes enlaces.

Utilizamos estas cookies para que el sitio funcione correctamente

Con estas cookies podemos entender mejor cómo navegan las y los visitantes por nuestra web

Estas cookies nos ayudan a ofrecerte anuncios y promociones que se ajusten a tus intereses