9 Integrations with Proofpoint Email Protection

View a list of Proofpoint Email Protection integrations and software that integrates with Proofpoint Email Protection below. Compare the best Proofpoint Email Protection integrations as well as features, ratings, user reviews, and pricing of software that integrates with Proofpoint Email Protection. Here are the current Proofpoint Email Protection integrations in 2026:

  • 1
    Microsoft Exchange
    Work smarter with business-class email and calendaring. Exchange helps you collaborate on your critical documents and gives you a focused inbox that prioritizes important messages and adapts to your work style, so you can get more done–faster. Get access to a more personalized inbox with helpful features and a smarter, more organized way to view and interact with email. Search enhancements give you faster and more complete results. With Add-ins, get powerful customization and extensibility, which connect you to modern services and internal line-of-business applications. Organize your time with a calendaring system that goes beyond basic scheduling of appointments and commitments. Automatically capture events from email such as flights and hotel reservations, and get suggestions about where to meet based on your location. Microsoft Exchange Online offers a hosted email service for business. Exchange Online helps protect your information with advanced capabilities.
  • 2
    BackBox

    BackBox

    BackBox

    BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
  • 3
    Intezer AI SOC
    Intezer AI SOC combines proven forensic capabilities with the adaptive reasoning of Agentic AI. The result is sub-minute triage across 100% of alerts, with less than 2% escalated for human review, a 98% verdict accuracy, and complete transparency. Intezer provides full coverage for all alert types including endpoint, network, email, identity, and cloud. Investigation outcomes are continuously fed into AI-driven detection engineering. Coverage is mapped and tracked against MITRE ATT&CK and new behavioral rules are deployed to address gaps in the detection posture. New alerting is funneled into Intezer AI SOC and creates a closed loop that continuously improves security posture over time.
  • 4
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
    Starting Price: $16 per month
  • 5
    SSLTrust

    SSLTrust

    SSLTrust

    An SSL Certificate (Secure Sockets Layer) secures all information transmitted between your website and your customers. Providing the same methods of encryption that banks, governments and the military use. Each time information is transmitted it is encrypted with 256-bit encryption or higher, which would take millions of years to crack. Also know as TLS, it is the safest ways to ensure all data sent and received to your website visitors are safe with secure connections. Having an SSL/TLS Certificate installed on your website is no longer an option in todays online world. It is a requirement. Not only do they ensure your customers information is safe, they also provide many benefits to your business online. Being experts in the field of Website Security we can help save you both time and money by offering you personalised support in choosing the right product to fit your needs, and whilst installing or setting up your chosen security products.
    Starting Price: $5.20 per user per year
  • 6
    Egress Intelligent Email Security

    Egress Intelligent Email Security

    Egress Software Technologies

    Intelligent Email Security. Our human layer security platform uses contextual machine learning, powerful encryption and analytics technologies to prevent human-activated data breaches, protect sensitive data (Egress Protect), and enable you to identify areas of risk across your email network. We use contextual machine learning and advanced DLP technologies to dynamically help employees make good security decisions. This includes detecting and preventing accidental and intentional data leaks, and ensuring the right level of protection is applied to sensitive data when it's shared with the correct recipients. We make email encryption easy using our simple plug-in or by automating protection based on your security policies. Our intelligent technology can determine the actual risk of a breach as data is shared to ensure the correct security and control is always applied. Our eDiscovery software delivers time-saving reporting and analytics across your email network.
  • 7
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 8
    Chronicle SOAR
    Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat.
  • 9
    Dune Security

    Dune Security

    Dune Security

    Dune Security is replacing legacy phishing simulations and security awareness training tools with a unified, automated User Adaptive Risk Management platform. It delivers User Adaptive Testing, Training, and Security to reduce administrative burden and mitigate risk. Unlike one-size-fits-all SAT models, Dune tailors security measures to each individual using intrinsic data (role, tenure), behavioral insights (red team testing), and analytics from a broad range of integrations (IDAM, EDR, DLP). Dune leverages the industry's most comprehensive risk scoring system to holistically assess individual risk, enabling automated, targeted remediation for high-risk users while allowing low-risk users to stay productive. This data-driven approach enhances security efficacy, streamlines operations, and strengthens overall organizational resilience.
  • Previous
  • You're on page 1
  • Next