Home IT Proofpoint Essentials

Proofpoint Essentials

Enterprise-class cybersecurity for SMBs
our rating 4 out of 5 Stars

Proofpoint EssentialsProduct Overview

  1. About Proofpoint Essentials
  2. Pros of Proofpoint Essentials
  3. Cons of Proofpoint Essentials
  4. Breakdown of core features

Proofpoint Essentials product overview

Proofpoint Essentials is an enterprise-class, people-centric cybersecurity solution for small and medium businesses. It provides a modern, simplified management experience and uses the same security levels that power large and security-conscious companies.

Complementing the Proofpoint data protection and security solutions, Proofpoint Essentials equips SMBs with email security, continuity, encryption, and archiving. It offers email security protection for smaller enterprises.

Proofpoint Essentials blocks a wide range of email attacks at the connection level and filters spam and viruses. It can approve or block messages based on sender address or domain, origin IP address, attachment size or file type, and text content. It does this without requiring users to install additional software or hardware. Instead, it processes users’ incoming emails at secure and reliable data centers before reaching the client’s servers. It separates spam and viruses from legitimate messages.

Pros of Proofpoint Essentials

Back to top ↑

  • It preserves all emails and attachments and allows users to import historical emails. Users can search their own archived email and forward emails to their mailbox
  • It automatically encrypts emails, reducing potentially negative impacts of data loss.

Cons of Proofpoint Essentials

Back to top ↑

  • Some users reported that the system occasionally blocks emails that are not spam.

Breakdown of core features

Back to top ↑

Attack blocking and connection protection

Proofpoint Essentials protects against email attacks when an outbreak of harmful traffic originates from a single server. It blocks various attacks, including Directory Harvest Attacks (DHA) and denial-of-service (DoS) attacks, and it defends against significant spikes in spam or virus activity. The system detects and blocks attacks in real-time. When the software discovers an attack or unwanted probe, the source IP address is temporarily blocked. During this time, it bounces back all messages received from that address to the sender.

Spam, virus, and content filtering

The software evaluates messages passing through the filtering layer using several filters, such as Virus Blocking, Spam Filtering, and Content Filtering. Proofpoint Essentials blocks detected viruses and logs them into the system. Users can set a level for how aggressively to filter spam overall and adjust their threshold if needed. Additionally, administrators can block or allow email based on properties such as size, content, sender, and recipient.

Email spooling and Emergency Inbox

Proofpoint Essentials gives protection against email loss if the email server goes down. If the server becomes unavailable due to a crash or network connectivity problem, the system automatically spools incoming traffic to a backup server. This backup server stores data until service restoration. Moreover, the software’s Emergency Inbox is available at all times. When the server becomes available again, the Emergency Inbox unspools the traffic back to the server for delivery.

Email encryption and data loss prevention

The solution reduces the security risks by allowing administrators to create custom filters to automate the enforcement of data security policies for sensitive data. It identifies emails based on industry-relevant smart identifiers and dictionaries. Then, it takes the appropriate action, like facilitating information sending, blocking, or encryption, if needed.

(Last updated on 05/10/2022 by Liz Laurente-Ticong)

Quick Facts

  • Industry Specialties
    All Industries
  • Pricing
  • Works Best For
    Mid Sized Businesses, Small Sized Businesses


Proofpoint Essentials 1Proofpoint Essentials 2Proofpoint Essentials 3Proofpoint Essentials 4



  • Anti-virus/Anti-spam
  • Advanced Machine Learning
  • Zero Hour Filtering
  • Impostor Protection
  • Click-time Analysis
  • URL Rewrite
  • URL Sandboxing
  • Attachment Sandboxing
  • Impostor Classifier
  • SPF and DKIM
  • Inbound/Outbound Email Filtering
  • Predefined Regulatory Dictionaries/Smart IDs
  • Encryption
  • Outlook Plug-in
  • Social Media Security
  • Legal Hold and eDiscovery Management
  • Business Continuity


  • Office 365
  • API integrations

Pricing Model

  • Beginner
  • Business
  • Advanced
  • Professional


  • English