• Retail Banner


    What is the Cost?




Detect, block, guard against, and respond to threats that are viciously designed to give attackers access to your critical, sensitive information—and consequently disrupt your business.


Get the global insight and assistance you need to control your information and keep it private, reduce risk, and comply with industry and government regulations.


Meet preservation obligations and improve the efficiency of your Discovery process—across multiple divisions and geographies.

Proofpoint Products for Retail Industry

Enterprise Protection

Enterprise Protection

Guard against advanced phishing, malware, spam, and other email-borne threats


Detect and block phishing, spear phishing, watering holes and other email-borne threats


Protect your organization from malicious attackers using advertising in web pages as a delivery vehicle.


Enable automated discovery and remediation of risky content while mitigating the impact of a data breach
Threat Response

Threat Response

A single pane of glass designed from the ground up for Incident Response teams; instantly verify, prioritize and contain advanced threats and targeted attacks


Industry-Leading Data Loss Prevention & Encryption to control information that leaves your organization in your emails, social media & web file sharing


Capture, preserve, and deliver email, IM, documents, and social content—providing streamlined discovery and simplified regulatory compliance


Track, classify, monitor and control retention and disposition of data across the enterprise—regardless of where it is located


Enlist the best-in-class threat protection

Retail organizations routinely handle hundreds of thousands or even millions of credit cards as part of conducting their business.

PCI DSS information has long been a target of hackers, and so attackers routinely send phishing emails to retail organizations as an entry vector to steal that sensitive credit card information.

Retailers fight back hard in order to protect their customers and maintain trust, knowing that their retail organization is all that stands between the attackers and the private credit card information they want. In addition, retailers know the financial impact of a PCI DSS data breach: the cost of lost business can often be as expensive as the cost of the actual PCI DSS data breach itself.

Ensuring compliance with the PCI DSS requirements, Proofpoint provides the best threat protection available today against external malicious threats.

Proofpoint Enterprise Protection Key Benefits:

Proofpoint MLX Deep Content Analysis
Keep safe with accurate threat classification of phish, spam, malware, and other forms of objectionable or dangerous content.

Multilayered Virus Protection
Benefit from signature-based, anti-virus, and behavior-based zero-hour protection.

Dynamic Reputation Service
Leverage Global IP and URL reputation.

Granular, Flexible Policy Management
Experience total control and flexibility regarding your email security preferences, policies, enabled services, end user controls, alerts and reporting.

Tools for Response
Have readily available tools on hand, in case you need to react to a direct attack.

Make sure your email security solutions are protecting you against the latest threats

Protect against the modern day low-volume phishing attacks that are targeted at the volumes of credit card data and other corporate data that reside within your retail organization.

Use Proofpoint Threat Protection solutions to guard your corporate email, distributed files, and social media security—knowing that they keep your sensitive data safe and allow you to prevent, stop or respond to attacks effectively and speedily.

Acquire Email Encryption—safeguard your email

Proofpoint Encryption is easy-to-use email encryption, backed by a strong policy engine that ensures all sensitive corporate data is protected before it leaves your organization. All encrypted messages are branded to your organization's requirements.

Recipients of Proofpoint encrypted emails follow extremely simple steps to authenticate and access their messages. No pre-registration or exchange of encryption keys is required to use Proofpoint Encryption; ad-hoc email encryption is fully supported.

Ensure that your communications with your suppliers is secure

Use Proofpoint Encryption to protect your direct communications to your suppliers. At the same time, protect your relationship with them by blocking sensitive communications from being sent to unauthorized third parties.

Encrypt PANs and protect them against external malicious threats

If there is a reason PANs need to be transmitted over email, use Proofpoint Encryption to safeguard their security by encrypting them.

Benefit from sensitive document detection

Download ‘Data Breaches’ Report

Fingerprint sensitive documents like product promotions, sales announcements, and other unstructured data in order to protect that information from unauthorized or accidental transmission.

Detect sensitive data within a document—even if the document format has been changed. For example, with Proofpoint solutions you can detect a simple paragraph from a Microsoft Word document that had been copied into the body of an email, distributed file, or social media post.

Get full support for cloud-based email and social media systems (e.g., MS Office 365)

Proofpoint is available as a cloud-based data security solution and provides all the same rich functionality available as an on-premise solution. Our solution also seamlessly integrates to any cloud-based email solution, such as Microsoft's Office 365, ensuring regulatory compliance while taking advantage of the cost benefits of the cloud.


Comply easily with in-place and outbound data loss prevention and encryption

Proofpoint in-place and outbound Data Loss Prevention and Encryption helps retailers comply with Payment Card Industry (PCI) DSS requirements by accurately identifying emails containing credit card primary account numbers (PANs), and blocking or encrypting the messages before they leave the organization. PCI DSS compliance requirements also specify the need to keep virus software in place and updated. Proofpoint provides the industry’s best threat protection against modern-day, malicious threats.

Create flexible compliance policy management

Set granular policies that allow specific groups of users who employ Proofpoint Encryption to send and receive sensitive information via secure encryption—and prevent other groups from sending sensitive information altogether.

Be provided with a detailed workflow

Access a comprehensive workflow that provides detailed tracking against each incident. Compliance reviews can release messages by encrypting the messages, or leave messages blocked within the quarantine. Severe violations can be escalated for further review. The status of each incident being reviewed is then logged.

Employ flexible remediation

Allow sender-based remediation and help prevent inadvertent data loss—the origin of the vast majority of compliance issues.

Proofpoint Smart Send is a feature that gives select administrators the ability to perform sender-based remediation. For example, a buyer may by negotiating an order of a new product for the upcoming holiday season without securing the communications. Smart Send can temporarily stop this message, send a notification back to the sender alerting them of the content within the message, but then also provide direct remediation options within the notification: the ability to block that communication permanently, the ability to release that communication, or to encrypt that message before sending (if email).

Smart Send can be enabled for the entire organization or for specific groups.

Adhere to specific PCI DSS compliance requirements

Address several of the PCI DSS compliance requirements, including PCI DSS Compliance Requirement 4, which states "Encrypt transmission of cardholder data across open, public networks."

Proofpoint can accurately detect cardholder information and automatically encrypt or mitigate email, distributed files, and social media posts before leaving your organization.

Learn more about PCI DSS compliance requirements.

Ensure accurate detection of credit card primary account numbers (PANs)

Achieve accurate identification of PANs utilizing a combination of our Smart Identifiers along with proximity matching.

For example, Proofpoint's Smart Identifier for Credit Card Numbers performs the Lunh Algorithm check, but also checks for the an indicator in close proximity to the identified number, such as "CC#", "AMEX", "VISA", etc., significantly increasing the confidence level of the detection and virtually eliminating false positives.

Make use of our Smart Identifiers

Acquire our Smart Identifier technology and dramatically reduce the number of false positives. Proofpoint performs a variety of checks depending on the specific Smart Identifier, increasing the accuracy of the detection. For example, Proofpoint's Smart Identifier for credit card numbers performs the Lunh Algorithm check, which validates the checksum. This prevents any random 16-digit number from being flagged as credit card number.

Custom Smart Identifiers can easily be added as well.

ABA Routing Numbers and Social Security Number Smart Identifiers are pre-built into the Proofpoint solution.


Achieve compliance, supervision and legal discovery in a single-platform archiving solution

Employ our single-platform, FISMA-compliant archiving solution with features that help retail organizations address challenges around email storage management, eDiscovery, and regulatory compliance.

Proofpoint Enterprise Archive Key Benefits:

Industry-leading Security and Privacy
Encrypt all email messages, files and other content with keys you control through our patented DoubleBlindTM technology. This ensures that no one can access a readable form of your data without your authorized access to the encryption keys stored behind your firewall.

Fully SEC Compliant Storage
Get a secure, tamper-proof SEC email compliance storage infrastructure comprised of geographically distributed data centers, which ensures that information is available in the event of service disruption to either location. Proofpoint Enterprise Archive meets all conditions set forth in SEC Rule 17a-4 paragraph f (2) (ii).

Robust Supervisory Review for Compliance
Make use of our robust supervision review features, significantly improving the efficiency of the compliance audit process. Our solution enables greater productivity of compliance staff and improves effectiveness in identifying and routing potential policy violations that require further review or escalation.

Employ a state-of-the-art social platform for archiving

Make use of our policy-based controls to capture social content so that it can be managed as any other critical information asset would be.

Capture all social conversational content in real-time—even if a user deletes that content. This ensures that you remain compliant with specific financial regulatory obligations.

Proofpoint Social Platform for Archiving Key Benefits:

Channel-specific Modules
Use channel-specific modules that leverage existing APIs to capture content directly from the source.

Flexible Capture
Capture social content (along with associated links or attachments) for all or a subset of users to address specific requirements for specific users who must be monitored and supervised for regulatory compliance. Subsequent posts can also be captured to maintain communication threads.

Location-Aware Capture
Use APIs to capture data from original social media sources allows content to be captured regardless of where users post (e.g., web browser, iPhone, iPad, Blackberry, Android, etc.).

Advanced Compliance Capabilities
Automate and streamline critical compliance tasks. These include mapping to user-specific journaling destinations, conditionally capturing content for users, indicating record followers, and custom email tags.

Policy-based Retention
Securely store all social content in your existing information archive, thereby adhering to your corporate electronic communications retention policy.

Single Pane of Glass with Enterprise Archive
Search, discover, supervise, and report on social content alongside email and IM content.

Support for Existing Archives
Deliver social content to your existing archive, enabling you to leverage existing supervisory tools without complex archive migration. Seamlessly integrate social media content into solutions, including Symantec Enterprise Vault, EMC, Bloomberg Archiver, HP/Autonomy, Smarsh, Global Relay, and others.

Benefit from self-service for your compliance and legal teams

Achieve sustainably fast and reliable access to archived messages for improved response to regulatory inquiries and legal discovery. Proofpoint Enterprise Archive is optimized for speed.

Proofpoint Enterprise Archive is optimized for speed. Its intuitive design allows legal discovery and compliance teams to conduct self-service searches against email, instant messages, social media, and the contents of more than 400 types of attachments—with results presented in seconds.

Unlike any on-premise system, Proofpoint Enterprise Archive performs consistently and reliably, regardless of how large the data repository or how complex the search.

Also unlike any other company in the industry, Proofpoint is the only one that backs this performance with a Service Level guarantee.