Български | Català | Deutsche | Hrvatski | Čeština | Dansk | Nederlandse | English | Eesti keel | Français | Ελληνικά | Magyar | Italiano | Latviski | Norsk | Polski | Português | Română | Русский | Српски | Slovenský | Slovenščina | Español | Svenska | Türkçe | 汉语 | 日本語 |
S

sendmail.com

Registered
Page analyze update date: 2026/02/12 22:43:49
Last whois update date: 2026/01/23 21:24:01
Redirected to: www.proofpoint.com Active
Domain Status
Registered
Paid till
10.03.2027
Available from
09.04.2027
SEO Score
61.64%
90
Score achieved
146
Maximum score

Main Information

ℹ️
Title: Enterprise Cybersecurity Solutions, Services & Training | Proofpoint UK
Description: Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
Keywords: empty
Page Encoding: utf-8
Page Filesize: 103 KB

Server Information

🖥️
IP: 192.230.74.135
Location: United States,US,,,37.751,-97.822,America/Chicago
Encoding: utf-8

Whois Information

📄
domain_name: sendmail.com
update_date: 2025-02-06T10:53:51Z
update_time: 1738839231
creation_date: 1998-03-11T05:00:00Z
creation_time: 889592400
expiration_date: 2027-03-10T05:00:00Z

Whois Raw Data

📋
            Domain Name: SENDMAIL.COM
Registrar: MarkMonitor Inc.
Domain Status: client delete prohibited
Domain Status: client transfer prohibited
Domain Status: client update prohibited
Creation Date: 1998-03-11T05:00:00Z
Registry Expiry Date: 2027-03-10T05:00:00Z
Updated Date: 2025-02-06T10:53:51Z
Name Server: NS1.PROOFPOINT.COM
Name Server: NS3.PROOFPOINT.COM
Name Server: PDNS99.ULTRADNS.BIZ
Name Server: PDNS99.ULTRADNS.COM
Name Server: PDNS99.ULTRADNS.NET
Name Server: PDNS99.ULTRADNS.ORG
REGISTRAR Contact: MarkMonitor Inc.
>>> Last update of RDAP database: 2026-01-24T00:24:01Z

Robots.txt

🤖
			#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used:    http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/robotstxt.html

User-agent: *
Crawl-delay: 10
# CSS, JS, Images
Allow: /core/*.css$
Allow: /core/*.css?
Allow: /core/*.js$
Allow: /core/*.js?
Allow: /core/*.gif
Allow: /core/*.jpg
Allow: /core/*.jpeg
Allow: /core/*.png
Allow: /core/*.svg
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /profiles/*.svg
Allow: /misc/*.css$
Allow: /misc/*.css?
Allow: /misc/*.js$
Allow: /misc/*.js?
Allow: /misc/*.gif
Allow: /misc/*.jpg
Allow: /misc/*.jpeg
Allow: /misc/*.png
Allow: /modules/*.css$
Allow: /modules/*.css?
Allow: /modules/*.js$
Allow: /modules/*.js?
Allow: /modules/*.gif
Allow: /modules/*.jpg
Allow: /modules/*.jpeg
Allow: /modules/*.png
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /themes/*.css$
Allow: /themes/*.css?
Allow: /themes/*.js$
Allow: /themes/*.js?
Allow: /themes/*.gif
Allow: /themes/*.jpg
Allow: /themes/*.jpeg
Allow: /themes/*.png
# Directories
Disallow: /core/
Disallow: /profiles/
# Files
Disallow: /README.txt
Disallow: /web.config
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /INSTALL.sqlite.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
Disallow: /sites/default/files/*gtd-*.pdf
Disallow: /sites/default/files/*lgy-*.pdf
Disallow: /thank-you-*
Disallow: /sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf
Disallow: /sites/default/files/mail-routing-agent-datasheet-v2.pdf
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /filter/tips
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
Disallow: /user/logout/
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register*
Disallow: /user/password*
Disallow: /user/login*
Disallow: /user/logout*
Disallow: /events/*
Disallow: /upcoming-events/*
Disallow: /lp/*
Disallow: /conquer
Disallow: /merck
Disallow: /johnson-controls
Disallow: /baxter
Disallow: /sutter-health
Disallow: /chevron
Disallow: /meeting-request
# Paths (no clean URLs)
Disallow: /index.php/admin/
Disallow: /index.php/comment/reply/
Disallow: /index.php/filter/tips
Disallow: /index.php/node/add/
Disallow: /index.php/search/
Disallow: /index.php/user/password/
Disallow: /index.php/user/register/
Disallow: /index.php/user/login/
Disallow: /index.php/user/logout/
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=filter/tips/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/
Disallow: /?q=user/logout/
Disallow: /?q=events/*
Disallow: /?q=upcoming-events/*
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-dr-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-de-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/RemoteWorkAlliance_Webinar.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dr-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-calculated-risks.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-ja-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/misc/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/infographics/Pfpt-Phishing%20Infographic%20Poster-17x24-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-calculated-risks.pdf
Disallow: /sites/default/files/white-papers/gtyd-pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-es-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/securityawarenesskit/Cybersecurity-Awareness-Kit-BEC.zip
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-eval_2020-evaluation-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-us-tr-healthcare-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-jp-a4-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-es-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-fr-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-it-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-setting-up-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-a4-sb-solutions-bundles_201111a.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-cyber-risk-alliance-research-report.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-uk-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-au-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-de-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-setting-up-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-radicati-secure-email-gateway-market-quadrant-2020.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview-v5.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-fr-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-uk-eb-role-of-itm.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-a4-da-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3754_fr_RethinkingIT_GIG_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3773_FinServ_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-FinServ_eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-healthcare-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/misc/pfpt-2020-type2-soc2-report-clickwrap.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-healthcare-report.pdf
Disallow: /sites/default/files/2020-05/pfpt-us-wp-how-proofpoint-helps-organizations-meet-NIST-cybersecurity-guidelines.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaborations.pdf
Disallow: /sites/default/files/2020-06/pfpt-us-eb-the-definitive-email-security-guide.pdf
Disallow: /sites/default/files/ciso_ebook_sponsored_by_proofpoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-financial-services-and-insurance.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector-.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-uk-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-de-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-fr-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/Proofpoint-jp-a4-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/0503-001-01-01-pfpt-A4-e-book-youve-got-BEC-JP-30APR2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-overview.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/220252.37-pfpt-jp-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-business-impact-brief.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-us-wp-people-centric-cybersecurity-federal-perspective.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-wp-a4-people-centric-approach-insider-threat-management-3.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/misc/pfpt-es-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-macdonald_20210426a.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-mcdonald_20210426a.pdf
Disallow: /sites/default/files/misc/Password%20Day%20Awareness%20Kit.zip
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-us-wp-getting-started-with-casb-v33.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security-v3.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-frost-sullivan-guarding-the-virtual-doorway.pdf
Disallow: /sites/default/files/awareness-materials/Email%20Fraud%20and%20Security%20Awareness%20Kit%202021.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_0.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-vpn-securing-your-remote-workforce.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-segasammy_20210622.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/event-materials/210713_CYBERGYMxProofpoint.zip
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/event-materials/210713Webinar_Crowdstrike-Netskope-Okta-Proofpoint.zip
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-three-information-protection-use-cases-in-the-cloud-era.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ige-modern-blueprint-to-information-protection.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-japanese-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2020-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-esg-ediscovery-market-trends-and-challenges.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-user-risk-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-sullivan-market-leadership-award.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-a-strategic-approach-to-zero-trust-security-the-spectra-alliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/misc/2021%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-fall-winter-2021-threat-update.pdf
Disallow: /sites/default/files/e-books/biggest-and-boldest-insider-threats-2020-2021-jp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-paper-fed-58.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/awareness-materials/DE_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/awareness-materials/UK_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-getting-started-with-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-youve-got-bec.pdf
Disallow: /sites/default/files/misc/ISMG%20-%20Proofpoint%20-%20Matt%20Cooke%20eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-social-media-threats-ismg.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-current-state-of-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-making-sense-of-sase-and-sse.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-spotlight-higher-education.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-%20dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-crowd.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-jan-2022.xlsx
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-risk-and-resilience.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/infographics/PP_jp_InsiderThreat_Infographic_final_ysohta0309a.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-report-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-gartner-how-to-succeed-with-data-classification.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-dlp-right.pdf
Disallow: /sites/default/files/threat-reports/2022-CISO-REPORT_Final_jp_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/white-papers/pfpt-kr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity%20Awareness%20Kit_jp.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20190724.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-20180806.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-20180521.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-20201110.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-20171006.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-20190516.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-premium-support-for-cloudmark-products.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program-202103.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula-20201009.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions-201108.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-protection-audit-and-compliance-policy-20220502.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla-201603.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program-2019.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-customer-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-japan.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-eu.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-uk.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-essentials-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-digital-risk-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-cloud-security-platform-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-web-security-sla-20220429.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla-20220426.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement-20220407_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-partner-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-compliant-policy-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-disclosure-statement-20220419.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cloudmark-smc-cpsaas-sla-20200827.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-itm-saas-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-presigned-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-idta-20220409.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-data-processing-presigned-addendum.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-data-sensitivity.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook_2020-b.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-and-web-attacks.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment-20201028.pdf
Disallow: /sites/default/files/legal-documents/pfpt-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-third-party-providers-and-subprocessors-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-customer-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-partner-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc-202208.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-wp-ebook-third-party-oauthpps-qa-security-checklist.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-managed-services-for-information-protection.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-UAE-REPORT-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-misc-guide-to-global-digital-comm-regs.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-amendment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-sg-eb-user-risk-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-spr-summ-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-px-sla.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-securing-microsoft-365.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Cybersecurity-Deutschland-Menschen-Daten-besser-sch%C3%BCtzen.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-uk-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum.pdf
Disallow: /sites/default/files/misc/pfpt-jp-cs-psat-iris-ohyamama_20220916a_FINAL_wo.address.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-iris-ohyamama.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-ITM-Softbank_20221024a.pdf
Disallow: /sites/default/files/white-papers/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-sla.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-avoid-mistakes-that-expose-data.pdf
Disallow: /sites/default/files/misc/2022%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-covid-research_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-complaint-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Italy-CISO-Survey.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-email-fraud-defense.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-a4-rpt-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-pt-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ch-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-law-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-casb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-gettting-started-with-dmarc.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-2023-security-awareness-study.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit_2023_jp.zip
Disallow: /sites/default/files/e-books/Proofpoint-Cybersecurity-ABC-Picturebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/analyst-reports/Frost%20Radar%20-%20Email%20Security%2C%202022%2C%20ProofPoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/misc/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-ko-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp_20230310a.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-zero-trust.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2022.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-sb-securing-the-messenger.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-report_2023.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-202112-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change..pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-%28poc%29-terms-of-use.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-terms-of-use_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-poc-terms-of-use.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-board-perspective-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-in-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-sep-2023.docx
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-ds-threat-response-auto-pull_2310.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-on-thin-ices.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inbound-outbound.pdf
Disallow: /sites/default/files/white-papers/pfpt-en-wp-achieving-cyber-resiliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-customer-agreement-for-aws-marketplace.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shiseido.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2023-issue-6.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-5.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-4.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-3.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-2.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-1.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/%20pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/white-papers/PROO6061_jp_Ransomware_Survival_Guide_A4.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-website-support-services-exhibit.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/pfpt-a4-eb-definitive-email-security-strategy-guide-180514.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-singapore-personal-data-protection-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gramm-leach-bliley-act-safeguards-rule-new-breach-reporting-requirements-for-non-bank-financial-institutions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cyber-incident-reporting-for-critical-infrastructure-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-prc-data-privacy-framework.pdf
Disallow: /sites/default/files/proofpoint_best_practices_for_writing_secure_ios_and_android_apps_whitepaper-a4-jp-cm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-transforming-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-may-2024.docx
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-2024-report.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-efd-interspace.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit-Guide-2024-jp.zip
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata_240806.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-au-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shueisha.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/securityawarenesskit/2024-Proofpoint-Cybersecurity-Awareness-Kit-jp.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-information-protection-rfp-rfi-template-september-2024.docx
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-browser-isolation.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-partner-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-public-sector-under-attack.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-NIS2-directive.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-NIS2-directive.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-NIS2-directive.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-dpa.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-bank-of-yokohama.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-jgc-holdings_2024.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-securing-the-digital-identity-info-tech.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-jcb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-esg-normalyze-dspm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-leveraging-a-whole-of-state-approach-to-bolster-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/rca-documents/pfpt-technical-root-cause-analysis.pdf
Disallow: /sites/default/files/rca-documents/pfpt-ceos-note.pdf
Disallow: /sites/default/files/rca-documents/pfpt-oms-12423-rca-ceo-note.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-supplementary-contract-terms.pdf
Disallow: /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-dora-faq_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-faq.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-operational-resilience-act-faq.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-contract-terms_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-security-registered-assessors-program-email-protection.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-terms.pdf
Disallow: /sites/default/files/signing-keys/sendmail2025.asc
Disallow: /sites/default/files/e-books/pfpt-uk-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-public-sector-under-attack.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-understanding-core-email-protection-api-adaptive-email-dlp.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-data-security-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-protection-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-data-protection-exhibit.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-sansan.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/threat-reports/gartner-critical-capabilities-for-email-security-platforms-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering.pdf
Disallow: /sites/default/files/e-books/PROO6939_jp_BestPractITM_eBook_R3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-kr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-human-centric-security-force-multiplier.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-implementing-human-centric-security.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-human-centric-security-buyers-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-alignment-with-nist-cybersecurity-framework-and-nis2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula-05-25.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula-03-13-2025-fin.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-threat-protection-administrator-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-essentials-administrator-certification-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfp-en-data-security-administrator-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-course.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-course.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-exam.pdf
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-prospect.docx
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-customer.docx
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter.docx
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/security-keys/pfpt-key-proofpoint.asc
Disallow: /sites/default/files/legal-documents/pfpt-en-promise-ai-models-data.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-enterprise-dlp.pdf
Disallow: /sites/default/files/legal-documents/pft-en-supplier-code-of-conduct-final-3-15-23.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-implementing-human-centric-security.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-technical-validation-of-dspm.pdf
Disallow: /sites/default/files/white-papers/pfpt_Humancentricwhitepaperseries_JP_rev2.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-economic-benefits-prime-threat-protection-esg.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-mizuho-bank_20250613a.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-july-2025.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa-july-2025-de.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-dpa-july-2025-fr.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa-july-2025-it.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-july-2025-es.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-email-digital-platform-threats.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-ebaraseisakusho.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/legal-documents/customer-agreement-%28august-2025%29-microsoft-commercial-marketplace.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-customer-agreement-%28august-2025%29-microsoft-commercial-marketplace.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-ds-evaluators-guide-for-information-protection.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-transform-data-security.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-sb-prime-threat-protection-enterprise-solution.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-fr-ar-economic-benefits-prime-threat-protection-esg.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-de-ar-economic-benefits-prime-threat-protection-esg.pdf
Disallow: /sites/default/files/legal-documents/proofpoint_dpa_july_2025_customers_signed.pdf
Disallow: /sites/default/files/legal-documents/proofpoint_en_dpa_july_2025_customers_signed.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-2025-human-factor-phishing.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-ebaraseisakusho-20250918a.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-en-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/legal-documents/pfpt-iso27001-certificate-1274400-1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-en-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-sb-proofpoint-data-security.pdf
Disallow: /sites/default/files/e-books/Proofpoint%20Transform%20Data%20Security%20eBook_FR.pdf
Disallow: /sites/default/files/e-books/Proofpoint%20Transform%20Data%20Security%20eBook_IT.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-transform-data-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-transform-data-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-transform-data-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-transform-data-security.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-it-directors-guide-better-ms365-email-security.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-master-services-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-july-2025-customers-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-limited-dpa-clean-no-sig-box.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-customers-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dora-financial-services-addendum-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-iso27001-certificate-1274400-1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-dpa-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-dpa-signed.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-signed.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-stopping-hijacked-business-communications.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-securing-and-governing-AI-in-the-modern-enterprise-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-maximizing-security-roi.pdf
Disallow: /sites/default/files/signing-keys/sendmail2026.asc
Disallow: /sites/default/files/e-books/pfpt-us-eb-ai-email-security-nexus-microsoft.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-cosmo-hd.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-stopping-hijacked-business-communications.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-stopping-hijacked-business-communications.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-stopping-hijacked-business-communications.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-stopping-hijacked-business-communications.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-tr-data-security-landscape-report.pdf
Disallow: /sites/default/files/solution-banners/pfpt-jp-sb-human-risk-explorer_2025.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-defending-against-account-compromise.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-konoikeunyu.pdf
Sitemap: https://www.proofpoint.com/us/sitemap.xml
Sitemap: https://www.proofpoint.com/uk/sitemap.xml
Sitemap: https://www.proofpoint.com/fr/sitemap.xml
Sitemap: https://www.proofpoint.com/de/sitemap.xml
Sitemap: https://www.proofpoint.com/es/sitemap.xml
Sitemap: https://www.proofpoint.com/jp/sitemap.xml
Sitemap: https://www.proofpoint.com/au/sitemap.xml
Sitemap: https://www.proofpoint.com/it/sitemap.xml
Sitemap: https://www.proofpoint.com/br/sitemap.xml
Sitemap: https://www.proofpoint.com/kr/sitemap.xml        

SEO Audit

🔍

Technical SEO

Response Code
HTTP/1.1 200 OK
Status 200 OK - page loads correctly.
Character Encoding
Page: utf-8, Header: utf-8
Character encoding consistent between HTML and headers.
Page Size
106313 bytes
Page size acceptable for fast loading.
Resources
0 total
Optimal number of resources.
Hreflang Tags
hreflang tags
Add hreflang tags if you have multilingual content.
Robots.txt
Exists
Robots.txt file found.
Sitemap
Declared in robots.txt
Sitemap declared in robots.txt.
HTTPS
Yes
Secure HTTPS connection enabled.
Compression
gzip
Gzip or Zstd compression enabled for faster loading.
Caching
max-age=45556, public
Cache-control headers properly set.
Page Speed
5.07 ms
Excellent loading speed.

On-Page SEO

!
Title
Enterprise Cybersecurity Solutions, Services & Training | Proofpoint UK
Title too long. Reduce to 30-60 characters to avoid truncation.
Meta Description
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more. Lenght:152
Good meta description length (100-160 characters).
!
H1 Heading
0 found - ""
Add exactly one H1 heading with primary keywords.
!
Word Count
Content very short. Aim for at least 500 words for better SEO.
!
Canonical Tag
Add canonical tag to prevent duplicate content issues.
Duplicate Meta
[]
No duplicate meta tags found.
Keywords
empty
Meta keywords set (note: not used by major search engines).

Content and UX

!
Language
Add lang attribute to tag for accessibility and SEO.
Images
0 total, 0 missing ALT
All images have proper ALT text.
!
Viewport
Add viewport meta tag for mobile responsiveness.
!
Open Graph
Missing: og:title, og:description, og:image, og:url
Add missing OpenGraph tags for social media sharing: og:title, og:description, og:image, og:url
!
Structured Data
JSON-LD scripts
Add structured data (JSON-LD) for rich snippets and better SEO.

Positions in Google

Search Phrases - Google

🔍
Position Phrase Page Snippet
4send mail/
32monitor security/
50www ido uio csu ru/

Additional Services

💎