Use Cases and Deployment Scope
We use Proofpoint primarily for email archiving for all users for the retention period of 6 years. Users are allowed to view their personal archives and we can also give access to other user archives for use cases such as an employee leaving our institution and their supervisor needing access to any ongoing email strings, including attachments. We also utilize Proofpoint's email and information protection. This includes an email firewall, allowing us to scan and allow or quarantine all emailing coming into our exchange server, and creating rules that limit what can be sent to and from our user emails. We also utilize Proofpoint's secure mail feature to encrypt all outgoing external emails. Lastly, we utilize Proofpoint's targeted attack protection as another line of defense with the email firewall to scan all incoming emails to quarantine and re-write malicious links and phishing attempts targeted at our users.
Alternatives Considered
Proofpoint Advanced Threat Protection, Proofpoint Email Protection and Proofpoint Targeted Attack Protection (TAP)
Other Software Used
Proofpoint Targeted Attack Protection (TAP), Veeam Backup for Microsoft 365