Proofpoint.com - SEO Checker

Visión general del análisis SEO
Metadatos
80% 
Calidad de la página
47% 
Estructura
29% 
Enlazado
66% 
Servidor
70% 
Factores externos
100% 
Puntuación SEO
Tiempo de carga
0,63 s
Tamaño HTML
170,70 kB
Palabras
1875
Medios
27
Cantidad de enlaces
127 internos / 13 externos

Lista de tareas pendientes para mejorar tu SEO

Metadatos

Título
(Extremadamente importante)
Enterprise Cybersecurity Solutions, Services & Training | Proofpoint US
Con 636 píxeles, el título de esta página es demasiado largo. Optimizar el título
No se repite ninguna palabra en el título.
Meta descripción
(Extremadamente importante)
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
La longitud de la meta descripción es óptima (938 píxeles de una longitud máxima de 1000 píxeles).
Rastreabilidad
(Extremadamente importante)
No se detectan problemas para acceder al sitio web.
Redirección canónica
(Importante)
https://www.proofpoint.com/us
La página tiene una redirección canónica correcta.
Idioma
(Poco importante)
Idioma reconocido automáticamente en el contenido: en
Idioma declarado en el código HTML: en-us
Ubicación geográfica del servidor: Estados Unidos de América
El idioma ha sido correctamente declarado en el código HTML: en-us.
Enlaces Alternate/Hreflang
(Poco importante)
No se identifica ningún error en los enlaces alternate/hreflang.
Otras Metaetiquetas
(Poco importante)
No se detecta ninguna metaetiqueta de paginación rel next en la página.
No se detecta ninguna metaetiqueta de paginación rel prev en la página.
Dominio
(Poco importante)
El dominio no es un subdominio.
La longitud del nombre del dominio es buena.
El dominio no contiene caracteres especiales.
URL de la página
(Poco importante)
No se detecta ningún parámetro dinámico en la URL.
No se detecta ningún ID de sesión en la URL.
La URL no contiene demasiados subdirectorios.
Codificación de caracteres
(Poco importante)
La codificación de caracteres (UTF-8) ha sido declarada correctamente.
Doctype
(Deseable)
La etiqueta doctype HTML 5 está configurada correctamente.
La declaración del doctype se ubica al inicio del código HTML.
Favicon
(Deseable)
El favicon está enlazado correctamente.

Metaetiquetas

NombreValor
descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
facebook-domain-verificationl349mr2tyecyl7w3a1146378lqxru1
MobileOptimizedwidth
HandheldFriendlytrue
viewportwidth=device-width, initial-scale=1.0
langen-us
twitter:cardsummary_large_image
twitter:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
twitter:site@proofpoint
twitter:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
twitter:urlhttps://www.proofpoint.com/us
twitter:imageVacío
og:site_nameProofpoint
og:typewebsite
og:urlhttps://www.proofpoint.com/us
og:titleEnterprise Cybersecurity Solutions, Services & Training | Proofpoint US
og:descriptionProofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.
og:imageVacío
og:image:urlVacío
og:image:secure_urlVacío
charsetutf-8

¡Analiza ya hasta 25.000 páginas de proofpoint.com!

Probar gratis
Garantizada la gratuidad durante la fase de prueba.

Calidad de la página

Contenido
(Extremadamente importante)
Algunas palabras del título no se repiten en el cuerpo del texto.
Algunas palabras del encabezado H1 no se repiten en el cuerpo del texto.
Hay 18 textos duplicados en esta página:
  • Texto duplicado 1: As humans adopt new ways to work in a digital workspace, threat actors...
  • Texto duplicado 2: The Proofpoint human-centric security platform is the only complete se...
  • Texto duplicado 3: Protect humans with world leading AI-based detection from threats targ...
  • Texto duplicado 4: Careless users mishandle it. Malicious users walk out with it. Comprom...
  • Texto duplicado 5: Corporate identities are the root of many ways employees work—from clo...
  • Texto duplicado 6: A new human-centric approach to security awareness is needed in a worl...
  • Texto duplicado 7: Proofpoint has been named a Leader in the 2024 Gartner® Magic Quadrant...
  • Texto duplicado 8: See why Proofpoint is the only evaluated vendor to be recognized with ...
  • Texto duplicado 9: Recognized as a 2024 Gartner®️ Cool Vendor in Data Security, Proofpoin...
El número total de palabras en la página es bueno: 1875 palabras.
Un 28.1% del contenido está constituido por palabras vacías.
La página contiene un listado, lo que indica una buena estructuración del contenido.
Se han encontrado 21 párrafos en esta página.
No se detecta ningún placeholder de texto ni imagen.
La cantidad media de palabras por frase es buena: 19.11 palabras.
Frames
(Extremadamente importante)
Esta página no utiliza ningún frameset.
Optimización para móviles
(Poco importante)
Esta página carga 11 archivos JavaScript. Esto puede afectar negativamente a la velocidad de carga.
El valor de la etiqueta viewport es correcto: (width=device-width, initial-scale=1.0).
Al menos un icono de Apple-Touch ha sido especificado.
Etiquetas Bold y Strong
(Poco importante)
El uso de etiquetas de negritas en esta página es óptimo. Te recomendamos emplear hasta 38 etiquetas de negritas en una página.
Optimización de imágenes
(Poco importante)
No se detecta ninguna descripción del atributo ALT en 9 imágenes. El contenido de los atributos ALT también es evaluado como texto por los buscadores y es muy importante para la búsqueda de imágenes.
Redes Sociales
(Deseable)
Esta página está perfectamente optimizada para las redes sociales.
Etiquetas markup adicionales
(Deseable)
No se detecta ninguna etiqueta markup (de Schema.org) adicional.
HTTPS
(Poco importante)
El sitio utiliza HTTPS para transferir datos de forma segura.
Todos los archivos incluidos se transfieren a través de HTTPS.

Lista de medios

URLAtributo ALTTítulo
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...pp-drupal/assets/whypfpt-q125__arrow.svgCarece de atributo ALT
...threat-protection.png.webp?itok=ET0McVP8Proof_GartnerMagicQuadrant_03122025
...025-data-security.png.webp?itok=xyRjeiVyProof_GartnerVoiceoftheCustome
...-Security-Posture.png.webp?itok=Eb76vGfLProof_CoolVendor_03142025
...isc/Wyndham_Hotels_and_Resorts-black.svgWyndham Hotels and Resorts logo
...files/misc/Columbia_University_black.svgColumbia_University_logo
...idence-health-services_black-cropped.svgprovidence-health-services_black logo
...m-video-image-new.png.webp?itok=lAl80BuRwynham-video-image-new
...isc/Wyndham_Hotels_and_Resorts-black.svgWyndham Hotels and Resorts logo
...a-video-image-new.png.webp?itok=U_0hpuT9columbia-video-image-new
...files/misc/Columbia_University_black.svgColumbia_University_logo
...e-video-image-new.png.webp?itok=QvZBdgI_providence-video-image-new
...idence-health-services_black-cropped.svgprovidence-health-services_black logo
...orrester_Resource.png.webp?itok=vvxy92B5Forrester Report
...anners/Blog Image.png.webp?itok=RDjRN1cMDMARC-Blog-Banner
...ero-banner-mobile.png.webp?itok=Hs-9FAzOData Security Posture Management
...st/app-drupal/assets/footer_contact.webpCarece de atributo ALT

Estructura de la página

Encabezado H1
(Extremadamente importante)
The Best Email Protection Just Got Better
Más de un encabezado H1.
Encabezados
(Importante)
Algunos de los encabezados H se repiten dos veces.
Hay 57 encabezados H en esta página. La cantidad de encabezados debería guardar una mejor proporción en relación al texto.

Estructura de los encabezados

Jerarquía de encabezadosContenido
H1 The Best Email Protection Just Got Better
H1 Defend your organization from social engineering attacks
H1 Join us at Proofpoint Protect 2025
H2 We protect your people from human-targeted threats, data loss risk, and human error
H2 Two million customers including 85 of the Fortune 100 rely on Proofpoint for human-centric security
H2 Two million customers including 85 of the Fortune 100 rely on Proofpoint for human-centric security Texto duplicado
H2 We’re recognized as an industry leader by our peers and customers alike
H2 Trusted to protect the world’s leading organizations
H2 Get the latest industry insights, reports and press releases
H2 Turn people into your best defense with Proofpoint
H3 Solutions By Use Case
H3 Solutions By Industry
H3 Proofpoint vs. the competition
H3 Partners
H3 Resources
H3 Company
H3 Platform
H3 Threat Protection
H3 Stop all human-centric threats for today’s and tomorrow’s landscape
H3 Data Security & Governance
H3 Safeguard information and digital communications
H3 Data and SaaS Security Posture
H3 Contain SaaS and identity sprawl
H3 Security Awareness
H3 Provide employees with continuous guidance
H3 Threat Protection Texto duplicado
H3 Stop all human-centric threats for today’s and tomorrow’s landscape Texto duplicado
H3 Data Security & Governance Texto duplicado
H3 Safeguard information and digital communications Texto duplicado
H3 Data and SaaS Security Posture Texto duplicado
H3 Contain SaaS and identity sprawl Texto duplicado
H3 Security Awareness Texto duplicado
H3 Provide employees with continuous guidance Texto duplicado
H3 Threat Protection Texto duplicado
H3 Data Loss Prevention
H3 Data Security
H3 Wyndham blocks 99.99% of threats, significantly reducing BEC risks while employees reporting increased phishing awareness with Proofpoint ZenGuideTM.
H3 Columbia University faculty and students get a peace of mind knowing that their work is protected with Proofpoint Email DLP & Encryption.
H3 See how Providence Health effectively adapts and responds to email threats with Proofpoint's AI-driven threat intelligence and automated response.
H4 Numbers only ever tell part of the story.
H4 Threat Protection Texto duplicado
H4 Data Loss Prevention Texto duplicado
H4 Data Security Texto duplicado
H4 See why Proofpoint was named a Leader. Get the full Forrester Wave report now.
H4 Proofpoint Outpaces Gartner’s Email Security Recommendations
H4 Unlock data security success—Join the webinar to learn how to build an effective DSPM program.
H5 We are Proofpoint
H5 Protecting
H5 Of the F100
H5 Analyzing
H5 Scanning
H5 Stopping
H5 Why Proofpoint
H5 Why Proofpoint Texto duplicado
H5 THE PROOF
H5 OUR CUSTOMERS
H5 RESOURCES
Algunos enlaces internos contienen parámetros dinámicos. Las URL internas no deberían contener parámetros dinámicos, salvo que estén marcadas como nofollow.
Algunos textos ancla se repiten más de una vez en varios enlaces.
Hay 2 links con un texto ancla que no es suficientemente relevante.
La cantidad de enlaces internos es adecuada.
Ningún texto ancla es excesivamente largo.
Hay 13 enlaces externos en esta página.
EnlacePropiedadesTexto ancla
https://www.proofpoint.com/usTexto ancla Skip to main content
https://www.proofpoint.com/usProofpoint
/us/contactContact Us
/us/products/threat-protectionPrime Threat Protection Proofpoint Prime stops all human-centric threats for today’s and tomorrow’s landscape.
/us/products/email-protectionEmail Protection
/us/products/user-protectionUser Protection
/us/products/impersonation-pro...Impersonation Protection
/us/products/how-to-buyHow to Buy
/us/products/defend-dataData Security & Governance Transform your information protection with a human-centric, omni-channel approach.
/us/products/data-loss-preventionEnterprise DLP
/us/products/adaptive-email-dlpAdaptive Email DLP
/us/products/insider-threat-ma...Insider Threat Management
/us/products/digital-communica...Digital Communications Governance
/us/products/identity-protecti...Account Takeover Protection
/us/products/data-security-pos...Data Security Posture Management
/us/products/mitigate-human-riskZenGuide
/us/products/premium-servicesPremium Services
/us/products/identity-protecti...Texto duplicado Account Takeover Protection
/us/products/collab-protectionCollab Protection
/us/products/email-protection/...Email Fraud Defense
/us/products/email-security-an...Secure Email Relay
/us/solutions/ensure-acceptabl...Ensure Acceptable GenAI Use
/us/solutions/email-authentica...Authenticate Your Email
/us/solutions/combat-email-and...Combat Email and Cloud Threats
/us/solutions/federalFederal Government
/us/solutions/state-and-local-...State and Local Government
/us/compareComparing Proofpoint Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
/us/solutions/change-user-beha...Change User Behavior
/us/solutions/combat-data-loss...Combat Data Loss and Insider Risk
/us/solutions/enable-intellige...Modernize Compliance and Archiving
/us/solutions/protect-cloud-appsProtect Cloud Apps
/us/solutions/prevent-loss-fro...Prevent Loss from Ransomware
/us/solutions/secure-microsoft...Secure Microsoft 365
/us/solutions/higher-education...Higher Education
/us/solutions/financial-servic...Financial Services
/us/solutions/healthcare-infor...Healthcare
/us/solutions/mobile-message-s...Mobile Operators
/us/solutions/email-security-s...Internet Service Providers
/us/solutions/protection-compl...Small and Medium Businesses
/us/compare/proofpoint-vs-abno...Proofpoint vs. Abnormal Security
/us/compare/proofpoint-vs-mime...Proofpoint vs. Mimecast
/us/compare/proofpoint-vs-ciscoProofpoint vs. Cisco
/us/compare/proofpoint-vs-micr...Proofpoint vs. Microsoft Purview
/us/compare/proofpoint-vs-lega...Proofpoint vs. Legacy DLP
/us/channel-partners-and-distr...Channel Partners and Distributors
/us/partners/mspMSP Partners
/us/partners/trusted-data-solu...Archive Extraction Partners
/us/global-system-integrator-g...GSI Partners
/us/partners/technology-allian...Technology and Alliance Partners
/us/partners/digital-risk-and-...Social Media Protection Partners
/us/resourcesResource Library
/us/blogBlog
/us/webinarsWebinars
/us/cybersecurityacademyCybersecurity Academy
/us/podcastsPodcasts
/us/threat-referenceThreat Glossary
/us/eventsEvents
/us/customer-storiesCustomer Stories
/us/company/aboutAbout Proofpoint
/us/company/careersCareers
/us/newsroomNews Center
/us/legal/trustPrivacy and Trust
/us/legal/esgEnvironmental, Social, and Governance
/us/support-servicesSupport
/us/platformLearn More
/us/platform/nexusNexus
/us/platform/zenZen
/us/search?content[query]=Emai...Email Security
/us/search?content[query]=Phis...Phishing
/us/search?content[query]=DLPDLP
/us/search?content[query]=Emai...Email Fraud
https://proofpoint.my.site.com...Nueva ventana Externo Subdominio Support Log-in
https://proofpointcybersecurit...Nueva ventana Externo Subdominio Proofpoint Cybersecurity Academy
https://digitalrisk.proofpoint...Nueva ventana Externo Subdominio Digital Risk Portal
https://emaildefense.proofpoin...Nueva ventana Externo Subdominio Texto duplicado Email Fraud Defense
https://threatintel.proofpoint...Nueva ventana Externo Subdominio ET Intelligence
https://us1.proofpointessentia...Nueva ventana Externo Subdominio Proofpoint Essentials
https://proofpointcommunities....Nueva ventana Externo Subdominio Sendmail Support Log-in
https://www.proofpoint.com/usEnglish: Americas
https://www.proofpoint.com/ukEnglish: Europe, Middle East, Africa
https://www.proofpoint.com/auEnglish: Asia-Pacific
https://www.proofpoint.com/esEspañol
https://www.proofpoint.com/deDeutsch
https://www.proofpoint.com/frFrançais
https://www.proofpoint.com/itItaliano
https://www.proofpoint.com/brPortuguês
https://www.proofpoint.com/jp日本語
https://www.proofpoint.com/kr한국어
/us/products/email-protectionLearn more
/us/resources/threat-reports/h...Read the report
/us/events/protectRegister today
/us/customer-storiesSee customer stories
/us/products/threat-protectionTexto duplicado Learn more
/us/products/defend-dataTexto duplicado Learn more
/us/products/identity-protectionTexto duplicado Learn more
/us/products/mitigate-human-riskTexto duplicado Learn more
/us/products/threat-protectionTexto duplicado Learn more
/us/products/defend-dataTexto duplicado Learn more
/us/products/identity-protectionTexto duplicado Learn more
/us/products/mitigate-human-riskTexto duplicado Learn more
/us/resources/analyst-reports/...Get the report
/us/newsroom/press-releases/pr...Texto ancla no relevante
Read more
/us/resources/analyst-reports/...Texto duplicado Get the report
/us/resources/analyst-reports/...Texto duplicado Get the report
/us/newsroom/press-releases/pr...Texto duplicado Texto ancla no relevante
Read more
/us/resources/analyst-reports/...Texto duplicado Get the report
/customer-storiesAll customer stories
/us/customer-stories/wyndham-r...Read the story
/us/customer-stories/columbia-...Texto duplicado Read the story
/us/customer-stories/providenc...Texto duplicado Read the story
/resourcesResource library
/us/resources/analyst-reports/...Analyst Report See why Proofpoint was named a Leader. Get the full Forrester Wave report now.
IMG-ALT Forrester Report
/us/blog/email-and-cloud-threa...Blog Proofpoint Outpaces Gartner’s Email Security Recommendations
IMG-ALT DMARC-Blog-Banner
/us/resources/webinars/unlocki...Webinar Unlock data security success—Join the webinar to learn how to build an effective DSPM program.
IMG-ALT Data Security Posture Management
/us/contactGet in Touch
/us/products/protect-peopleProtect People
/us/products/defend-dataDefend Data
/us/products/mitigate-human-riskMitigate Human Risk
/us/products/premium-servicesTexto duplicado Premium Services
https://proofpoint.my.site.com...Nueva ventana Externo Subdominio Product Support Login
/us/support-servicesSupport Services
/us/ipcheckIP Address Blocked?
/us/company/aboutTexto duplicado About Proofpoint
/us/why-proofpointWhy Proofpoint
/us/company/careersTexto duplicado Careers
/us/leadership-teamLeadership Team
/us/newsroomTexto duplicado News Center
/us/legal/trustTexto duplicado Privacy and Trust
http://www.facebook.com/proofp...Nueva ventana Externo Subdominio Sin texto
https://x.com/proofpointNueva ventana Externo Sin texto
https://www.linkedin.com/compa...Nueva ventana Externo Subdominio Sin texto
https://www.youtube.com/channe...Nueva ventana Externo Subdominio Sin texto
https://www.instagram.com/proo...Nueva ventana Externo Subdominio Sin texto
/us/eventsAttend an Event
/us/contactTexto duplicado Contact Us
/us/free-demo-requestFree Demo Request
https://www.proofpoint.com/usSin texto
/us/legal/licenseTerms and conditions
/us/legal/privacy-policyPrivacy Policy
/us/sitemapSitemap

Configuración del servidor

Redirecciones HTTP
(Extremadamente importante)
Esta página redirige a "https://www.proofpoint.com/us".
Cabecera HTTP
(Importante)
La cabecera X-Powered-by no se envía en la cabecera de la página.
El servidor web transmite la página web (HTML) comprimida.
Rendimiento
(Poco importante)
Con 0,63 segundos, el tiempo de respuesta de la página es superior al límite recomendado de 0,4 segundos. Un tiempo de respuesta elevado ralentiza innecesariamente el rastreo de los buscadores y propicia una mala experiencia de uso.
Esta página carga 11 archivos JavaScript. Esto puede afectar negativamente a la velocidad de carga.
Esta página solo carga 2 archivos CSS, lo cual está bien.
El tamaño HTML de la página es adecuado: 171 kB.

Cabecera HTTP

NombreValor
etag"1753028935"
last-modifiedSun, 20 Jul 2025 16:28:55 GMT
content-typetext/html; charset=UTF-8
content-length39149
content-encodinggzip
cache-controlmax-age=33961, public
expiresMon, 21 Jul 2025 23:26:00 GMT
dateMon, 21 Jul 2025 13:59:59 GMT
content-security-policydefault-src 'self' blob:; script-src 'self' 'unsafe-inline' 'unsafe-eval' blob: https://www.google-analytics.com/analytics.js https://www.googleoptimize.com/optimize.js https://www.googletagmanager.com https://munchkin.marketo.net https://app-abj.marketo.com https://www.googleadservices.com https://googleads.g.doubleclick.net https://geoip-js.com https://ads.avocet.io https://trk.techtarget.com https://j.6sc.co/6si.min.js https://tags.srv.stackadapt.com https://ads.avct.cloud https://js.driftt.com https://js-agent.newrelic.com https://bam.nr-data.net https://cdn.jsdelivr.net/simplemde/latest/simplemde.min.js https://cdn.jsdelivr.net/npm/@json-editor/json-editor@latest/dist/jsoneditor.min.js https://js.adsrvr.org/up_loader.1.1.0.js https://go.affec.tv https://bat.bing.com/bat.js https://s7.addthis.com/js/300/addthis_widget.js https://m.addthis.com https://z.moatads.com https://cdn.jsdelivr.net/npm/datalist-polyfill@latest/datalist-polyfill.min.js https://snap.licdn.com https://tracking.g2crowd.com https://bat.bing.com https://connect.facebook.net https://tags.srv.stackadapt.com https://widget.spreaker.com *.visualwebsiteoptimizer.com app.vwo.com *.sharethis.com https://unpkg.com/dropzone@5/dist/min/dropzone.min.js https://d1hgczpbubj217.cloudfront.net/video-widget/ https://www.youtube.com/ https://app-static.turtl.co/embed/turtl.embed.v1.js https://js.zi-scripts.com/zi-tag.js *.mutinycdn.com https://www.clarity.ms https://j.6sc.co/j/81ad4853-7699-4145-be50-4c0e963c8034.js *.roundprinceweb.com https://www.redditstatic.com/ads/pixel.js https://go.proofpoint.com https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.buzzsprout.com/2445401/episodes/*.js https://www.buzzsprout.com https://extend.vimeocdn.com; object-src 'self'; style-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com s3.amazonaws.com *; img-src 'self' 'unsafe-inline' data: blob: *.visualwebsiteoptimizer.com chart.googleapis.com wingify-assets.s3.amazonaws.com app.vwo.com * *.mutinycdn.com; media-src 'self'; frame-src 'self' 'unsafe-inline' app.vwo.com *.visualwebsiteoptimizer.com *; frame-ancestors 'self' https://app.mutinyhq.com; child-src 'self' 'unsafe-inline' blob:; worker-src 'self' blob:; font-src 'self' 'unsafe-inline' data: *; connect-src 'self' 'unsafe-inline' *.visualwebsiteoptimizer.com app.vwo.com * *.mutinyhq.com *.mutinyhq.io *.mutinycdn.com; report-uri /report-csp-violation
feature-policygeolocation 'self'
referrer-policyorigin-when-cross-origin
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-permitted-cross-domain-policiesnone
set-cookie187 Caracteres
strict-transport-securitymax-age=31536000; includeSubDomains; preload
x-cdnImperva
x-iinfo14-147893742-0 0CNN RT(1753106400183 37) q(0 -1 -1 0) r(0 -1)
statuscode200
http_versionHTTP/1.1

Factores externos

Wikipedia enlaza esta página en sus fuentes.
Esta página recibe enlaces de calidad de otros sitios web.
Esta página recibe backlinks de 1.486 dominios de referencia.
Esta página recibe un total de 37.466 backlinks.
Esta página recibe backlinks de 1.186 direcciones IP distintas.

Robots.txt

#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used:    http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/robotstxt.html

User-agent: *
Crawl-delay: 10
# CSS, JS, Images
Allow: /core/*.css$
Allow: /core/*.css?
Allow: /core/*.js$
Allow: /core/*.js?
Allow: /core/*.gif
Allow: /core/*.jpg
Allow: /core/*.jpeg
Allow: /core/*.png
Allow: /core/*.svg
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /profiles/*.svg
Allow: /misc/*.css$
Allow: /misc/*.css?
Allow: /misc/*.js$
Allow: /misc/*.js?
Allow: /misc/*.gif
Allow: /misc/*.jpg
Allow: /misc/*.jpeg
Allow: /misc/*.png
Allow: /modules/*.css$
Allow: /modules/*.css?
Allow: /modules/*.js$
Allow: /modules/*.js?
Allow: /modules/*.gif
Allow: /modules/*.jpg
Allow: /modules/*.jpeg
Allow: /modules/*.png
Allow: /profiles/*.css$
Allow: /profiles/*.css?
Allow: /profiles/*.js$
Allow: /profiles/*.js?
Allow: /profiles/*.gif
Allow: /profiles/*.jpg
Allow: /profiles/*.jpeg
Allow: /profiles/*.png
Allow: /themes/*.css$
Allow: /themes/*.css?
Allow: /themes/*.js$
Allow: /themes/*.js?
Allow: /themes/*.gif
Allow: /themes/*.jpg
Allow: /themes/*.jpeg
Allow: /themes/*.png
# Directories
Disallow: /core/
Disallow: /profiles/
# Files
Disallow: /README.txt
Disallow: /web.config
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /INSTALL.sqlite.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
Disallow: /sites/default/files/*gtd-*.pdf
Disallow: /sites/default/files/*lgy-*.pdf
Disallow: /thank-you-*
Disallow: /sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf
Disallow: /sites/default/files/mail-routing-agent-datasheet-v2.pdf
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /filter/tips
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
Disallow: /user/logout/
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register*
Disallow: /user/password*
Disallow: /user/login*
Disallow: /user/logout*
Disallow: /events/*
Disallow: /upcoming-events/*
Disallow: /lp/*
Disallow: /conquer
Disallow: /merck
Disallow: /johnson-controls
Disallow: /baxter
Disallow: /sutter-health
Disallow: /chevron
Disallow: /meeting-request
# Paths (no clean URLs)
Disallow: /index.php/admin/
Disallow: /index.php/comment/reply/
Disallow: /index.php/filter/tips
Disallow: /index.php/node/add/
Disallow: /index.php/search/
Disallow: /index.php/user/password/
Disallow: /index.php/user/register/
Disallow: /index.php/user/login/
Disallow: /index.php/user/logout/
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=filter/tips/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/
Disallow: /?q=user/logout/
Disallow: /?q=events/*
Disallow: /?q=upcoming-events/*
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-dr-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-de-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/solution-briefs/RemoteWorkAlliance_Webinar.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dr-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-calculated-risks.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-ja-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-no-compromises.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-whack-a-mail.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/misc/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow: /sites/default/files/infographics/Pfpt-Phishing%20Infographic%20Poster-17x24-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-es-da-deploying-people-centric-security-3.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-calculated-risks.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-calculated-risks.pdf
Disallow: /sites/default/files/white-papers/gtyd-pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-es-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/securityawarenesskit/Cybersecurity-Awareness-Kit-BEC.zip
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-eval_2020-evaluation-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-us-tr-healthcare-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-jp-a4-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-stopping-bec-and-eac.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-es-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-fr-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-it-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-de-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-setting-up-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-a4-sb-solutions-bundles_201111a.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-cyber-risk-alliance-research-report.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-uk-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-au-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-de-ar-esg-economic-validation-sep-2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-setting-up-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-radicati-secure-email-gateway-market-quadrant-2020.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview-v5.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-itm-overview.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itm-overview-v7.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/solution-briefs/gtd-pfpt-fr-sb-CASB-adaptive-access-controls.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-it-eb-demystifying-bec-eac.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-uk-eb-role-of-itm.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-a4-da-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3754_fr_RethinkingIT_GIG_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/PROO3773_FinServ_eBook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-FinServ_eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-healthcare-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/misc/pfpt-2020-type2-soc2-report-clickwrap.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-insider-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-healthcare-report.pdf
Disallow: /sites/default/files/2020-05/pfpt-us-wp-how-proofpoint-helps-organizations-meet-NIST-cybersecurity-guidelines.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaborations.pdf
Disallow: /sites/default/files/2020-06/pfpt-us-eb-the-definitive-email-security-guide.pdf
Disallow: /sites/default/files/ciso_ebook_sponsored_by_proofpoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-healthcare-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-financial-services-and-insurance.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector-.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-uk-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-de-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/gtd-pfpt-fr-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/misc/Proofpoint-jp-a4-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide-executive-summary.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/0503-001-01-01-pfpt-A4-e-book-youve-got-BEC-JP-30APR2020.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-role-of-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-cybersecurity.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-setting-up-itm.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-es-eb-itm-overview.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/threat-reports/220252.37-pfpt-jp-a4-r-state-of-the-phish-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-business-impact-brief.pdf
Disallow: /sites/default/files/white-papers/gtd-pfpt-us-wp-people-centric-cybersecurity-federal-perspective.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/solution-briefs/pfpt-jp-wp-a4-people-centric-approach-insider-threat-management-3.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/misc/pfpt-es-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-macdonald_20210426a.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-mcdonald_20210426a.pdf
Disallow: /sites/default/files/misc/Password%20Day%20Awareness%20Kit.zip
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-us-wp-getting-started-with-casb-v33.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security-v3.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-frost-sullivan-guarding-the-virtual-doorway.pdf
Disallow: /sites/default/files/awareness-materials/Email%20Fraud%20and%20Security%20Awareness%20Kit%202021.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_0.pdf
Disallow: /sites/default/files/pfpt-it-tr-human-factor-report_1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-unmasking-bec-and-eac.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-vpn-securing-your-remote-workforce.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-segasammy_20210622.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-frost-radar-global-email-security-market-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-uk-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-au-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow: /sites/default/files/event-materials/210713_CYBERGYMxProofpoint.zip
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-beyond-the-cloud.pdf
Disallow: /sites/default/files/event-materials/210713Webinar_Crowdstrike-Netskope-Okta-Proofpoint.zip
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-three-information-protection-use-cases-in-the-cloud-era.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ige-modern-blueprint-to-information-protection.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf.pdf
Disallow: /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-bec-handbook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-japanese-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2020-2021.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-esg-ediscovery-market-trends-and-challenges.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2021-user-risk-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-frost-sullivan-market-leadership-award.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-building-a-business-case-for-itm.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-a-strategic-approach-to-zero-trust-security-the-spectra-alliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/misc/2021%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-fall-winter-2021-threat-update.pdf
Disallow: /sites/default/files/e-books/biggest-and-boldest-insider-threats-2020-2021-jp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-paper-fed-58.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-securing-digital-healthcare.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-measuring-security-awareness-impact.pdf
Disallow: /sites/default/files/awareness-materials/DE_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/awareness-materials/UK_Ransomware%20Awareness%20Kit.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-getting-started-with-casb.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-open-channels-hidden-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-2021-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-youve-got-bec.pdf
Disallow: /sites/default/files/misc/ISMG%20-%20Proofpoint%20-%20Matt%20Cooke%20eBook.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-social-media-threats-ismg.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-current-state-of-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-making-sense-of-sase-and-sse.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-idc-spotlight-higher-education.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-2022-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-%20dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-crowd.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-jan-2022.xlsx
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-reimagining-risk-and-resilience.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/infographics/PP_jp_InsiderThreat_Infographic_final_ysohta0309a.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-report-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-metrics-that-matter.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-gartner-how-to-succeed-with-data-classification.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-dlp-right.pdf
Disallow: /sites/default/files/threat-reports/2022-CISO-REPORT_Final_jp_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-cloud.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/white-papers/pfpt-kr-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity%20Awareness%20Kit_jp.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20190724.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-20180806.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-20180521.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-20201110.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-20171006.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-20190516.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-premium-support-for-cloudmark-products.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program-202103.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula-20201009.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions-201108.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-protection-audit-and-compliance-policy-20220502.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla-201603.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program-2019.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-customer-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-japan.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-eu.zip
Disallow: /sites/default/files/legal-documents/pfpt-transferring-data-from-the-uk.zip
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-essentials-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-proofpoint-digital-risk-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-cloud-security-platform-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-web-security-sla-20220429.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla-20220426.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement-20220407_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-partner-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-compliant-policy-20220413.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-disclosure-statement-20220419.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cloudmark-smc-cpsaas-sla-20200827.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ser-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-itm-saas-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-presigned-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-idta-20220409.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-data-processing-presigned-addendum.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-managing-cybersecurity-skills-shortage.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-data-sensitivity.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-risk-aware-data-privacy.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-breaking-down-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-email-reporting-and-remediation.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-beyond-awareness-training.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook_2020-b.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-and-web-attacks.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-third-party-oauth-apps-security.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment-20201028.pdf
Disallow: /sites/default/files/legal-documents/pfpt-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-policy-202203.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-third-party-providers-and-subprocessors-202205.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-customer-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-jp-partner-data-processing-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ccpa-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-and-scc.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc-202208.pdf
Disallow: /sites/default/files/e-books/gtd-pfpt-jp-wp-ebook-third-party-oauthpps-qa-security-checklist.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-managed-services-for-information-protection.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-UAE-REPORT-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-misc-guide-to-global-digital-comm-regs.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-amendment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-gdpr-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-gdpr-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dmarc-ebook.pdf
Disallow: /sites/default/files/e-books/pfpt-sg-eb-user-risk-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-spr-summ-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-px-sla.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-securing-microsoft-365.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Cybersecurity-Deutschland-Menschen-Daten-besser-sch%C3%BCtzen.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-uk-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum.pdf
Disallow: /sites/default/files/misc/pfpt-jp-cs-psat-iris-ohyamama_20220916a_FINAL_wo.address.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-iris-ohyamama.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-ITM-Softbank_20221024a.pdf
Disallow: /sites/default/files/white-papers/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-sla.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report-summary.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-avoid-mistakes-that-expose-data.pdf
Disallow: /sites/default/files/misc/2022%20PSAT%20Holiday%20Kit.zip
Disallow: /sites/default/files/threat-reports/pfpt-covid-research_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-whistleblower-and-complaint-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/Proofpoint-Italy-CISO-Survey.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-email-fraud-defense.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-inertia-not-an-option.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-explainable-document-classification.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-jp-a4-rpt-cloud-web-security-challenges-2022.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cost-of-good-enough-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-pt-scc-addendum-for-brazil.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ch-scc-addendum-for-switzerland.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-privacy-law-addendum.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-security-policy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-essentials-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-hosted-services-sla.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-phish-in-a-barrel.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-casb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-gettting-started-with-dmarc.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-2023-security-awareness-study.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit_2023_jp.zip
Disallow: /sites/default/files/e-books/Proofpoint-Cybersecurity-ABC-Picturebook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-the-hidden-cost-of-mso365-security.pdf
Disallow: /sites/default/files/analyst-reports/Frost%20Radar%20-%20Email%20Security%2C%202022%2C%20ProofPoint.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/misc/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-sotp-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-ko-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023.pdf
Disallow: /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp_20230310a.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-beyond-zero-trust.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-voice-of-the-CISO-report.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2022.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-sb-securing-the-messenger.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023_v2.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-report_2023.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-202112-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-legacy.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-legacy.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow: /sites/default/files/white-papers/pfpt-uk-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-au-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-human-factor-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2023.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-human-factor-report.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-security-awareness-handbook.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-rethinking-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change..pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-%28poc%29-terms-of-use.pdf
Disallow: /sites/default/files/legal-documents/pfpt-proof-of-concept-terms-of-use_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-poc-terms-of-use.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-trusting-transactional-email.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-youve-got-bec.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report.pdf
Disallow: /sites/default/files/white-papers/pfpt-br-wp-board-perspective-report.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dlp-itm.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-board-perspective-report.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-in-healthcare.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-sep-2023.docx
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf
Disallow: /sites/default/files/data-sheets/pfpt-jp-ds-threat-response-auto-pull_2310.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-on-thin-ices.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-inbound-outbound.pdf
Disallow: /sites/default/files/white-papers/pfpt-en-wp-achieving-cyber-resiliance.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-customer-agreement-for-aws-marketplace.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shiseido.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2023-issue-6.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-5.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-4.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-3.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-2.pdf
Disallow: /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-1.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/legal-documents/%20pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-master-subscription-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-customer-agreement.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/white-papers/PROO6061_jp_Ransomware_Survival_Guide_A4.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cloud-in-the-crosshairs.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-dmarc-key-to-email-deliverability.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024_v2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-website-support-services-exhibit.pdf
Disallow: /sites/default/files/threat-reports/pfpt-kr-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/pfpt-a4-eb-definitive-email-security-strategy-guide-180514.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-itdr-understanding-identity-risk.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-singapore-personal-data-protection-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-gramm-leach-bliley-act-safeguards-rule-new-breach-reporting-requirements-for-non-bank-financial-institutions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-cyber-incident-reporting-for-critical-infrastructure-act.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-prc-data-privacy-framework.pdf
Disallow: /sites/default/files/proofpoint_best_practices_for_writing_secure_ios_and_android_apps_whitepaper-a4-jp-cm.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-transforming-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-may-2024.docx
Disallow: /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-2024-report.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-efd-interspace.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit-Guide-2024-jp.zip
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata_240806.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-au-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-shueisha.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow: /sites/default/files/securityawarenesskit/2024-Proofpoint-Cybersecurity-Awareness-Kit-jp.zip
Disallow: /sites/default/files/white-papers/pfpt-us-wp-information-protection-rfp-rfi-template-september-2024.docx
Disallow: /sites/default/files/data-sheets/pfpt-jp-a4-ds-browser-isolation.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-partner-dpa.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-public-sector-under-attack.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-mitigating-identity-risk.pdf
Disallow: /sites/default/files/white-papers/pfpt-fr-NIS2-directive.pdf
Disallow: /sites/default/files/white-papers/pfpt-it-NIS2-directive.pdf
Disallow: /sites/default/files/white-papers/pfpt-es-NIS2-directive.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-ja-dpa.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-bank-of-yokohama.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-psat-jgc-holdings_2024.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-securing-the-digital-identity-info-tech.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-cs-efd-jcb.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-esg-normalyze-dspm.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-konoikeunyu.pdf
Disallow: /sites/default/files/blog-images/pfpt-jp-a4-cs-konoikeunyu.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-leveraging-a-whole-of-state-approach-to-bolster-cybersecurity.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/rca-documents/pfpt-technical-root-cause-analysis.pdf
Disallow: /sites/default/files/rca-documents/pfpt-ceos-note.pdf
Disallow: /sites/default/files/rca-documents/pfpt-oms-12423-rca-ceo-note.pdf
Disallow: /sites/default/files/legal-documents/pfpt-tessian-supplementary-contract-terms.pdf
Disallow: /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-dora-faq_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-faq.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-digital-operational-resilience-act-faq.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-contract-terms_0.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-information-security-registered-assessors-program-email-protection.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-terms.pdf
Disallow: /sites/default/files/signing-keys/sendmail2025.asc
Disallow: /sites/default/files/e-books/pfpt-uk-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-public-sector-under-attack.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-understanding-core-email-protection-api-adaptive-email-dlp.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-data-security-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-data-protection-exhibit.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-terms-and-conditions.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-tessian-data-protection-exhibit.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-sansan.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-best-practices-insider-risk-management.pdf
Disallow: /sites/default/files/threat-reports/gartner-critical-capabilities-for-email-security-platforms-jp.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-future-of-email-dlp.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering.pdf
Disallow: /sites/default/files/e-books/PROO6939_jp_BestPractITM_eBook_R3.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-kr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering_0.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-human-centric-security-force-multiplier.pdf
Disallow: /sites/default/files/white-papers/pfpt-us-wp-implementing-human-centric-security.pdf
Disallow: /sites/default/files/e-books/pfpt-us-eb-human-centric-security-buyers-guide.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-m365-email-security-beyond.pdf
Disallow: /sites/default/files/e-books/pfpt-uk-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-au-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-fr-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-it-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-de-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-es-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/e-books/pfpt-br-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-alignment-with-nist-cybersecurity-framework-and-nis2.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-federal-eula-05-25.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-sled-eula-03-13-2025-fin.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-threat-protection-administrator-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-essentials-administrator-certification-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfp-en-data-security-administrator-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-course.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-course.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-exam.pdf
Disallow: /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-exam.pdf
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-prospect.docx
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-customer.docx
Disallow: /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter.docx
Disallow: /sites/default/files/threat-reports/pfpt-uk-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-au-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-fr-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-it-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-de-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-es-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-br-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/threat-reports/pfpt-jp-tr-the-human-factor-social-engineering-vol1.pdf
Disallow: /sites/default/files/security-keys/pfpt-key-proofpoint.asc
Disallow: /sites/default/files/legal-documents/pfpt-en-promise-ai-models-data.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-enterprise-dlp.pdf
Disallow: /sites/default/files/legal-documents/pft-en-supplier-code-of-conduct-final-3-15-23.pdf
Disallow: /sites/default/files/white-papers/pfpt-jp-wp-implementing-human-centric-security.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-esg-technical-validation-of-dspm.pdf
Disallow: /sites/default/files/white-papers/pfpt_Humancentricwhitepaperseries_JP_rev2.pdf
Disallow: /sites/default/files/analyst-reports/pfpt-us-ar-economic-benefits-prime-threat-protection-esg.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow: /sites/default/files/e-books/pfpt-jp-eb-smarter-faster-email-security.pdf
Disallow: /sites/default/files/customer-stories/pfpt-jp-a4-cs-mizuho-bank_20250613a.pdf
Disallow: /sites/default/files/legal-documents/pfpt-en-dpa-july-2025.pdf
Disallow: /sites/default/files/legal-documents/pfpt-de-dpa-july-2025-de.pdf
Disallow: /sites/default/files/legal-documents/pfpt-fr-dpa-july-2025-fr.pdf
Disallow: /sites/default/files/legal-documents/pfpt-it-dpa-july-2025-it.pdf
Disallow: /sites/default/files/legal-documents/pfpt-es-dpa-july-2025-es.pdf
Sitemap: https://www.proofpoint.com/us/sitemap.xml
Sitemap: https://www.proofpoint.com/uk/sitemap.xml
Sitemap: https://www.proofpoint.com/fr/sitemap.xml
Sitemap: https://www.proofpoint.com/de/sitemap.xml
Sitemap: https://www.proofpoint.com/es/sitemap.xml
Sitemap: https://www.proofpoint.com/jp/sitemap.xml
Sitemap: https://www.proofpoint.com/au/sitemap.xml
Sitemap: https://www.proofpoint.com/it/sitemap.xml
Sitemap: https://www.proofpoint.com/br/sitemap.xml
Sitemap: https://www.proofpoint.com/kr/sitemap.xml

Snippet (vista previa de los resultados de búsqueda)

www.proofpoint.com
Enterprise Cybersecurity Solutions, Services & Training | Proof...
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.

Palabras clave más importantes

Se han encontrado las siguientes palabras clave. Comprueba si esta página está bien optimizada para cada palabra clave en concreto.

Palabra claveResultadoComprobar
Proofpoint US74%Check
Proofpoint72%Check
Security70%Check
Protect68%Check
Email Security68%Check
Proofpoint Solutions68%Check
Email66%Check
Solutions66%Check
Data Security64%Check
Cybersecurity Solutions63%Check

¡Analiza ya hasta 25.000 páginas de proofpoint.com!

Probar gratis
Garantizada la gratuidad durante la fase de prueba.

Política de cookies

Utilizamos cookies para el buen funcionamiento de nuestra web y con fines analíticos y publicitarios. Puedes activar o desactivar las cookies opcionales. Para más información consulta los siguientes enlaces.

Utilizamos estas cookies para que el sitio funcione correctamente

Con estas cookies podemos entender mejor cómo navegan las y los visitantes por nuestra web

Estas cookies nos ayudan a ofrecerte anuncios y promociones que se ajusten a tus intereses