StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Follow on

© 2025 StackShare. All rights reserved.

Product

  • Stacks
  • Tools
  • Feed

Company

  • About
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
Proofpoint

Proofpoint

#105in Security
Discussions0
Followers17
OverviewDiscussionsAdoptionAlternativesIntegrations
Try It

What is Proofpoint?

It gives you protection and visibility for your greatest cybersecurity risk—your people. It provides the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Proofpoint is a tool in the Security category of a tech stack.

Key Features

Threat ProtectionInformation ProtectionUser Protection

Proofpoint Pros & Cons

Pros of Proofpoint

No pros listed yet.

Cons of Proofpoint

No cons listed yet.

Proofpoint Alternatives & Comparisons

What are some alternatives to Proofpoint?

OpenSSL

OpenSSL

It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.

Let's Encrypt

Let's Encrypt

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Ensighten

Ensighten

Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion.

Google reCaptcha

Google reCaptcha

It is a free service that protects your website from spam and abuse. It uses an advanced risk analysis engine and adaptive CAPTCHAs to keep automated software from engaging in abusive activities on your site. It does this while letting your valid users pass through with ease.

AWS WAF

AWS WAF

AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.

Authy

Authy

We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.

Try It

Visit Website

Adoption

On StackShare

Companies
2
AF
Developers
2
NC