What Integrates with Proofpoint Digital Risk Protection?

Find out what Proofpoint Digital Risk Protection integrations exist in 2025. Learn what software and services currently integrate with Proofpoint Digital Risk Protection, and sort them by reviews, cost, features, and more. Below is a list of products that Proofpoint Digital Risk Protection currently integrates with:

  • 1
    Amazon Web Services (AWS) Reviews
    Top Pick
    If you're in need of computing power, database solutions, content distribution, or various other functionalities, AWS offers a wide array of services designed to assist you in developing advanced applications with enhanced flexibility, scalability, and reliability. Amazon Web Services (AWS) stands as the most extensive and widely utilized cloud platform globally, boasting over 175 fully functional services spread across data centers worldwide. A diverse range of customers, from rapidly expanding startups to major corporations and prominent government bodies, are leveraging AWS to reduce expenses, enhance agility, and accelerate innovation. AWS provides a larger selection of services, along with more features within those services, compared to any other cloud provider—covering everything from fundamental infrastructure technologies like computing, storage, and databases to cutting-edge innovations such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. This breadth of offerings facilitates a quicker, simpler, and more cost-effective transition of your current applications to the cloud, ensuring that you can stay ahead in a competitive landscape while taking advantage of the latest technological advancements.
  • 2
    CrowdStrike Falcon Reviews
    Top Pick
    CrowdStrike Falcon is a cutting-edge cybersecurity platform that operates in the cloud, delivering robust defenses against a variety of cyber threats such as malware, ransomware, and complex attacks. By utilizing artificial intelligence and machine learning technologies, it enables real-time detection and response to potential security incidents, while offering features like endpoint protection, threat intelligence, and incident response. The system employs a lightweight agent that consistently scans endpoints for any indicators of malicious behavior, ensuring visibility and security with minimal effect on overall system performance. Falcon's cloud-based framework facilitates quick updates, adaptability, and swift threat responses across extensive and distributed networks. Its extensive suite of security functionalities empowers organizations to proactively prevent, identify, and address cyber risks, establishing it as an essential resource for contemporary enterprise cybersecurity. Additionally, its seamless integration with existing infrastructures enhances overall security posture while minimizing operational disruptions.
  • 3
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 4
    IBM Cloud Reviews
    IBM Cloud® offers features that enhance both business agility and resilience, allowing users to discover a platform that provides 2.5 times the value. Tailored for various industries, it emphasizes security and the flexibility to develop and operate applications in any environment. The platform facilitates the transformation of business workflows through the integration of automation and artificial intelligence. Furthermore, it boasts a robust technology partner ecosystem that addresses specific industry demands, leveraging deep expertise and tailored solutions. Its processes are automated and auditable, ensuring compliance and efficiency. With unique functionalities ensuring top-tier cloud security and monitoring, users benefit from a uniform security and control framework across all applications. Additionally, its containerized solutions foster seamless DevOps practices, automation, data management, and security enhancements. The platform offers streamlined integration along with a consistent application development lifecycle, making it user-friendly. Beyond these features, IBM Cloud harnesses advanced technologies such as IBM Watson®, analytics, the Internet of Things (IoT), and edge computing, enabling businesses to innovate and stay ahead of the competition.
  • 5
    Zscaler Reviews
    Zscaler, the innovator behind the Zero Trust Exchange platform, leverages the world's largest security cloud to streamline business operations and enhance adaptability in a rapidly changing environment. The Zscaler Zero Trust Exchange facilitates swift and secure connections, empowering employees to work from any location by utilizing the internet as their corporate network. Adhering to the zero trust principle of least-privileged access, it delivers robust security through context-driven identity verification and policy enforcement. With a presence in 150 data centers globally, the Zero Trust Exchange ensures proximity to users while being integrated with the cloud services and applications they utilize, such as Microsoft 365 and AWS. This infrastructure guarantees the most efficient connection paths between users and their target destinations, ultimately offering extensive security alongside an exceptional user experience. Additionally, we invite you to explore our complimentary service, Internet Threat Exposure Analysis, which is designed to be quick, secure, and private for all users. This analysis can help organizations identify vulnerabilities and strengthen their security posture effectively.
  • 6
    Palo Alto Networks NGFW Reviews
    Our physical appliances featuring ML-Powered NGFW technology allow you to proactively combat unknown threats, gain visibility into all devices, including IoT, and minimize mistakes through automated policy suggestions. The VM-Series serves as the virtual counterpart of our ML-Powered NGFW, safeguarding your deployments in both private and public clouds with effective segmentation and advanced threat prevention measures. Meanwhile, the CN-Series, designed for container environments, ensures that intricate network-based threats do not propagate across Kubernetes namespace boundaries, thereby enhancing overall security. Together, these solutions provide a comprehensive defense strategy tailored for diverse infrastructures.
  • 7
    Verizon Cloud Reviews

    Verizon Cloud

    Verizon Media

    $5.99 per month
    1 Rating
    Verizon Cloud offers a secure wireless service for storing your files online, ensuring that they remain protected through encryption during transfer, allowing you to access them anytime across all your devices such as phones, tablets, and computers. This service is ideal for backing up your data and recovering it after unexpected incidents like crashes, device theft, or upgrades, making the transition seamless. You can conveniently reach your files using the My Verizon website or the Verizon Cloud app available on Apple® iOS, Android™, and both Windows® and Mac® computers. Easily safeguard your photos, videos, and important documents by transferring them to the cloud, with unlimited storage available for up to five users and no restrictions on the number of devices that can be covered. With this service, you can alleviate the anxiety of losing valuable memories and important files due to device mishaps or technical failures. Users can feel confident knowing that their digital life is safe and easily recoverable at any time.
  • 8
    SailPoint Reviews

    SailPoint

    SailPoint Technologies

    1 Rating
    Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
  • 9
    SIRP Reviews
    SIRP is a SOAR platform that is risk-based and non-code. It connects all security teams to achieve consistent strong outcomes through a single platform. SIRP empowers Security Operations Centers, Incident Response (IR), Threat Intelligence (VM) and Security Operations Centers (SOCs). It integrates security tools, powerful automation, and orchestration tools to enable these teams. SIRP is a NO-code SOAR platform that includes a security scoring engine. The engine calculates risk scores specific to your organization based on every alert, vulnerability, and incident. Security teams can map risks to individual assets and prioritize their response at scale with this granular approach. SIRP saves security teams thousands of hours every year by making all security functions and tools available at a push of a button. SIRP's intuitive drag and drop playbook building module makes it easy to design and enforce best practices security processes.
  • 10
    Imperva Application Security Platform Reviews
    Imperva's Application Security Platform delivers extensive defense for applications and APIs, effectively countering contemporary threats while maintaining high performance levels. This platform encompasses a variety of features, including Web Application Firewall (WAF), Advanced Bot Protection, API Security, DDoS Protection, Client-Side Protection, and Runtime Protection to shield against potential vulnerabilities and attacks. With the use of sophisticated analytics and automated threat response mechanisms, Imperva guarantees that applications are protected in cloud, on-premises, and hybrid settings. Furthermore, its adaptability makes it suitable for diverse operational environments, enhancing overall security posture.
  • 11
    UpContent Reviews

    UpContent

    UpContent

    $15 per month
    Your team needs to be trusted to provide valuable insights to your prospects and customers. Curated content can build trust and deepen relationships. It's easier to find, collaborate, and share relevant third-party content. This helps customers become loyal leads. Our technology analyzes millions upon millions of articles each month to ensure that we only present the best. Our technology integrates with many of your favorite email, social media, and CRM tools, making it easy to share great content with your followers.
  • 12
    HCL Accelerate Reviews

    HCL Accelerate

    HCL Technologies

    Free
    HCL Accelerate, the value stream management platform within the HCL Software DevOps solution set, is HCL Software HCL Software Accelerate. It helps you to understand your DevOps practices and implement changes. All of these tools can be managed from one interface. HCL Accelerate can help you make smart business decisions by combining data from all your organizations to improve throughput and identify bottlenecks.
  • 13
    Spoom Reviews

    Spoom

    Spoom

    €40 per user per month
    Do you truly possess a comprehensive view of the situation? Various reports are generated across the organization, with data and statistics consistently updated, consuming a significant amount of time. Departments such as sales, marketing, customer service, production, and HR all maintain their own reporting systems and key performance indicators (KPIs), but how is this data utilized? Are all stakeholders granted access to these insights? Do you recall the rationale behind tracking this information? Can you observe how these KPIs influence your company's overarching goals and vision? Furthermore, is there widespread awareness of these metrics among your team? It’s essential to establish connections between disparate data sets that were previously siloed in different departments. By visualizing how KPIs relate to your company’s objectives and mission, you can uncover new opportunities. Providing clarity during crucial moments for you and your employees is vital, as it allows you to recognize the influence of data on your future operations, organization, and teams. Ensure that everyone is aligned and that each action taken by your employees is directly linked to your strategic vision, fostering a unified approach to achieving success. By doing so, you will enhance collaboration and drive better results across the board.
  • 14
    Splunk APM Reviews

    Splunk APM

    Splunk

    $660 per Host per year
    You can innovate faster in the cloud, improve user experience and future-proof applications. Splunk is designed for cloud-native enterprises and helps you solve current problems. Splunk helps you detect any problem before it becomes a customer problem. Our AI-driven Directed Problemshooting reduces MTTR. Flexible, open-source instrumentation eliminates lock-in. Optimize performance by seeing all of your application and using AI-driven analytics. You must observe everything in order to deliver an excellent end-user experience. NoSample™, full-fidelity trace ingestion allows you to leverage all your trace data and identify any anomalies. Directed Troubleshooting reduces MTTR to quickly identify service dependencies, correlations with the underlying infrastructure, and root-cause errors mapping. You can break down and examine any transaction by any dimension or metric. You can quickly and easily see how your application behaves in different regions, hosts or versions.
  • 15
    Eviden MDR Service Reviews
    What measures can be taken to guarantee that your organization remains safeguarded against cyber threats? As cyber-attacks evolve and become increasingly sophisticated, it is essential to stay ahead of potential risks. Eviden, a leading cybersecurity service provider, offers continuous protection tailored for the dynamic landscape of cybersecurity threats. Our extensive range of advanced detection and response services operates around the clock, ensuring global coverage. We have pioneered the next-generation Security Operations Center (SOC), known as the Prescriptive Security Operation Center, which focuses on preventing breaches by utilizing big data, supercomputing resources, and automated security responses. Our offerings include CERT services that encompass threat intelligence, CSIRT services, and comprehensive vulnerability management. With our Advanced Detection and Response services, we help establish robust security practices designed to combat Advanced Persistent Threats (APTs), alongside SOC services and context-aware Identity and Access Management (IAM). Enjoy the peace of mind that comes with our 24/7 threat monitoring, proactive hunting, and full-service incident response capabilities, ensuring that your organization is equipped to face any cyber challenge. In a world where threats are constantly evolving, partnering with Eviden means being one step ahead in cybersecurity.
  • 16
    Optiv Managed XDR Reviews
    Cyber attackers are cunning, persistent, and driven, often employing the same tools as their targets. They can conceal themselves within your infrastructure and swiftly broaden their access. Our deep understanding of the cyber landscape stems from our direct engagement with it, informing our operations. The distinctive strength of our MXDR solution comes from this background, combined with tested methodologies, reliable intellectual property, superior technology, and a commitment to leveraging automation while employing highly skilled professionals to oversee everything. Together, we can create a tailored solution that offers extensive threat visibility and facilitates rapid identification, investigation, triage, and response to mitigate risks against your organization. We will utilize your current investments in endpoint, network, cloud, email, and OT/IoT solutions, uniting them for effective technology orchestration. This approach minimizes your attack surface, enhances threat detection speed, and promotes thorough investigations through a continuous strategy, ensuring robust protection against various cyber threats. Ultimately, our collaborative efforts will not only strengthen your defenses but also foster a proactive security culture within your enterprise.
  • 17
    CyberArk Cloud Entitlements Manager Reviews
    Implement a cloud least privilege strategy that minimizes disruption to your business operations. Safeguard your organization from internal and external threats, allowing you to prioritize what truly matters. Efficiently enforce cloud least privilege practices without hindering productivity. Identify and rectify excessive cloud permissions to eliminate uncertainty. Across platforms like AWS, Azure, and GCP, automatically detect and eliminate unnecessary permissions. Protect your cloud environment while strengthening your business resilience. Embrace innovative services with confidence as you securely grow your cloud footprint. Utilize a unified dashboard to gain cloud-agnostic visibility and manage access permissions across AWS, AWS Elastic Kubernetes Service, Azure, and GCP. Execute precise, code-level IAM policy recommendations for both human and machine identities without disrupting existing operations. Actively mitigate risks and track your progress through dynamic exposure level scores that are quantifiable for all identities and platforms. By adopting these measures, you can ensure a secure cloud environment that supports your business growth effectively.
  • 18
    Revelstoke Reviews
    Transform your security operations center (SOC) with the innovative Revelstoke platform, which offers a universal, low-code, and high-speed automation solution complete with integrated case management. Utilizing a singular data model, Revelstoke streamlines the normalization process for both input and output data, ensuring quick compatibility with any security tool while remaining future-ready. The platform features a user interface designed around a Kanban workflow, allowing users to effortlessly drag and drop cards into position for seamless automation execution. From the case management dashboard, you can easily track and oversee case actions, timelines, and workflow processes, putting incident response (IR) right at your fingertips. Furthermore, you can effectively measure and report on the business implications of security automation, demonstrating the value of your investments and showcasing your team's contributions. Revelstoke significantly enhances the efficiency of security orchestration, automation, and response (SOAR), enabling teams to operate with greater speed, intelligence, and effectiveness. With its intuitive drag-and-drop functionality, numerous built-in integrations, and exceptional clarity into performance metrics, this platform revolutionizes the way security teams approach their tasks. Ultimately, Revelstoke empowers organizations to strengthen their security posture while maximizing resource utilization.
  • 19
    Amplifier Security Reviews
    AI-driven self-healing security solutions for your workforce integrate human-in-the-loop automation to effectively bridge the gap between security measures and workforce engagement. By adopting a contemporary approach to workforce security, businesses can leverage the synergy of AI and their personnel to enhance overall security. Eliminate the hassle of managing spreadsheets and pursuing employees, allowing for rapid resolution of security concerns. Collaborate with employees to implement security controls, ensuring that productivity remains intact. Utilize your current security tools to identify vulnerabilities and execute remediation efforts efficiently. Our goal is to realign the cybersecurity focus to encompass both technology and the individuals who operate it, fostering a harmonious and secure business environment. This dual focus not only strengthens defenses but also empowers employees to contribute actively to the security landscape.
  • 20
    appNovi Reviews
    Integrate your current tools to create a unified asset inventory that serves as a reliable data source, enabling your analysts to operate more efficiently and reducing the number of escalations. Focus on identifying vulnerable assets by assessing their network exposure and potential business impact, which will help you comprehend the overall threat landscape and monitor for any compliance deviations. Establishing a definitive data source is crucial for a thorough understanding of your environment; therefore, maintain comprehensive asset inventories, pinpoint any missing security measures, and effectively prioritize vulnerabilities. Ensure that your asset inventories are accurate and up-to-date by utilizing the tools you already have in place, enabling you to focus on risks according to their exposure and the impact they may have on your organization. Achieving full visibility into your environment and the associated threats allows for streamlined operations and quicker outcomes by eliminating uncertainties related to IT data. Furthermore, enhance your cardholder data protection measures, refine your vulnerability management processes, and identify necessary compensating controls to strengthen your overall security posture. This holistic approach not only improves your security framework but also fosters a proactive stance against potential threats.
  • 21
    Blackwell Security Reviews
    Blackwell's highly specialized security operations are specifically crafted to provide comprehensive protection and swift responses tailored to the distinct requirements of healthcare organizations. Safeguard your entire ecosystem with complete MDR signals, personalized healthcare intelligence, and cutting-edge security tools that guarantee around-the-clock defense against sophisticated cyber threats. Dedicated to the healthcare sector, Blackwell Security offers managed security operations that empower you to minimize risk, uphold compliance, and foster a secure healthcare continuum. Enhance your current tools, broaden your SOC team, and collaborate with expert healthcare threat hunters to ensure ongoing visibility, prevent incidents, and maintain compliance with your existing infrastructure. By leveraging specialized guidance, elevate your organization's cybersecurity maturity to streamline and fortify your security protocols, address vulnerabilities in your cyber compliance framework, and proactively initiate enhancements throughout your program. Moreover, this approach not only strengthens your security posture but also enhances overall operational efficiency within your organization.
  • 22
    Dune Security Reviews
    Mitigate advanced social engineering threats through user-centered security awareness training, red team assessments, and tailored controls. This has historically posed a significant challenge for enterprise security teams, and the situation is deteriorating as emerging trends amplify the complexity and scale of attacks targeting end users. Cybercriminals now leverage AI technologies, such as ChatGPT, to craft exceptionally persuasive phishing schemes, which raises both the sophistication and reach of their efforts. Advanced persistent threats and state-sponsored entities employ intricate social engineering tactics to establish and sustain prolonged access to their targets' systems. Business Email Compromise attacks deceive users into transferring money or revealing confidential information by masquerading as executives or trusted collaborators. Our customizable solutions allow you to develop a program that aligns with your organization’s specific requirements, ensuring a more effective defense. The training modules dynamically adapt to user behavior and risk assessments, thus significantly boosting the overall engagement and learning outcomes. By fostering a culture of security awareness, organizations can better prepare their employees to recognize and resist these evolving threats.
  • 23
    OrangeCRM Reviews

    OrangeCRM

    OrangeCRM

    $499 per month
    Recognizing that every business operates with its own distinct processes, objectives, and demands, OrangeCRM delivers the adaptability required through a wide-ranging assortment of modules tailored for a personalized Relationship Management system. Each module acts as an additional element that integrates effortlessly with your OrangeCRM database, enhancing functionality and tools in alignment with your unique business needs. Our extensive array of modules caters to all types of businesses—whether you are a fledgling startup or a large enterprise with complex requirements—ensuring that OrangeCRM is sufficiently versatile to function as a comprehensive solution for organizations of any scale. Among these, the Analytics module stands out by providing essential business intelligence, robust analytics, and real-time reporting capabilities that allow for thorough data interpretation and analysis. Furthermore, our web-based platform empowers authorized users within your organization to swiftly access and track vital metrics, facilitating timely and informed decision-making. This level of accessibility and customization ensures that you can adapt your approach as your business evolves.
  • 24
    NTT Cloud Communications Reviews
    We offer innovative cloud communication solutions that facilitate dynamic collaboration, ultimately enhancing workforce efficiency, productivity, and engagement. As a key division of NTT Ltd., Cloud Communications plays an essential role in the Intelligent Workplace framework. Our goal is to deliver top-tier cloud communication solutions that support dynamic interactions, driving improvements in workforce efficiency, productivity, and engagement. Our expertise lies in unified communications, cloud voice, and digital events, providing customized end-to-end consulting, value realization services, and change management to empower organizations and support their digital workplace transformation. Regardless of the location of your employees and clients or the devices and platforms they utilize to communicate and collaborate, our solutions are designed to streamline and maximize productivity throughout your hybrid workplace environment. In doing so, we ensure that businesses can seamlessly connect and operate in an increasingly digital world.
  • 25
    Stamus Networks Reviews
    Stamus Networks offers network-based solutions for threat detection and response. Discover serious threats and unauthorized activities lurking within your network. We use the inherent power of your network traffic to uncover critical security threats for your organization. Stamus Security Platform is a powerful network detection and response platform built on Suricata that provides actionable network visibility. Stamus Security Platform has been trusted by many of the most important organizations in the world, including government CERTs and central banks, insurance companies, managed security service providers and financial service providers.
  • 26
    Trade360 Reviews
    CGI Trade360 provides all the software, infrastructure, and support resources required to power a bank’s global trade business. CGI Trade360 is a software-as-a-service (SaaS) that allows banks to offer traditional trade, payables and receivables services to customers anywhere, anytime, on a single integrated platform. CGI Trade360 is designed for multi-bank, multicurrency and multitime zone processing. It includes a corporate portal, a back-office trade processing system with advanced imaging and workflow, advanced reporting utilities, and an XML-based integrated architecture. CGI Trade360's SaaS model is in operation for over two decades. It provides infrastructure and IT services that allow you to focus on growing and running your banking business. Also available as an on-prem solution for global institutions.
  • 27
    Cognizant Reviews
    Revolutionize your Revenue Cycle with our specialized RCM solutions that harness the power of intelligent automation, established strategies, and a team of seasoned professionals to enhance your operational performance. By collaborating with Cognizant, you can rapidly boost your financial outcomes and modernize every facet of your business office using digital innovations. A robust business office, paired with a reliable partner, allows you to concentrate on providing exceptional patient care. Are escalating expenses, heightened patient obligations, and evolving regulations presenting new difficulties for your organization? Cognizant offers tailored end-to-end solutions designed to meet your specific needs, ensuring optimal operational efficiency and financial prosperity. By leveraging cutting-edge solutions and services, along with our extensive industry knowledge, we empower clients to transform their businesses, fostering growth and equipping them for the future of healthcare. Discover how we assist hospitals, health systems, and physician practices in implementing intelligent automation to streamline their business processes effectively and efficiently. Additionally, our commitment to innovation positions your organization to tackle the challenges of tomorrow’s healthcare landscape confidently.
  • Previous
  • You're on page 1
  • Next