SHARE
Facebook X Pinterest WhatsApp

Proofpoint CASB: Product Overview and Insight

  See our complete list of Top CASB Vendors. Proofpoint acquired FireLayers in 2017, adding CASB to Proofpoint’s threat response, mobile threat defense, remote browser isolation, and threat intelligence offerings. Proofpoint has a large installed base for its email security product; the target market for Proofpoint’s CASB is as an add-on for this installed base […]

Written By
thumbnail Paul Rubens
Paul Rubens
Jul 10, 2019
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

 

See our complete list of Top CASB Vendors.

Proofpoint acquired FireLayers in 2017, adding CASB to Proofpoint’s threat response, mobile threat defense, remote browser isolation, and threat intelligence offerings. Proofpoint has a large installed base for its email security product; the target market for Proofpoint’s CASB is as an add-on for this installed base plus new customers not currently using Proofpoint products. Proofpoint CASB is aimed at small to large enterprises, from 300 users and up. It focuses on detecting and stopping threats, and access to risky services can be forced through a remote browser isolation mechanism that protects users, devices and applications from remote attack.

Notable features

  • Proofpoint CASB identifies top users at risk facing potential account compromise from threat activity across cloud and email.
  • The service combines contextual data, such as user device, location and login time, and user behavior analytics with global threat intelligence to detect cloud account compromise.  Machine learning helps detect unusual access attempts, non-human brute force campaigns and suspicious file activities after an account is compromised.

Works with: Proofpoint CASB works with Office 365, G Suite, Box, Dropbox, Salesforce, Slack, AWS and more.

Size and scalability limits

None

Security certifications

SOC 1, SOC 2 and  ISO 27001

Delivery method

Cloud Service

Technology

API, proxy or hybrid

Other features

Customers can enable their application APIs to access the Proofpoint service in minutes, and onboard customers’ application APIs in less than a day, the company claims.

thumbnail Paul Rubens

Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.

Recommended for you...

Proxy vs VPN: Which One Do You Really Need?
Matt Gonzales
Sep 24, 2025
5 AWS Security Tools Every Team Should Know
Matt Gonzales
Sep 24, 2025
The 6 Best Email Security Software & Solutions (Compared and Reviewed)
Matt Gonzales
Sep 24, 2025
5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.