SHARE
Facebook X Pinterest WhatsApp

Proofpoint CASB: Product Overview and Insight

  See our complete list of Top CASB Vendors. Proofpoint acquired FireLayers in 2017, adding CASB to Proofpoint’s threat response, mobile threat defense, remote browser isolation, and threat intelligence offerings. Proofpoint has a large installed base for its email security product; the target market for Proofpoint’s CASB is as an add-on for this installed base […]

Written By
thumbnail
Paul Rubens
Paul Rubens
Jul 10, 2019
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

 

See our complete list of Top CASB Vendors.

Proofpoint acquired FireLayers in 2017, adding CASB to Proofpoint’s threat response, mobile threat defense, remote browser isolation, and threat intelligence offerings. Proofpoint has a large installed base for its email security product; the target market for Proofpoint’s CASB is as an add-on for this installed base plus new customers not currently using Proofpoint products. Proofpoint CASB is aimed at small to large enterprises, from 300 users and up. It focuses on detecting and stopping threats, and access to risky services can be forced through a remote browser isolation mechanism that protects users, devices and applications from remote attack.

Notable features

  • Proofpoint CASB identifies top users at risk facing potential account compromise from threat activity across cloud and email.
  • The service combines contextual data, such as user device, location and login time, and user behavior analytics with global threat intelligence to detect cloud account compromise.  Machine learning helps detect unusual access attempts, non-human brute force campaigns and suspicious file activities after an account is compromised.

Works with: Proofpoint CASB works with Office 365, G Suite, Box, Dropbox, Salesforce, Slack, AWS and more.

Size and scalability limits

None

Security certifications

SOC 1, SOC 2 and  ISO 27001

Delivery method

Cloud Service

Technology

API, proxy or hybrid

Other features

Customers can enable their application APIs to access the Proofpoint service in minutes, and onboard customers’ application APIs in less than a day, the company claims.

Recommended for you...

6 Best SIEM Tools & Software
Ken Underhill
Nov 25, 2025
From Reactive to Ready: A Practical Security Maturity Playbook for Lean Teams
Ken Underhill
Nov 20, 2025
7 Best Penetration Testing Service Providers in 2025
Ken Underhill
Nov 10, 2025
6 Under-the-Radar Vendors That Supercharge Breach and Attack Simulation
Matt Gonzales
Oct 14, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.