proofpoint.com
robots.txt

Robots Exclusion Standard data for proofpoint.com

Resource Scan

Scan Details

Site Domain proofpoint.com
Base Domain proofpoint.com
Scan Status Ok
Last Scan2025-05-18T10:39:39+00:00
Next Scan 2025-06-17T10:39:39+00:00

Last Scan

Scanned2025-05-18T10:39:39+00:00
URL https://proofpoint.com/robots.txt
Redirect https://www.proofpoint.com/robots.txt
Redirect Domain www.proofpoint.com
Redirect Base proofpoint.com
Domain IPs 2a02:e980:13e::cf, 2a02:e980:e6::cf, 45.60.151.207, 45.60.171.207
Redirect IPs 2a02:e980:111::cf, 45.60.159.207
Response IP 45.60.159.207
Found Yes
Hash 56797649bf2e387981005dd18596200a04ca92c339a7699595de80c2cd58c487
SimHash 7a06b71dcf34

Groups

*

Rule Path
Allow /core/*.css$
Allow /core/*.css?
Allow /core/*.js$
Allow /core/*.js?
Allow /core/*.gif
Allow /core/*.jpg
Allow /core/*.jpeg
Allow /core/*.png
Allow /core/*.svg
Allow /profiles/*.css$
Allow /profiles/*.css?
Allow /profiles/*.js$
Allow /profiles/*.js?
Allow /profiles/*.gif
Allow /profiles/*.jpg
Allow /profiles/*.jpeg
Allow /profiles/*.png
Allow /profiles/*.svg
Allow /misc/*.css$
Allow /misc/*.css?
Allow /misc/*.js$
Allow /misc/*.js?
Allow /misc/*.gif
Allow /misc/*.jpg
Allow /misc/*.jpeg
Allow /misc/*.png
Allow /modules/*.css$
Allow /modules/*.css?
Allow /modules/*.js$
Allow /modules/*.js?
Allow /modules/*.gif
Allow /modules/*.jpg
Allow /modules/*.jpeg
Allow /modules/*.png
Allow /profiles/*.css$
Allow /profiles/*.css?
Allow /profiles/*.js$
Allow /profiles/*.js?
Allow /profiles/*.gif
Allow /profiles/*.jpg
Allow /profiles/*.jpeg
Allow /profiles/*.png
Allow /themes/*.css$
Allow /themes/*.css?
Allow /themes/*.js$
Allow /themes/*.js?
Allow /themes/*.gif
Allow /themes/*.jpg
Allow /themes/*.jpeg
Allow /themes/*.png
Disallow /core/
Disallow /profiles/
Disallow /README.txt
Disallow /web.config
Disallow /CHANGELOG.txt
Disallow /cron.php
Disallow /INSTALL.mysql.txt
Disallow /INSTALL.pgsql.txt
Disallow /INSTALL.sqlite.txt
Disallow /install.php
Disallow /INSTALL.txt
Disallow /LICENSE.txt
Disallow /MAINTAINERS.txt
Disallow /update.php
Disallow /UPGRADE.txt
Disallow /xmlrpc.php
Disallow /sites/default/files/*gtd-*.pdf
Disallow /sites/default/files/*lgy-*.pdf
Disallow /thank-you-*
Disallow /sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf
Disallow /sites/default/files/mail-routing-agent-datasheet-v2.pdf
Disallow /admin/
Disallow /comment/reply/
Disallow /filter/tips
Disallow /node/add/
Disallow /search/
Disallow /user/register/
Disallow /user/password/
Disallow /user/login/
Disallow /user/logout/
Disallow /admin/
Disallow /comment/reply/
Disallow /node/add/
Disallow /search/
Disallow /user/register*
Disallow /user/password*
Disallow /user/login*
Disallow /user/logout*
Disallow /events/*
Disallow /upcoming-events/*
Disallow /lp/*
Disallow /conquer
Disallow /merck
Disallow /johnson-controls
Disallow /baxter
Disallow /sutter-health
Disallow /chevron
Disallow /meeting-request
Disallow /index.php/admin/
Disallow /index.php/comment/reply/
Disallow /index.php/filter/tips
Disallow /index.php/node/add/
Disallow /index.php/search/
Disallow /index.php/user/password/
Disallow /index.php/user/register/
Disallow /index.php/user/login/
Disallow /index.php/user/logout/
Disallow /?q=admin%2F
Disallow /?q=comment%2Freply%2F
Disallow /?q=filter%2Ftips%2F
Disallow /?q=node%2Fadd%2F
Disallow /?q=search%2F
Disallow /?q=user%2Fpassword%2F
Disallow /?q=user%2Fregister%2F
Disallow /?q=user%2Flogin%2F
Disallow /?q=user%2Flogout%2F
Disallow /?q=events%2F*
Disallow /?q=upcoming-events%2F*
Disallow /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-setting-up-itm.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-itm-overview.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-itm-cybersecurity.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-itm-overview.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-setting-up-itm.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-itm-overview.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-demystifying-bec-eac.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-deploying-people-centric-security-3.pdf
Disallow /sites/default/files/e-books/pfpt-fr-dr-demystifying-bec-eac.pdf
Disallow /sites/default/files/e-books/pfpt-fr-da-deploying-people-centric-security-3.pdf
Disallow /sites/default/files/solution-briefs/pfpt-de-sb-CASB-adaptive-access-controls.pdf
Disallow /sites/default/files/e-books/pfpt-de-da-deploying-people-centric-security-3.pdf
Disallow /sites/default/files/solution-briefs/RemoteWorkAlliance_Webinar.pdf
Disallow /sites/default/files/white-papers/pfpt-us-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-dr-whack-a-mail.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-no-compromises.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-calculated-risks.pdf
Disallow /sites/default/files/solution-briefs/pfpt-ja-sb-CASB-adaptive-access-controls.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-demystifying-bec-eac.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-no-compromises.pdf
Disallow /sites/default/files/e-books/pfpt-jp-da-deploying-people-centric-security-3.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-whack-a-mail.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-unmasking-bec-and-eac.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-calculated-risks.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-de-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-de-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/solution-briefs/pfpt-jp-eb-unmasking-bec-and-eac.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-calculated-risks.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/misc/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-the-evolution-of-the-casb.pdf
Disallow /sites/default/files/infographics/Pfpt-Phishing%20Infographic%20Poster-17x24-jp.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-calculated-risks.pdf
Disallow /sites/default/files/e-books/pfpt-es-da-deploying-people-centric-security-3.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-de-eb-calculated-risks.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-calculated-risks.pdf
Disallow /sites/default/files/white-papers/gtyd-pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-demystifying-bec-eac.pdf
Disallow /sites/default/files/solution-briefs/gtd-pfpt-es-sb-CASB-adaptive-access-controls.pdf
Disallow /sites/default/files/securityawarenesskit/Cybersecurity-Awareness-Kit-BEC.zip
Disallow /sites/default/files/e-books/pfpt-us-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/data-sheets/pfpt-jp-eval_2020-evaluation-jp.pdf
Disallow /sites/default/files/e-books/pfpt-us-tr-healthcare-report.pdf
Disallow /sites/default/files/white-papers/pfpt-de-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-au-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-es-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-it-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/misc/gtd-pfpt-jp-a4-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-stopping-bec-and-eac.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-jp-eb-stopping-bec-and-eac.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-stopping-bec-and-eac.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-stopping-bec-and-eac.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-jp-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-putting-people-at-center-of-your-email-security-strategy.pdf
Disallow /sites/default/files/analyst-reports/pfpt-es-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/analyst-reports/pfpt-fr-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/analyst-reports/pfpt-it-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-de-eb-itm-cybersecurity.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-cybersecurity.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-de-eb-setting-up-itm.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-setting-up-itm.pdf
Disallow /sites/default/files/analyst-reports/pfpt-uk-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/solution-briefs/pfpt-jp-a4-sb-solutions-bundles_201111a.pdf
Disallow /sites/default/files/analyst-reports/pfpt-jp-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-cyber-risk-alliance-research-report.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-uk-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-au-eb-top-10-reasons-customers-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-itm-cybersecurity.pdf
Disallow /sites/default/files/analyst-reports/pfpt-de-ar-esg-economic-validation-sep-2020.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-setting-up-itm.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-radicati-secure-email-gateway-market-quadrant-2020.pdf
Disallow /sites/default/files/white-papers/gtd-pfpt-it-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/gtd-pfpt-es-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-itm-overview-v7.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-itm-overview-v7.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-itm-overview-v7.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-fr-eb-itm-overview-v5.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-itm-overview.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-itm-overview-v7.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/solution-briefs/gtd-pfpt-fr-sb-CASB-adaptive-access-controls.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-it-eb-demystifying-bec-eac.pdf
Disallow /sites/default/files/misc/gtd-pfpt-uk-eb-role-of-itm.pdf.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-a4-da-ransomware-survival-guide-executive-summary.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/e-books/PROO3754_fr_RethinkingIT_GIG_eBook.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/e-books/PROO3773_FinServ_eBook.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-FinServ_eBook.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-healthcare.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-healthcare-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-healthcare-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-healthcare-report.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/misc/pfpt-2020-type2-soc2-report-clickwrap.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-rethinking-insider-risk.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-healthcare-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-healthcare-report.pdf
Disallow /sites/default/files/2020-05/pfpt-us-wp-how-proofpoint-helps-organizations-meet-NIST-cybersecurity-guidelines.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-compliance-in-the-age-of-digital-collaborations.pdf
Disallow /sites/default/files/2020-06/pfpt-us-eb-the-definitive-email-security-guide.pdf
Disallow /sites/default/files/ciso_ebook_sponsored_by_proofpoint.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-healthcare-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-financial-services-and-insurance.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-managing-insider-threats-in-the-technology-sector-.pdf
Disallow /sites/default/files/threat-reports/gtd-pfpt-uk-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/misc/gtd-pfpt-de-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/misc/gtd-pfpt-fr-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/misc/Proofpoint-jp-a4-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide-executive-summary.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow /sites/default/files/e-books/0503-001-01-01-pfpt-A4-e-book-youve-got-BEC-JP-30APR2020.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-role-of-itm.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-itm-cybersecurity.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-setting-up-itm.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-es-eb-itm-overview.pdf
Disallow /sites/default/files/white-papers/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow /sites/default/files/white-papers/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf.pdf
Disallow /sites/default/files/threat-reports/gtd-pfpt-es-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/threat-reports/gtd-pfpt-it-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/threat-reports/220252.37-pfpt-jp-a4-r-state-of-the-phish-2021.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-business-impact-brief.pdf
Disallow /sites/default/files/white-papers/gtd-pfpt-us-wp-people-centric-cybersecurity-federal-perspective.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow /sites/default/files/solution-briefs/pfpt-jp-wp-a4-people-centric-approach-insider-threat-management-3.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow /sites/default/files/e-books/pfpt-uk-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow /sites/default/files/misc/pfpt-es-a4-eb-10-reasons-orgs-choose-pfpt-to-secure-email-and-cloud.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-macdonald_20210426a.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-mcdonald_20210426a.pdf
Disallow /sites/default/files/misc/Password%20Day%20Awareness%20Kit.zip
Disallow /sites/default/files/e-books/pfpt-uk-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-managing-insider-threats-in-the-technology-sector.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-compliance-in-the-age-of-digital-collaboration.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-reimagining-email-security.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-beyond-the-cloud.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-us-wp-getting-started-with-casb-v33.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-reimagining-email-security-v3.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-frost-sullivan-guarding-the-virtual-doorway.pdf
Disallow /sites/default/files/awareness-materials/Email%20Fraud%20and%20Security%20Awareness%20Kit%202021.zip
Disallow /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-uk-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-au-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-de-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-es-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-fr-tr-human-factor-report.pdf
Disallow /sites/default/files/pfpt-it-tr-human-factor-report_0.pdf
Disallow /sites/default/files/pfpt-it-tr-human-factor-report_1.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-unmasking-bec-and-eac.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-beyond-vpn-securing-your-remote-workforce.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-rethinking-dlp.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-voice-of-the-CISO-report_v2.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-complete-guide-to-migrating-your-enterprise-archiving-system.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-segasammy_20210622.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-the-bec-handbook.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-frost-radar-global-email-security-market-report.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-rethinking-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-rethinking-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-rethinking-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-rethinking-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-rethinking-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-rethinking-dlp.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/analyst-reports/pfpt-uk-ar-frost-radar-global-email-security-market-report.pdf
Disallow /sites/default/files/analyst-reports/pfpt-au-ar-frost-radar-global-email-security-market-report.pdf
Disallow /sites/default/files/analyst-reports/pfpt-uk-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow /sites/default/files/analyst-reports/pfpt-au-ar-cost-of-cloud-compromise-and-shadow-IT.pdf
Disallow /sites/default/files/event-materials/210713_CYBERGYMxProofpoint.zip
Disallow /sites/default/files/white-papers/pfpt-uk-wp-beyond-the-cloud.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-beyond-the-cloud.pdf
Disallow /sites/default/files/event-materials/210713Webinar_Crowdstrike-Netskope-Okta-Proofpoint.zip
Disallow /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-rethinking-dlp.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-three-information-protection-use-cases-in-the-cloud-era.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-ige-modern-blueprint-to-information-protection.pdf
Disallow /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf.pdf
Disallow /sites/default/files/analyst-reports/gtd-pfpt-us-ar-frost-radar-security-awareness-training-market-report-2021.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-the-bec-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-the-bec-handbook.pdf
Disallow /sites/default/files/threat-reports/pfpt-japanese-tr-human-factor-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats-2020-2021.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-esg-ediscovery-market-trends-and-challenges.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-the-anatomy-of-an-insider-threat-investigation.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-building-a-business-case-for-itm.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-2021-user-risk-report.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats-2019-2020.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-frost-sullivan-market-leadership-award.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-building-a-business-case-for-itm.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-building-a-business-case-for-itm.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-building-a-business-case-for-itm.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-building-a-business-case-for-itm.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-a-strategic-approach-to-zero-trust-security-the-spectra-alliance.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/misc/2021%20PSAT%20Holiday%20Kit.zip
Disallow /sites/default/files/threat-reports/pfpt-us-tr-fall-winter-2021-threat-update.pdf
Disallow /sites/default/files/e-books/biggest-and-boldest-insider-threats-2020-2021-jp.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-idc-paper-fed-58.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-securing-digital-healthcare.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-measuring-security-awareness-impact.pdf
Disallow /sites/default/files/awareness-materials/DE_Ransomware%20Awareness%20Kit.zip
Disallow /sites/default/files/awareness-materials/UK_Ransomware%20Awareness%20Kit.zip
Disallow /sites/default/files/white-papers/pfpt-us-wp-getting-started-with-casb.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-2022-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-open-channels-hidden-threats.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-2021-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-youve-got-bec.pdf
Disallow /sites/default/files/misc/ISMG%20-%20Proofpoint%20-%20Matt%20Cooke%20eBook.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-social-media-threats-ismg.pdf
Disallow /sites/default/files/analyst-reports/pfpt-jp-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-current-state-of-data-privacy.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-making-sense-of-sase-and-sse.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-idc-spotlight-higher-education.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-2022-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-legacy-%20dlp-crumbles-in-the-cloud.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-crowd.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-data-breach-is-coming-from-inside-the-house.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-jan-2022.xlsx
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-reimagining-risk-and-resilience.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/infographics/PP_jp_InsiderThreat_Infographic_final_ysohta0309a.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-modern-blueprint-to-insider-threat-management.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-report-2022.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022_0.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-human-factor-report-2022.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-human-factor-report.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-metrics-that-matter.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-gartner-how-to-succeed-with-data-classification.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-getting-dlp-right.pdf
Disallow /sites/default/files/threat-reports/2022-CISO-REPORT_Final_jp_v2.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-legacy-dlp-crumbles-in-the-cloud.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/white-papers/pfpt-kr-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2022.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-the-definitive-email-cybersecurity-guide.pdf
Disallow /sites/default/files/awareness-materials/Cybersecurity%20Awareness%20Kit_jp.zip
Disallow /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20190724.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-20180806.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-20180521.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-20201110.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-20171006.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-20190516.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-premium-support-for-cloudmark-products.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-support-services-program-202103.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-essentials-eula-20201009.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions-201108.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-security-protection-audit-and-compliance-policy-20220502.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-hosted-services-sla-201603.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program-2019.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-customer-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-transferring-data-from-japan.zip
Disallow /sites/default/files/legal-documents/pfpt-transferring-data-from-the-eu.zip
Disallow /sites/default/files/legal-documents/pfpt-transferring-data-from-the-uk.zip
Disallow /sites/default/files/legal-documents/pfpt-en-proofpoint-essentials-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-proofpoint-digital-risk-services-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-cloud-security-platform-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-web-security-sla-20220429.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ser-sla-20220426.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement-20220407_0.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-jp-proofpoint-partner-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines-20220413.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-whistleblower-and-compliant-policy-20220413.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-disclosure-statement-20220419.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-cloudmark-smc-cpsaas-sla-20200827.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ser-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-itm-saas-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-presigned-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-202203.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-202203.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-202203.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-idta-20220409.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ccpa-data-processing-presigned-addendum.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-managing-cybersecurity-skills-shortage.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-data-sensitivity.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-risk-aware-data-privacy.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-breaking-down-bec.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-email-reporting-and-remediation.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-beyond-awareness-training.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-DMARC-ebook_2020-b.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-third-party-oauth-apps-faq-security-checklist.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-cloud-and-web-attacks.pdf
Disallow /sites/default/files/threat-reports/pfpt-kr-tr-the-cost-of-insider-threats-ponemon-report.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-third-party-oauth-apps-security.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-third-party-oauth-apps-security.pdf
Disallow /sites/default/files/threat-reports/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment-20201028.pdf
Disallow /sites/default/files/legal-documents/pfpt-privacy-policy-202203.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-privacy-policy-202203.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-security-policy-202205.pdf
Disallow /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-third-party-providers-and-subprocessors-202205.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-jp-customer-data-processing-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-jp-partner-data-processing-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ccpa-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-business-associate-agreement-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_0.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow /sites/default/files/legal-documents/pfpt-de-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-it-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-ja-privacy-policy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-gdpr-dpa-and-scc.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204_1.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum-202204.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gdpr-dpa-and-scc-202208.pdf
Disallow /sites/default/files/e-books/gtd-pfpt-jp-wp-ebook-third-party-oauthpps-qa-security-checklist.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gdpr-dpa.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/data-sheets/pfpt-jp-a4-ds-managed-services-for-information-protection.pdf
Disallow /sites/default/files/threat-reports/Proofpoint-UAE-REPORT-2022.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-misc-guide-to-global-digital-comm-regs.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-dpa-amendment.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-gdpr-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-fr-gdpr-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-it-gdpr-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-de-gdpr-dpa.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dmarc-ebook.pdf
Disallow /sites/default/files/e-books/pfpt-sg-eb-user-risk-report.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-board-perspective-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-spr-summ-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/legal-documents/pfpt-px-sla.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-securing-microsoft-365.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-board-perspective-report.pdf
Disallow /sites/default/files/threat-reports/Proofpoint-Cybersecurity-Deutschland-Menschen-Daten-besser-sch%C3%BCtzen.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-uk-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-addendum.pdf
Disallow /sites/default/files/misc/pfpt-jp-cs-psat-iris-ohyamama_20220916a_FINAL_wo.address.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-psat-iris-ohyamama.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-ITM-Softbank_20221024a.pdf
Disallow /sites/default/files/white-papers/Proofpoint-jp-DM-ISSUE-4-Final.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-explainable-document-classification.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-digital-risk-products-sla.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report-summary.pdf.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report-summary.pdf.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report-summary.pdf.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report-summary.pdf.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-avoid-mistakes-that-expose-data.pdf
Disallow /sites/default/files/misc/2022%20PSAT%20Holiday%20Kit.zip
Disallow /sites/default/files/threat-reports/pfpt-covid-research_v2.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-business-conduct-guidelines.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-act-transparency-statement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-whistleblower-and-complaint-policy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery-and-human-trafficking-statement.pdf
Disallow /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow /sites/default/files/threat-reports/Proofpoint-Italy-CISO-Survey.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-switzerland.pdf
Disallow /sites/default/files/data-sheets/pfpt-jp-a4-ds-email-fraud-defense.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-explainable-document-classification.pdf
Disallow /sites/default/files/analyst-reports/pfpt-jp-wp-board-perspective-report_v2.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-inertia-not-an-option.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-explainable-document-classification.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-scc-addendum-for-brazil.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/analyst-reports/pfpt-jp-a4-rpt-cloud-web-security-challenges-2022.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-cost-of-good-enough-security.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-pt-scc-addendum-for-brazil.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ch-scc-addendum-for-switzerland.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-and-human-trafficking-statement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-privacy-law-addendum.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-security-policy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-transfer-assessment.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-support-services-program.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-psat-products-support-services-program.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-evaluation-terms-and-conditions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-security-products-exhibit.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-essentials-eula.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-hosted-services-sla.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-uk-modern-slavery%20act-and-human-trafficking-statement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-phish-in-a-barrel.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-getting-started-with-casb.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-gettting-started-with-dmarc.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-2023-security-awareness-study.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit_2023_jp.zip
Disallow /sites/default/files/e-books/Proofpoint-Cybersecurity-ABC-Picturebook.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-the-hidden-cost-of-mso365-security.pdf
Disallow /sites/default/files/analyst-reports/Frost%20Radar%20-%20Email%20Security%2C%202022%2C%20ProofPoint.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/misc/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-sotp-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-sotp-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-sotp-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-ko-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023.pdf
Disallow /sites/default/files/e-books/PROO5660_GettingStartDMARC_eBook_A4_jp_20230310a.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-beyond-zero-trust.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/white-papers/pfpt-br-wp-voice-of-the-CISO-report.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2022.pdf
Disallow /sites/default/files/white-papers/pfpt-us-sb-securing-the-messenger.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2023_v2.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-report_2023.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-202112-legacy.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gb-general-terms-and-conditions-legacy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-general-terms-and-conditions-legacy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-digital-risk-products-exhibit-legacy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-and-compliance-products-exhibit-legacy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-security-products-exhibit-legacy.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-master-subscription-agreement-legacy.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-us-privacy-law-addendum.pdf
Disallow /sites/default/files/white-papers/pfpt-uk-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-au-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-br-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/threat-reports/pfpt-kr-tr-human-factor-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks-air-2023.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-analyzing-identity-risks.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-biggest-and-boldest-insider-threats.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-human-factor-report.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-top-10-reasons-organizations-choose-pfpt-to-secure-ms365.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-security-awareness-handbook.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-rethinking-dlp.pdf
Disallow /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change..pdf
Disallow /sites/default/files/white-papers/pfpt-br-wp-driving-real-behavior-change.pdf
Disallow /sites/default/files/legal-documents/pfpt-proof-of-concept-%28poc%29-terms-of-use.pdf
Disallow /sites/default/files/legal-documents/pfpt-proof-of-concept-terms-of-use_0.pdf
Disallow /sites/default/files/legal-documents/pfpt-poc-terms-of-use.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-trusting-transactional-email.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-youve-got-bec.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-it-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-de-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-es-wp-board-perspective-report.pdf
Disallow /sites/default/files/white-papers/pfpt-br-wp-board-perspective-report.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-getting-started-with-dlp-itm.pdf
Disallow /sites/default/files/white-papers/pfpt-jp-wp-board-perspective-report.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-in-healthcare.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-sep-2023.docx
Disallow /sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf
Disallow /sites/default/files/data-sheets/pfpt-jp-ds-threat-response-auto-pull_2310.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-on-thin-ices.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-inbound-outbound.pdf
Disallow /sites/default/files/white-papers/pfpt-en-wp-achieving-cyber-resiliance.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-federal-eula.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-sled-eula.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-customer-agreement-for-aws-marketplace.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-efd-shiseido.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2023-issue-6.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-5.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2022-issue-4.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-3.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-2.pdf
Disallow /sites/default/files/new-perimeters-issues/pfpt-en-new-perimeters-2021-issue-1.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/legal-documents/%20pfpt-en-ja-customer-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ja-master-subscription-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ja-customer-agreement.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-de-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-es-dpa.pdf
Disallow /sites/default/files/legal-documents/pfpt-it-dpa.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/white-papers/PROO6061_jp_Ransomware_Survival_Guide_A4.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-ransomware-survival-guide.pdf.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-cloud-in-the-crosshairs.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-kr-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-dmarc-key-to-email-deliverability.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-data-loss-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-state-of-the-phish-2024_v2.pdf
Disallow /sites/default/files/legal-documents/pfpt-tessian-website-support-services-exhibit.pdf
Disallow /sites/default/files/threat-reports/pfpt-kr-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/threat-reports/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/pfpt-a4-eb-definitive-email-security-strategy-guide-180514.pdf
Disallow /sites/default/files/e-books/pfpt-jp-tr-data-loss-landscape-report-2024.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-itdr-understanding-identity-risk.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-singapore-personal-data-protection-act.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-gramm-leach-bliley-act-safeguards-rule-new-breach-reporting-requirements-for-non-bank-financial-institutions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-cyber-incident-reporting-for-critical-infrastructure-act.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-prc-data-privacy-framework.pdf
Disallow /sites/default/files/proofpoint_best_practices_for_writing_secure_ios_and_android_apps_whitepaper-a4-jp-cm.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-transforming-dlp.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-email-security-rfp-rfi-template-may-2024.docx
Disallow /sites/default/files/threat-reports/pfpt-jp-wp-voice-of-the-CISO-2024-report.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-tps-efd-interspace.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/awareness-materials/Cybersecurity-Awareness-Kit-Guide-2024-jp.zip
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-nttdata_240806.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-au-modern-slavery-act-and-human-trafficking-statement.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-mitigating-identity-risk.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-efd-shueisha.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-how-to-stop-cyberattacks-vol-2.pdf
Disallow /sites/default/files/securityawarenesskit/2024-Proofpoint-Cybersecurity-Awareness-Kit-jp.zip
Disallow /sites/default/files/white-papers/pfpt-us-wp-information-protection-rfp-rfi-template-september-2024.docx
Disallow /sites/default/files/data-sheets/pfpt-jp-a4-ds-browser-isolation.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ja-partner-dpa.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-public-sector-under-attack.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-mitigating-identity-risk.pdf
Disallow /sites/default/files/white-papers/pfpt-fr-NIS2-directive.pdf
Disallow /sites/default/files/white-papers/pfpt-it-NIS2-directive.pdf
Disallow /sites/default/files/white-papers/pfpt-es-NIS2-directive.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-cybersecuritys-ai-tidal-wave.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-ja-dpa.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-tps-core-bank-of-yokohama.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-how-to-stop-cyberattacks-vol-1.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-psat-jgc-holdings_2024.pdf
Disallow /sites/default/files/analyst-reports/pfpt-us-ar-securing-the-digital-identity-info-tech.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-cs-efd-jcb.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-esg-normalyze-dspm.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-a4-cs-konoikeunyu.pdf
Disallow /sites/default/files/blog-images/pfpt-jp-a4-cs-konoikeunyu.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-leveraging-a-whole-of-state-approach-to-bolster-cybersecurity.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/rca-documents/pfpt-technical-root-cause-analysis.pdf
Disallow /sites/default/files/rca-documents/pfpt-ceos-note.pdf
Disallow /sites/default/files/rca-documents/pfpt-oms-12423-rca-ceo-note.pdf
Disallow /sites/default/files/legal-documents/pfpt-tessian-supplementary-contract-terms.pdf
Disallow /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-dora-faq_0.pdf
Disallow /sites/default/files/legal-documents/pfpt-digital-operational-resilience-act-faq.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-digital-operational-resilience-act-faq.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-contract-terms_0.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-information-security-registered-assessors-program-email-protection.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-tessian-supplementary-terms.pdf
Disallow /sites/default/files/signing-keys/sendmail2025.asc
Disallow /sites/default/files/e-books/pfpt-uk-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-public-sector-under-attack.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-understanding-core-email-protection-api-adaptive-email-dlp.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-tessian-data-security-exhibit.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-terms-and-conditions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-data-protection-exhibit.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-tessian-terms-and-conditions.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-tessian-data-protection-exhibit.pdf
Disallow /sites/default/files/customer-stories/pfpt-jp-a4-cs-sansan.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-best-practices-insider-risk-management.pdf
Disallow /sites/default/files/threat-reports/gartner-critical-capabilities-for-email-security-platforms-jp.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-future-of-email-dlp.pdf
Disallow /sites/default/files/e-books/pfpt-jp-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering.pdf
Disallow /sites/default/files/e-books/PROO6939_jp_BestPractITM_eBook_R3.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/e-books/pfpt-kr-eb-more-secure-together-proofpoint-microsoft.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-vol1-social-engineering_0.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-2025-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-us-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-human-centric-security-force-multiplier.pdf
Disallow /sites/default/files/white-papers/pfpt-us-wp-implementing-human-centric-security.pdf
Disallow /sites/default/files/e-books/pfpt-us-eb-human-centric-security-buyers-guide.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-m365-email-security-beyond.pdf
Disallow /sites/default/files/e-books/pfpt-uk-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-au-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-fr-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-it-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-de-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-es-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/e-books/pfpt-br-eb-smarter-faster-email-security.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-alignment-with-nist-cybersecurity-framework-and-nis2.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-federal-eula-05-25.pdf
Disallow /sites/default/files/legal-documents/pfpt-en-sled-eula-03-13-2025-fin.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-threat-protection-administrator-exam.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-essentials-administrator-certification-exam.pdf
Disallow /sites/default/files/technical-training-documents/pfp-en-data-security-administrator-exam.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-course.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-course.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-information-protection-analyst-exam.pdf
Disallow /sites/default/files/technical-training-documents/pfpt-en-people-protection-analyst-exam.pdf
Disallow /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-prospect.docx
Disallow /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter-customer.docx
Disallow /sites/default/files/justification-letters/pfpt-en-protect25-business-justification-letter.docx
Disallow /sites/default/files/threat-reports/pfpt-uk-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-au-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-fr-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-it-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-de-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-es-tr-the-human-factor-social-engineering-vol1.pdf
Disallow /sites/default/files/threat-reports/pfpt-br-tr-the-human-factor-social-engineering-vol1.pdf

Other Records

Field Value
crawl-delay 10

Other Records

Field Value
sitemap https://www.proofpoint.com/us/sitemap.xml
sitemap https://www.proofpoint.com/uk/sitemap.xml
sitemap https://www.proofpoint.com/fr/sitemap.xml
sitemap https://www.proofpoint.com/de/sitemap.xml
sitemap https://www.proofpoint.com/es/sitemap.xml
sitemap https://www.proofpoint.com/jp/sitemap.xml
sitemap https://www.proofpoint.com/au/sitemap.xml
sitemap https://www.proofpoint.com/it/sitemap.xml
sitemap https://www.proofpoint.com/br/sitemap.xml
sitemap https://www.proofpoint.com/kr/sitemap.xml

Comments

  • robots.txt
  • This file is to prevent the crawling and indexing of certain parts
  • of your site by web crawlers and spiders run by sites like Yahoo!
  • and Google. By telling these "robots" where not to go on your site,
  • you save bandwidth and server resources.
  • This file will be ignored unless it is at the root of your host:
  • Used: http://example.com/robots.txt
  • Ignored: http://example.com/site/robots.txt
  • For more information about the robots.txt standard, see:
  • http://www.robotstxt.org/robotstxt.html
  • CSS, JS, Images
  • Directories
  • Files
  • Paths (clean URLs)
  • Paths (no clean URLs)