---
title: Proofpoint Email Security
description: Monitors Proofpoint TAP, Proofpoint On-Demand, and Proofpoint Isolation
breadcrumbs: Docs > Integrations > Proofpoint Email Security
---

# Proofpoint Email Security
Supported OS marketplaceIntegration version2.1.0            Crest Proofpoint - TAP DashboardCrest Proofpoint - TAP DashboardCrest Proofpoint On Demand - Email SecurityCrest Proofpoint On Demand - Email SecurityCrest Proofpoint On Demand - Email SecurityCrest Proofpoint On Demand - TLS OverviewCrest Proofpoint On Demand - TLS OverviewCrest Proofpoint - Isolation
## Overview{% #overview %}

The Proofpoint email security integration monitors and visualizes [Proofpoint TAP](https://www.proofpoint.com/us/products/advanced-threat-protection/targeted-attack-protection), [Proofpoint on Demand](https://www.proofpoint.com/us/products/email-security-and-protection/email-protection), and [Proofpoint Isolation](https://www.proofpoint.com/us/products/cloud-security/isolation).

### Proofpoint Targeted Attack Protection (TAP){% #proofpoint-targeted-attack-protection-tap %}

**Proofpoint Targeted Attack Protection (TAP)** is an advanced threat protection solution designed to safeguard organizations from targeted attacks in today's evolving security landscape. TAP combines advanced technologies, threat intelligence, and real-time analysis to provide comprehensive protection against email-based threats, including advanced malware, phishing attacks, and social engineering techniques. It also helps detect, mitigate, and block advanced threats that target people through email. The solution detects attacks that use malicious attachments and URLs to install malware or trick users into sharing their passwords and other sensitive information.

### Proofpoint on Demand{% #proofpoint-on-demand %}

**Proofpoint on Demand** is a comprehensive cloud-based cybersecurity platform designed to safeguard businesses from various cyber threats. It offers a diverse array of services, such as email security, threat intelligence, information protection, and compliance solutions. It enables you to make informed decisions and take necessary steps to enhance your overall security posture. Additionally, the app provides insightful details about the encryption status of your communication, further enhancing your understanding of data protection measures.

#### Key features of Proofpoint on Demand{% #key-features-of-proofpoint-on-demand %}

- **Email traffic monitoring:** Monitor the flow of messages to proactively identify and prevent spam, phishing attempts, and other email-related threats.
- **Compliance monitoring:** Monitor email communications to ensure adherence to internal policies and external regulations, such as Data Loss Prevention (DLP), Domain-based Message Authentication, Reporting, and Conformance (DMARC), and other applicable guidelines.
- **Incident investigation:** Conduct thorough investigations of potential security incidents by leveraging email security and compliance data. This includes tracing the origins of security threats and assessing their impact.
- **User behavior monitoring:** Keep a close eye on email-related behavior to detect any signs of insider threats or unauthorized access attempts.

### Proofpoint Isolation{% #proofpoint-isolation %}

**Proofpoint Isolation** is designed to enhance cybersecurity by isolating and protecting users from potentially malicious content. The primary goal is to prevent users from interacting directly with harmful or suspicious content, thereby reducing the risk of cyber threats.

This integration monitors:

- `Messages Blocked and Delivered` and `Clicks Blocked and Permitted` that are processed by Proofpoint TAP server.
- Message type data using Proofpoint on Demand Log Service as the source and utilizes the secure WebSocket (WSS) protocol.
- User's web browsing and email activity by the Proofpoint Isolation Server.

## Data Collected{% #data-collected %}

### Metrics{% #metrics %}

|  |
|  |
| **cds.proofpoint.tap.messages\_blocked.imposterScore**(gauge)   | Imposter score for messages blocked   |
| **cds.proofpoint.tap.messages\_blocked.phishScore**(gauge)      | Phish score for messages blocked      |
| **cds.proofpoint.tap.messages\_blocked.spamScore**(gauge)       | Spam score for messages blocked       |
| **cds.proofpoint.tap.messages\_blocked.malwareScore**(gauge)    | Malware score for messages blocked    |
| **cds.proofpoint.tap.messages\_delivered.imposterScore**(gauge) | Imposter score for messages delivered |
| **cds.proofpoint.tap.messages\_delivered.phishScore**(gauge)    | Phish score for messages delivered    |
| **cds.proofpoint.tap.messages\_delivered.spamScore**(gauge)     | Spam score for messages delivered     |
| **cds.proofpoint.tap.messages\_delivered.malwareScore**(gauge)  | Malware score for messages delivered  |

## Support{% #support %}

For support or feature requests, contact Crest Data through the following channels:

- Support Email: [datadog.integrations@crestdata.ai](mailto:datadog.integrations@crestdata.ai)
- Sales Email: [datadog-sales@crestdata.ai](mailto:datadog-sales@crestdata.ai)
- Website: [crestdata.ai](https://www.crestdata.ai/)
- FAQ: [Crest Data Datadog Marketplace Integrations FAQ](https://docs.crestdata.ai/datadog-integrations-readme/Crest_Data_Datadog_Integrations_FAQ.pdf)

This application is made available through the Marketplace and is supported by a Datadog Technology Partner. Click Here to purchase this application.
