26 Integrations with Proofpoint Digital Risk Protection

View a list of Proofpoint Digital Risk Protection integrations and software that integrates with Proofpoint Digital Risk Protection below. Compare the best Proofpoint Digital Risk Protection integrations as well as features, ratings, user reviews, and pricing of software that integrates with Proofpoint Digital Risk Protection. Here are the current Proofpoint Digital Risk Protection integrations in 2026:

  • 1
    Amazon Web Services (AWS)
    Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise.
  • 2
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 3
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 4
    CrowdStrike Falcon
    CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
  • 5
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 6
    Palo Alto Networks Next-Generation Firewalls
    Palo Alto Networks offers ML-powered Next-Generation Firewalls (NGFW) that use inline deep learning to detect and stop the most evasive and unknown zero-day threats. These firewalls provide zero-delay signature updates, ensuring threats are blocked within seconds across the network. The platform delivers detailed visibility into IoT and connected devices, profiling them accurately to prevent unmanaged access. With AI-driven operations, it maximizes security effectiveness while minimizing downtime and resource costs. Recognized as a leader by industry analysts like Forrester, Palo Alto Networks’ NGFWs protect organizations of all sizes and complexities. They support a wide range of deployment environments including branch offices, data centers, public cloud, and 5G networks under a unified security architecture.
  • 7
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 8
    SIRP

    SIRP

    SIRP

    SIRP is a no-code risk-based SOAR platform that connects everything security teams need to ensure consistently strong outcomes into a single, intuitive platform. SIRP empowers Security Operations Centers (SOCs), Incident Response (IR) teams, Threat Intelligence teams, and Vulnerability Management (VM) teams through integration of security tools and powerful automation and orchestration tools. SIRP is a no-code SOAR platform with a built-in security scoring engine. The engine calculates real-world risk scores that are specific to your organization for every incident, alert, and vulnerability. This granular approach enables security teams to map risks to individual assets and prioritize response at scale. SIRP makes all security tools and functions available to security teams at the push of a button, saving thousands of hours each year. Design and enforce best practice security processes using SIRP’s intuitive drag-and-drop playbook building module.
  • 9
    Imperva Application Security Platform
    Imperva's Application Security Platform offers comprehensive protection for applications and APIs, addressing modern threats without compromising performance. The platform integrates Web Application Firewall (WAF), Advanced Bot Protection, API Security, DDoS Protection, Client-Side Protection, and Runtime Protection to safeguard against vulnerabilities and attacks. By leveraging advanced analytics and automated threat mitigation, Imperva ensures that applications remain secure across cloud, on-premises, and hybrid environments.
  • 10
    UpContent

    UpContent

    UpContent

    It’s time for your team to position themselves, and your company, as trusted resources to provide your customers, prospects, and other team members with the most valuable insights of the day. Build trust and deepen relationships with curated content. A better way to discover, collaborate, and distribute relevant third-party content that helps turn leads into loyal customers. Our technology analyzes millions of articles every single month to make sure we only bring you the best of the best. We integrate with many of the email, social media, website, and CRM tools that you know and love, making it quick and easy for you to share great content with your audience.
    Starting Price: $15 per month
  • 11
    HCL Accelerate

    HCL Accelerate

    HCL Technologies

    HCL Accelerate is the value stream management platform in the HCL Software DevOps solutions set. It provides tools to help you understand your DevOps practices, implement changes, review change impact, and automate release processes. All these tools are managed from a single user interface. HCL Accelerate helps you get the most out of your DevOps investments by improving throughput, identifying bottlenecks, and unifying data from across your organization so you can make intelligent business decisions.
    Starting Price: Free
  • 12
    Spoom

    Spoom

    Spoom

    Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.
    Starting Price: €40 per user per month
  • 13
    CyberArk Secure Cloud Access
    CyberArk Secure Cloud Access protects cloud identities by managing access securely across multi-cloud environments without compromising user experience. It centralizes control with granular access policies and just-in-time privilege granting, helping reduce risk while maintaining productivity. Designed to integrate seamlessly with existing workflows, it ensures secure and efficient cloud access for developers, engineers, and administrators.
  • 14
    Splunk APM
    Innovate faster in the cloud, elevate user experience and future-proof your applications. Built for the cloud-native enterprise, Splunk helps you solve modern issues. Detect any issue before it turns into a customer problem. Reduce MTTR with our real-time, AI-driven Directed Troubleshooting. Flexible, open-source instrumentation eliminates lock-in. Maximize performance by seeing everything in your application, and act on AI-driven analytics. To deliver a flawless end-user experience, you need to observe everything. With NoSample™ full-fidelity trace ingestion, leverage all your trace data to identify any anomaly. Reduce MTTR with Directed Troubleshooting to quickly understand service dependencies, correlation with underlying infrastructure and root-cause error mapping. Breakdown and explore any transaction by any metric or dimension. Quickly and easily understand how your application behaves for different regions, hosts, versions or users.
    Starting Price: $660 per Host per year
  • 15
    Eviden MDR Service
    How to ensure your organization is permanently protected against cyber-threats? Cyber-attacks get more sophisticated and more aggressive every day. As a cybersecurity service provider, Eviden provides continuous protection in a rapidly changing world of threat. Eviden offers a full spectrum of advanced detection and response services around the clock and across the globe. We have developed the next generation SOC, Prescriptive Security Operation Center dedicated on preventing breaches from happening by leveraging big data and supercomputing capabilities and automating security responses. We provide CERT services, with threat intelligence, CSIRT Services and vulnerability management. Our Advanced Detection and Response services establish highly resilient security practices to counter Advanced Persistent Threats (APT), SOC Services and context-aware IAM. Get 24/7 threat monitoring, hunting, and full-service response.
  • 16
    Optiv Managed XDR
    Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.
  • 17
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 18
    Amplifier Security

    Amplifier Security

    Amplifier Security

    Self-healing security for your workforce powered by AI with human-in-the-loop automation. Bridge the security and workforce divide with a modern way to run workforce security. Harness the power of AI and your workforce to secure your business. Quit tracking spreadsheets and chasing down employees, and resolve security issues at record speed. Enforce security control in collaboration with employees, so they can maintain productivity. Leverage your existing security tools whether for discovering security findings or taking remediation actions. Our vision is to shift the cybersecurity focus back to include both technology and the people who use it, creating a balanced and more secure environment for businesses.
  • 19
    appNovi

    appNovi

    appNovi

    Connect your existing tools and consolidate your asset inventory. Gain an authoritative data source to empower your analyst and decrease escalations. Prioritize vulnerable assets based on network exposure and business impact. Understand the threat exposure of assets and alert on compliance drifts. Gain an authoritative source of data to understand your environment. Gain complete asset inventories, identify missing security agents, understand exposure, and prioritize vulnerabilities effectively. Maintain complete asset inventories using your existing tools. Prioritize risk based on network exposure and business impact. Gain total visibility of your environment and threat exposure. Streamline operations and reach outcomes faster by eliminating IT data uncertainty. Understand cardholder data protection, enhance vulnerability management processes, and identity where compensating controls are needed.
  • 20
    Blackwell Security

    Blackwell Security

    Blackwell Security

    Blackwell’s hyper-specialized security operations are tailor-made to deliver the most complete protection and rapid response aligned to the unique needs of healthcare organizations. Secure your entire environment with full MDR signals, customized healthcare intelligence, and advanced security tooling that ensures 24/7 protection against complex cyber threats. Blackwell Security provides managed security operations designed exclusively for healthcare organizations, so you can reduce risk, maintain compliance, and build a secure continuum of care. Optimize existing tooling, expand your SOC team, and partner with expert healthcare threat hunters for continuous visibility, incident prevention, and compliance alignment using your current tools. Elevate your organization’s cybersecurity maturity with specialized guidance to streamline and strengthen your security practices, mitigate gaps in your cyber compliance posture, and proactively drive improvements across your program.
  • 21
    OrangeCRM

    OrangeCRM

    OrangeCRM

    We understand that each business has unique processes, goals and requirements. OrangeCRM provides the flexibility you need by offering a comprehensive set of modules that meets the demand for a customized Relationship Management system. A module is an additional component that seamlessly integrates with your OrangeCRM database to provide supplementary functions and tools according to your specific business needs. Our robust suite of modules includes something for all business types - whether you are a start-up company just opening its doors or a large corporation requiring multiple intricate utilities - making OrangeCRM powerful enough to serve as a one-stop solution for companies of any size. The Analytics module provides the business intelligence, analytics and on demand reporting you need to interpret and analyze your data. Our web based platform allows authorized personnel within your organization to instantly access and monitor key metrics and make informed decisions anytime.
    Starting Price: $499 per month
  • 22
    NTT Cloud Communications
    We provide cloud communication solutions that enable dynamic collaboration interactions for improved workforce efficiency, productivity and engagement. Cloud Communications is a division of NTT Ltd. and a core component of its Intelligent Workplace solution. Our mission is to provide leading cloud communication solutions that enable dynamic collaboration interactions for improved workforce efficiency, productivity and engagement. We specialize in unified communications, cloud voice and digital events, delivering tailored end-to-end consulting, value realization services and change management to empower businesses and enable their digital workplace transformation. Wherever your people and clients are in the world, whichever device and platform they use to collaborate and communicate with others, we can help streamline and optimize productivity across your hybrid workplace.
  • 23
    Stamus Networks

    Stamus Networks

    Stamus Networks

    Network-based threat detection and response solutions from Stamus Networks. Expose serious threats and unauthorized activity lurking in your network. We tap into the inherent power of network traffic to uncover critical threats to your organization. We offer the best possible asset-oriented visibility and automated detection to help practitioners cut through the clutter and focus on serious and imminent threats. Stamus Security Platform (SSP) is an open network detection and response solution built on a Suricata foundation that delivers actionable network visibility and powerful threat detection. Stamus Security Platform is trusted by some of the world’s most targeted organizations, including government CERTs, central banks, insurance providers, managed security service providers, financial service providers, multinational government institutions, broadcasters, travel and hospitality companies, and even a market-leading cybersecurity SaaS vendor.
  • 24
    Trade360

    Trade360

    CGI Group

    CGI Trade360 delivers all of the software, infrastructure and support resources necessary to power a bank’s global trade business. Delivered as a software as a service (SaaS), CGI Trade360 enables banks to provide the full range of traditional trade, payables, receivables and cash management services to their customers—anywhere, anytime—on a single, integrated and global platform. The CGI Trade360 platform is built uniquely for multi-bank, multi-currency and multi-time zone processing. It’s comprised of a corporate portal, an efficient back-office trade processing system with sophisticated imaging and workflow, an advanced reporting utility, and an XML-based integration architecture. CGI Trade360's SaaS model has been in operation for more than two decades, providing you with infrastructure and IT services that free you up to focus on running and growing your banking business. Also offered as an on prem solution for global institutions.
  • 25
    Cognizant

    Cognizant

    Cognizant

    Reimagine your Revenue Cycle. Powered by intelligent automation, proven methods, and experienced professionals, our RCM solutions are purpose-built to help you improve performance. Through partnership with Cognizant, you can improve your financial results quickly and advance every aspect of your business office with digital. With a strong business office and trusted partner, you can focus on delivering amazing care. Are rising costs, increasing patient responsibilities and changing regulations creating new challenges for your organization? Cognizant creates customized end-to-end solutions to fit your needs to help achieve optimal operations and financial success. Utilizing innovative solutions and services combined with industry expertise, we help clients transform their business to drive growth and prepare for the future of healthcare. Learn how we help hospitals, health systems and physician practices drive intelligent automation to simplify business processes.
  • 26
    Verizon Cloud

    Verizon Cloud

    Verizon Media

    Verizon Cloud is a wireless service that securely stores your files in the cloud. Files are encrypted during transfer, and only you can access and use them anytime on all your devices: phones, computers and tablets. Use it to back up your files and restore them after crashes, and transfer content in case of device damage, theft, loss or upgrade. You can access your content through the My Verizon website or the Verizon Cloud app on your Apple® iOS device, Android™ device or computer (Windows® or Mac®).Safely store photos, videos, and documents from your phone and computer to the cloud. Unlimited storage for photos, videos, and documents for up to 5 users. No limit to the number of eligible phones and computers covered. Give yourself peace of mind - back your photos and videos to the cloud. Save yourself the worry of file loss if your handheld is lost or stolen, or your desktop experiences a virus or meltdown.
    Starting Price: $5.99 per month
  • Previous
  • You're on page 1
  • Next