HomeSecurity ArchitectureProofpoint Transforms Email and Data Security for the Agentic Workspace

Proofpoint Transforms Email and Data Security for the Agentic Workspace

Published on

spot_img

New Innovations in Email Security and Data Access Governance by Proofpoint

SUNNYVALE, Calif. and RSAC Conference 2026, San Francisco – March 23, 2026 – Proofpoint, Inc., a prominent player in cybersecurity and compliance, has announced significant advancements in its Collaboration Security and Data Security portfolios. These innovations are tailored to enhance protection within the "agentic workspace," a modern business environment where human employees and AI agents collaborate to perform essential tasks.

With the increasing integration of AI assistants and autonomous agents in organizational processes, companies are delegating authority on an unprecedented scale. AI systems today are capable of drafting communications, accessing sensitive information, and executing actions at machine speed. This paradigm shift poses a considerable challenge to traditional enterprise risk management. Static access controls and identity verifications are proving inadequate; instead, security teams must now focus on understanding the nuances of communication, monitoring data access, and verifying whether activities align with genuine business intentions.

Email remains the most vulnerable entry point for cyber threats, facilitating cybercriminals’ access to sensitive data. As AI agents amplify the rate and scale at which data interactions occur, organizations increasingly struggle to maintain adequate visibility and control. Proofpoint aims to bridge this gap by integrating email defense mechanisms, AI-infused data access governance, and hybrid data visibility into a consolidated platform. This merger aids security personnel in minimizing blind spots, enhancing behavioral insights, and addressing risks with higher precision while reducing operational friction.

Enhancing Email Collaboration Security

Proofpoint is unifying two of its leading email security solutions—the Secure Email Gateway (SEG) and API-based protection—into an integrated architectural framework. Each solution is a robust, enterprise-grade protector on its own; combined, they form a coordinated defense model. The SEG secures north-south traffic at the perimeter, while API-based protection ensures secure east-west email interactions. The amalgamation of shared threat intelligence and behavioral signals enhances detection capabilities over time. Furthermore, a centralized workbench allows customers to efficiently manage all aspects of protection across incoming, outgoing, and internal emails.

This integrated model offers expanded coverage against internal threats, vulnerability to direct send exploits has become a notable concern in cloud environments. By correlating detection insights across multiple layers, organizations gain deeper insights into anomalous activities, whether stemming from compromised accounts or automated agents operating within their collaborative systems. The unified administrative experience simplifies policy management, investigations, and response, thereby alleviating analyst fatigue and limiting the need for excessive console switching.

Tom Corn, executive vice president and general manager of Proofpoint’s Threat Protection Group, emphasized the importance of email as the primary access point to enterprises, especially in environments where both human and AI agents interact. He stated that as organizations cede more decision-making authority to AI systems, it becomes essential for security operations to interconnect various detection signals. This understanding not only helps in tracking isolated events but also in identifying behavioral trends and underlying intentions. Corn asserted that Proofpoint is setting new standards in collaboration security by safeguarding both human users and AI agents.

Unified Data Access Governance

Proofpoint has introduced advanced AI Data Access Governance capabilities that offer comprehensive visibility into who can access sensitive data across SaaS applications, cloud solutions, and on-premises environments. This encompasses access rights for human users, service accounts, and AI agents alike. With these tools, security teams can identify outdated permissions, orphaned accounts, and over-privileged access rights, while automated remediation workflows help to mitigate risks without relying on manual ticketing processes.

By merging various metrics—identity activities, data sensitivity, access patterns, and risk indicators—within a centralized Data Security Graph, organizations can move beyond static risk assessments. This dynamic approach emphasizes continuous risk reduction, prioritizing governance choices based on actual behavior rather than simplistic entitlement lists.

Expanding AI-native Data Security Posture Management

As AI technologies increasingly become integral to business processes, sensitive data often shifts between legacy systems and cloud applications. Without consistent classification and discovery methods, security teams struggle to monitor how both human agents and AI systems interact with this data effectively.

In response to these persistent challenges, Proofpoint is extending its AI-focused Data Security Posture Management (DSPM) functionalities to on-premise environments. This enhancement enables intelligent data discovery and classification across the entire organizational landscape, allowing businesses to maintain consistent visibility into their sensitive data, irrespective of its location. Such clarity aids in accurate risk prioritization and minimizes exposure associated with fragmented security tools spanning both cloud and on-premises systems.

Mayank Chaudhary, executive vice president and general manager of the Data Security Group at Proofpoint, remarked on the dynamic nature of data risk, emphasizing that it now traverses a complex landscape that includes both cloud services and on-prem systems, accessed by a mix of human users and AI agents. Chaudhary highlighted that by integrating data access governance and hybrid DSPM within a single platform, organizations can gain a comprehensive perspective on their data, understand who has access, and take decisive actions based on behavioral insights and context.

Availability

These newly introduced capabilities are slated for availability in the second quarter of 2026, subject to standard rollout considerations and geographical availability.

About Proofpoint, Inc.

Proofpoint, Inc. stands as a global leader in human- and agent-centric cybersecurity, safeguarding the interactions between individuals, data, and AI agents across email, cloud, and collaboration tools. The organization serves as a trusted partner for more than 80 Fortune 100 companies, over 10,000 large enterprises, and millions of smaller organizations, stopping threats, preventing data loss, and enhancing resilience across various workflows. To learn more, visit Proofpoint.

For ongoing updates, connect with Proofpoint on LinkedIn.

Source link

Latest articles

Over 511,000 End-of-Life IIS Instances Discovered Online, Increasing Security Risks

Major Security Concern: Over 511,000 Outdated Microsoft IIS Instances Discovered Online In a staggering revelation...

Operation Alice Disrupts Over 370,000 Dark Web Sites

Europol-Led Operation Dismantles Major Dark Web Child Exploitation Network In a landmark operation supported by...

Behavioral XDR and Threat Intel Identify North Korean Fake IT Worker Within 10 Days of Hire

In a recent incident underscoring the ongoing cyber threats posed by North Korean operatives,...

Crime Stoppers Breach Exposes 8.3 Million Tips

In recent developments, traditional methods of anonymous reporting have fallen victim to technological vulnerabilities,...

More like this

Over 511,000 End-of-Life IIS Instances Discovered Online, Increasing Security Risks

Major Security Concern: Over 511,000 Outdated Microsoft IIS Instances Discovered Online In a staggering revelation...

Operation Alice Disrupts Over 370,000 Dark Web Sites

Europol-Led Operation Dismantles Major Dark Web Child Exploitation Network In a landmark operation supported by...

Behavioral XDR and Threat Intel Identify North Korean Fake IT Worker Within 10 Days of Hire

In a recent incident underscoring the ongoing cyber threats posed by North Korean operatives,...