<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Proofpoint: Outlook Plugin

proofpoint outlook plugin

Proofpoint’s Outlook Plugin is part of a broader product offering comprising multiple cyber-security and data protection tools.

The Proofpoint Encryption Plugin for Microsoft Outlook allows organizations to implement secure exchange of messages between users within leaving the Outlook e-mailing interface.

The Outlook Plugin, as well as other security tools by Proofpoint, is a policy-driven solution that offers encryption features, which eliminate the risks associated with regulatory compliance, data loss, and violations of your corporate policies regarding data security.


How the Proofpoint Outlook Plugin Works

The Proofpoint Outlook Plugin provides encryption for your e-mail communications. It thus ensures you comply with federal regulatory frameworks such as HIPAA, SOX, and GLBA and state legislations such as Massachusetts 201 CMR 17. It also helps you fulfill security standards such as PCI-DSS.

The solution is available for the following versions of Microsoft Exchange Server and Microsoft Windows operating system.


Proofpoint Outlook Plugin Compatibility


Microsoft Exchange Version

Windows OS Version

MS Outlook Version

Exchange 2007

Windows 7

Outlook 2007

Outlook 2010

Outlook 2013

Exchange 2010


Exchange 2013

Exchange 2010

Windows 7

Windows 10

Outlook 2007

Outlook 2010

Outlook 2013 (32-bit, 64-bit)

Exchange 2013

Exchange 2016


The Encryption Plugin for Microsoft Outlook is available in both Proofpoint Essentials and Enterprise products tiers.

You should be aware that cloud-based installations of the encryption plugin might not work properly; therefore, install the plugin from a local installation.



Proofpoint Encryption Plugin for Microsoft Outlook offers a solid encryption solution for Outlook-based corporate e-mail communications and while it is not as sophisticated as other tools in the field it features all the capabilities to provide you with both secure e-mail messaging and regulatory compliance.

Topics from this Article

Proofpoint, Compliance, Email Security

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

Top 5 Most Popular Cybersecurity Certifications

The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

Datashield Announces Partnership with Bishop Fox

Two cybersecurity powerhouses partner to provide defensive and offensive security services to boost enterprise companies’ security posture. Scottsdale, Ariz.— Datashield, a Scottsdale-based cybersecurity company, recently inked its partnership with offensive security services firm Bishop Fox. Both companies are based in Arizona and provide outsourced cybersecurity services to top Fortune 500 companies.