E-Rate Cybersecurity Program

The Federal Communications Commission (FCC) has presented four area of equipment and services that are eligible for E-Rate, however, other options may also be eligible. Other equipment or services may also be eligible, provided they meet the Commission's general criteria for qualification.

Please see the FCC FAQ page for more information.

Proofpoint Products Eligible for E-Rate:

  • Proofpoint Email Protection
    • An email gateway available for on-premise deployment, or as a cloud service to utilize machine learning to categorize emails effectively
  • Proofpoint Targeted Attack Protection (TAP)
    • Helps detect and block advanced threats that target people through email, including malicious attachments and URLs
  • Proofpoint Security Awareness Training (PSAT)
    • Includes an "erasure" button that allows administrators to remove personal user data from the system
  • Proofpoint Essentials
    • A cloud-based email security solution for smaller organizations, with automatic updates and a streamlined management platform
E-Rate Eligibility Category Proofpoint Solution
ADVANCED/NEXT-GENERATION FIREWALLS
Advanced Threat Detection and Prevention Email Security
AI/ML Threat Detection and Response Email Security
Application Awareness & Control CASB
Cloud-Delivered Threat Intelligence ET Pro/ET Intel, CASB
Intrusion Prevention/Detection ET Pro/ET Intel
Malware Detection Email Security, ET Pro
ENDPOINT PROTECTION
Anti-Malware Email Security, Isolation
Anti-Ransomware ITDR (Shadow/Spotlight)
Anti-Spam Email Security, Isolation
Anti-Virus Email Security, Isolation
Insider and Privilege Misuse ITM, AEDLP
Privileged Access Management ITDR (Shadow/Spotlight) but as a complement to a PAM
Web Application Hacking TAP Isolation for VAP, Isolation
IDENTITY PROTECTION AND AUTHENTICATION
Active Countermeasure Tools ITDR, Email Security, ET Pro/ET Intel, CASB, TAP ATO, ITM
Cloud Application Protection CASB
Cloud Services CASB
Credential Stuffing CASB, TAP ATO, ITDR
Content Blocking and Filtering/URL Filtering Email Security, Isolation
Digital Identity Tools Digital Risk, Social Patrol
Distributed-Denial-of-Service (DDoS) Protection ET Pro/ET Intel
DNS/DNS-Layer Security, Blocking, and Filtering Isolation
Email and Web Security Email Security, EFD, AES, AEDLP, Email DLP/Encryption, Isolation, CASB
Identity Governance & Technologies CASB, TAP ATO, ITDR
Intrusion Detection Systems (IDS) ET Pro/ET Intel
Password Spraying CASB, TAP ATO
Privileged Identity Management ITDR (Shadow/Spotlight) but as a complement to a PAM
Secure Access Service Edge (SASE) CASB
Web Content Controls Isolation
MONITORING, DETECTION, AND RESPONSE
Advanced Attack Surface Management and Asset Management Solutions ITM
Compliance Assessment Archive (E Discovery, Compliance and Supervision)
Dark Web Scanning ET Intel
Data Loss Prevention Enterprise DLP, AEDLP
Network/Device Monitoring & Response ITM, ET Pro/ET Intel
Network Traffic Analysis ET Pro/ET Intel
Managed Service Providers Managed Services
Maturity Models Managed Services
Network Detection Response (NDR) ET Pro/ET Intel
Security Operations Center (SOC) for Around the Clock (24/7/365) Monitoring, Detection, and Response Managed Services
Threat Hunting/Updates and Threat Intelligence ET Pro/ET Intel, PTIS