B1
SOLUTIONS

FOR YOUR ENTERPRISE

OUR SOLUTIONS BY NEED

PROTECTION

Detect, block, guard, respond to email and social-media based threats.

COMPLIANCE

Easily comply with internal security controls and external regulatory policies

DISCOVERY

Find information quickly—whether it resides on email, IM, social media, or shared drives

OUR SOLUTIONS FOR SMALL BUSINESS

ESSENTIALS

PROOFPOINT ESSENTIALS

Proofpoint Essentials Threat Protection, Compliance, Discovery leveraging the leading technologies in a suite designed for small business. Proofpoint Essentials offers the ultimate email security protection for the smaller enterprise. This cloud based enterprise-class email security, continuity and discovery is designed specifically for SMEs, and available at a price that delivers value and cost savings..

 

 

 

 

OUR SOLUTIONS BY ROLE

SECURITY

Today’s security challenges won’t be solved by buying more of the same technologies. We need to change how we think about security.

MESSAGING OPS

Messaging, email and social media, is more important than ever and strategic assets demand modern protection,

LEGAL

Automating legal holds, proactive management and simplified eDiscovery of your data is critical when addressing litigation risks.

COMPLIANCE

Data must be protected and it must be available. There are many rules about data, and it’s costly to the enterprise when they are broken.

OUR SOLUTIONS BY INDUSTRY

Proofpoint helps the most successful companies in the world protect and govern their most sensitive business data.

business
B2

ADVANCED THREAT PROTECTION

Attackers are constantly changing their tactics and developing ever more advanced threats.  Now more than ever, organizations need full lifecycle protection against targeted attacks and advanced persistent threats.
threat-protection-needs-1_2

TODAY’S CHALLENGES

BLOCK KNOWN THREATS

Malware, viruses, phish, and spam.

DETECT UNKNOWN THREATS

Zero-day exploits and advanced targeted attacks.

RESPOND TO INCIDENTS

Single pane of glass for your threat data.

HARDEN AGAINST LOSS

Track sensitive content and remediate risk.

THREAT PROTECTION NEEDS

Block Known Threats

pdf
The goal:
Identify and stop threats before they enter your organization.

The problem:
The vast majority of threats targeting organizations are threats that have already been identified, yet many organizations still fall victim to these attacks due to existing protection systems failing to block these known threats.

The solution:
Proofpoint’s Enterprise Protection solution uses a combination of advanced technologies to identify more known threats and block them. These technologies leverage big data, machine learning and our unique position in the email stream of a large percentage of the Internet’s overall enterprise email traffic to provide industry leading threat identification and blocking. That’s why Gartner ranked Enterprise Protection as the leader in the Magic Quadrant for Secure Email Gateways.

The result:
Better blocking of common attacks and malicious emails before they reach your network.

Detect Unknown Threats

pdf
The goal:
Find advanced threats faster—before users get infected.

The problem:
Attackers frequently modify malware to avoid detection by traditional antivirus and blocking solutions. These polymorphic threats, along with new threats known as zero-day exploits, are very challenging to detect.

The solution:
Proofpoint’s Targeted Attack Protection (TAP) solution delivers advanced malware detection for both URL-based attacks and attachment attacks. Advanced analysis technologies like statistical analysis (big data), pre-exploit indicator detection, advanced sandboxing and static analysis are just some of the techniques employed by TAP to detect advanced threats.

The result:
High detection ratios for even the most elusive threats and targeted attacks.

Respond to Incidents

pdf
The goal:
Verify and respond to detected threats faster resulting in reduced data exposure.

The problem:
Security teams are receiving a barrage of security alerts about threats that may, or may not, be real. Precious time is lost while analysts switch between different systems to review these threats and try to confirm whether or not users have actually been infected.

The solution:
Proofpoint’s Threat Response solution provides a single pane of glass for security teams to review and investigate detected threats. With support for a variety of detection vendors, including malware sandboxing solutions and SIEM, analysts can focus their time on assessing the threat and impact rather than collecting data to review. Built-in workflows support rapid containment activities like blocking CNC traffic and isolating infected machines off the network.

The result:
Rapidly respond to detected threats with higher confidence in the actions that need to be taken.

Harden Against Loss

pdf
The goal:
Find the sensitive data, like credit card numbers, PII and SSN, in your network and cloud services—and monitor that sensitive data for unauthorized access or distribution.

The problem:
As data becomes more distributed, often spread across user systems, servers and now hosted in the cloud, locating sensitive data is increasingly difficult. This distribution of data also increases the challenge of monitoring it and detecting unauthorized access.

The solution:
Proofpoint’s Enterprise Privacy solution includes Content Control for data discovery and Data Loss Prevention for detecting policy violations for sensitive data.

The result:
Locate your sensitive data across the network and put policies in place to monitor for appropriate access.

B3

REGULATORY COMPLIANCE AND INTERNAL POLICY NEEDS

Ensure external and internal compliance, transparently, so your users can simply ‘post’ to social media or press ‘send’ in email without being forced to make policy decisions.  From guaranteeing adherence to internal HR or security controls on communications, to external regulatory constraints such as HIPAA PCI FINRA or others or internal policy, Proofpoint’s transparent DLP, Encryption, and Content Control for email and Social Media will fulfil your compliance needs.
compliance-needs-1_0

TODAY’S CHALLENGES

BLOCK DATA LOSS

Email and uploads

SECURE COMMUNICATIONS

Outbound email and files

COMPLY WITH REGULATORY POLICIES

Social media, instant messaging, email

CONTROL INFORMATION DISTRIBUTION

Data distributed on desktops, cloud

COMPLIANCE NEEDS AND SOLUTIONS

Block Data Loss

The goal
Remove the risk of the wrong material leaving your enterprise. This includes proprietary material, offensive material, material not in compliance with government regulations or your own policies, or sensitive material addressed to the wrong person. If that material has already been sent and the situation has changed, immediately remove recipients’ access to the material.

The problem
Best practice is to keep security and disclosure policy decisions out of the hands of individual end users. However, for various reasons, many organizations force end users choose which content is appropriate to be sent out, whether to encrypt it or not, and how and where to send it—too often resulting in the wrong choice and a non-compliant outcome.

The solution
Proofpoint eliminates the risk inherent in individuals making security and disclosure policy decisions by implementing a user-transparent, centrally based, policy-driven data loss prevention filter. Users simply send email or files, and the appropriate action is automatically taken—e.g., allowing the information to be sent or posted, encrypted if appropriate,, or re-routing it to IT, HR, or back to the user for remediation.

The result
Proofpoint ensures policy is implemented consistently, reliably, and without incentives for users to circumvent it.

Secure Communications

pdf
Send encrypted email automatically—without your organization’s end users having to take any action. Senders simply press send. If there’s a problem encountered with any recipient, recall the email you wish hadn’t been sent.

The problem
More than two thirds of an organization’s intellectual property is typically exchanged by email between offices, partners, and customers. If your sensitive content is being sent out without proper oversight regarding its compliance to government regulations as well as your own policies, it might not be encrypted—and you run the risk of leaks and other exposure. In addition, if you count on individual users to determine the appropriateness of the content, you also risk exposure, whether caused accidentally or purposefully.

The solution
Proofpoint enables user-transparent, automatic encryption, and addresses regulated email as well as email that needs to be retracted in the event of an error or recipient data breach. No user action is required. Senders simply press “Send.” If there’s a problem with a recipient(s), the mail can be revoked.

The result
Proofpoint makes sure information control is extended beyond the borders of the building—and so information risk is correspondingly reduced.

Comply with Regulatory Polices

The goal
Execute quick and reliable archival, search and tracking of files.

The problem
Organizations face increasingly large amounts of complex regulation, accompanied by increasingly high penalties for violations. In addition, they may experience even higher internal costs, due to compliance failure.

The solution
Proofpoint enables users to archive and search email, files, IM, and social media communications, and more, with a 20-second search time—and even tracks files as they move between email and desktops, share drives and SharePoint.

The result
Proofpoint ensures that proof of chains of custody, information exposure, and original data are all at compliance officers’ fingertips—without the need for lengthy IT involvement or resource allocation.

Control Information Distribution

pdf
The goal
Identify and track data to always understand which documents are where, thusremediating risk.

The problem
The more places sensitive data is, the more likely it will be exposed to the wrong people – via malicious breach, espionage, or simple employee error. But the modern enterprise demands that data be available. How can you balance the need for availability with the need for visibility and control?

The solution
Proofpoint is able to identify and track sensitive content and its movement before any loss occurs, regardless of cause—and employs powerful policy controls to perform automated remediation of risk (eg, notification of data in the wrong place, and deletion or reclamation as appropriate)…before it’s too late.

The result
Proofpoint ensures that data movement and location become visible, data loss risk is reduced, and users’ behaviors are better understood.

B4

QUICKLY FIND INFORMATION

Quickly find information wherever it resides—from documents on desktops to email, share drives, SharePoint, or web repositories. Whether it’s supervisory review or in response to legal or regulatory challenge, Proofpoint’s Enterprise Archive and Governance solutions ensure reliable, guaranteed, rapid response time-results to real-time queries. Legal or compliance teams can even self-service search via laptop or mobile devices.

  • Retain email, files, social
  • Get search results in <20 seconds
  • Manage unlimited legal holds
  • Dispose of data reliably
discovery-needs-1_0

TODAY’S CHALLENGES

RETAIN DATA

Securely archive social media, instant messaging and email

DISCOVER INFORMATION

Desktop, shared drive, email, SharePoint, and cloud

COMPLY WITH RULES AND REGULATIONS

Retention and preservation

DISPOSE DEFENSIBLY

Data distributed on desktops, networked file shares, SharePoint and cloud

DISCOVERY NEEDS

Retain Data

pdf
The goal
Organize, store and manage information according to its value—and search it fast.

The problem
Even though a majority of organizations’ intellectual property is exchanged in email, legacy email archiving doesn’t provide sufficient retention coverage. It misses social media communications and different types of attachments (not all documents are MS Office-based).

The solution
Today, high value information is everywhere—in email, social media, networked file shares, and lost in PST files. Searching for it when a regulator or Discovery request arrives is not efficient or cost-effective—with multiple points of potential failure. Proofpoint enables you to store every email, attachment, and social media communication, and file it in place on desktops, shared drives, SharePoint, social sites, and more. Our cloud architecture ensures 20-second search response times, even as storage scales to multiple terabytes.

The result
Proofpoint delivers greater control over valuable information to improve readiness and response to legal and regulatory demands.

Discover Information

pdf
The goal
Store, organize, dispose of, and discover your enterprise’s files, and ensure consistent enforcement of policies across multiple file types and locations. Readily defend daily actions and business practices to regulators or in litigation.

The problem
As information retention scales to multiple terabytes, and information formats range from email to social media and from MS Office documents to PDFs, it’s far too easy for crucial data to be missed in Discovery.

The solution
Proofpoint provides web- and mobile-based real-time search of every email, attachment, social communication, and more. Cloud architecture ensures 20-second response times even across a range of file-types, locations, and multi-terabyte storage.

The result
Achieve faster, comprehensive, and end-counsel-driven search—which ensures there are no surprises later in a Discovery process.

Comply with Rules and Regulations

The goal
For regulatory and legal purposes, ensure you have all the information you’re supposed to have—and don’t have any of the information that was supposed to be deleted.

The problem
It’s difficult for regulated organizations to demonstrate active compliance with regulatory mandates and internal policy—from supervision to retention—often across multiple divisions and geographies.

The solution
Proofpoint offers very flexible, reliable retention and preservation solutions, including such functionality as segregated policy, supervision, and administration capabilities—even as your organization scales.

The result
Receive active supervision and consistent application of even disparate policy across multiple file types and locations— so compliance is actively demonstrated as part of daily business.

Dispose Defensibly

The goal
Dispose of information reliably and consistently, which is crucial for legal defense and regulatory policy adherence.

The problem
It is challenging to keep track of which documents fall under which retention and disposal policies across multiple file types and locations.

The solution
To ensure consistent disposal, Proofpoint applies multiple, overlapping policies to information centrally archived or in place—whether email, social, or documents in desktops, shared drives or SharePoint.

The result
Benefit from policy enforcement and improved process defensibility—and expect no mistakes, no surprises, and full compliance with external and internal policy.

GARTNER MAGIC QUADRANT FOR SECURE EMAIL GATEWAYS, 2014

READ GARTNER, INC.’S MAGIC QUADRANT FOR SECURE EMAIL GATEWAYS

Gartner, Inc. positions Proofpoint in the Leaders Quadrant in its 2014 Magic Quadrant for Secure Email Gateways

According to Gartner, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability encryption and better protection from targeted phishing attacks.”

The Gartner report also details, “Better protection from targeted phishing attacks is the most critical inbound protection capability (98% of respondents indicated that this was an important or very important capability), but only a few vendors have advanced the state of the art against these attacks. Leading solutions are incorporating methods to double check – or better, proxy – URL links in email at the ‘time of click’ rather than the time of delivery.”

Please enter your contact information to view the complete Gartner Magic Quadrant for Secure Email Gateways 2014 report.

Magic-Quadrant-for-Email-Security-Secure-Email-Gateways-2014_0