1 / 4

Proofpoint Protection/Privacy Offering

Proofpoint Protection/Privacy Offering. Proofpoint Privacy Accurately detect ePHI in e-mails Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization E-mail Encryption

keola
Download Presentation

Proofpoint Protection/Privacy Offering

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Proofpoint Protection/Privacy Offering • Proofpoint Privacy • Accurately detect ePHI in e-mails • Integrated DLP with Encryption • Workflow to automate process of securing content • Incident identification to understand your risk • Unstructured Data Analysis • Customization • E-mail Encryption • Easy for administrators and end users • Proofpoint Protection • Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content, viruses for both inbound and outbound e-mail. • Low false positives • End-user friendly – Intuitive end user digest • Helpdesk friendly with fast message tracking • Set / forget – Low administration • Flexibility – The ability to tailor to your needs

  2. Proofpoint Proposal

  3. Fastest Growing in Messaging Security (2008) Best Buy (2009) Proofpoint:Email Security Solutions 4000+ Customers Leading email security, compliance, & archiving solutions for Global 2000 Enterprise-class protection for lowest email risk & cost of ownership Industry leadership Leaders Quadrant, Email Security Boundaries (2008, 2010, 2011)

  4. Summary • Proofpoint is specialized and focused in Email Security and Compliance • Better Effectiveness against the latest threat types. • Including phishing and low volume targeted attacks, and protecting your company’s brand by blocking outbound spam. • Multi-layered defense in depth • Smart Identifiers for SSNs, PANs, ABA Routing Numbers, etc. • Proximity and correlation analysis to client data • Integrated encryption • Native, integrated, strong encryption technology • Encrypt messages automatically, based on presence of sensitive data • Easy to implement and use • Deploy in days • Proofpoint Key Service eliminates key management overhead “Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on email security issues and continued product enhancements.” Gartner 2011

More Related