Welcome!

Machine Learning Authors: Ed Featherston, Jignesh Solanki, Destiny Bertucci, Liz McMillan, Elizabeth White

News Feed Item

Proofpoint Announces Winter 2013 Update to Its Cloud-Based Security and Compliance Solutions

Highlights Include New Proofpoint Secure Share(TM) Cloud-Based File Transfer Solution

SUNNYVALE, CA -- (Marketwire) -- 01/23/13 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider, today announced its Winter 2013 release which delivers significant enhancements to the Proofpoint Enterprise™ suite of cloud-based threat management, regulatory compliance, information governance and secure communication solutions. Among the features and enhancements in the Proofpoint Winter 2013 release is a new cloud-based solution for secure, compliant file transfer, Proofpoint Secure Share™.

"Rapid innovation enabled by the cloud is one of the primary drivers of strong adoption of the Proofpoint information security and governance suite," said David Knight, executive vice president of products for Proofpoint. "Our Winter 2013 release continues this innovation with the introduction of Proofpoint Secure Share, the third significant new module introduced to the Proofpoint Enterprise suite in the past three quarters."

Introducing Proofpoint Secure Share™
Proofpoint Secure Share™ is a cloud-based, managed file transfer solution that makes it easy for end users to exchange large files securely -- and in compliance with enterprise policies such as data loss prevention rules -- without impacting the organization's email systems or other IT infrastructure. Proofpoint Secure Share™ is designed to simplify the process of exchanging large or sensitive files while also meeting the strict security and compliance requirements of today's enterprise. Benefits include:

  • Highly-secure file sharing experience: Proofpoint Secure Share™ incorporates enterprise-grade security controls including sender/recipient authentication, encryption, malware detection and data management capabilities.
  • Simple enforcement of file sharing policies, including data loss prevention: Proofpoint Secure Share™ allows administrators to easily customize and enforce a wide variety of file transfer policies for data retention and file management. Integrated data loss prevention (DLP) capabilities enable Proofpoint Secure Share™ to detect private, sensitive or confidential information in transferred files and help minimize data exposure risks.
  • End-user ease of use: Proofpoint Secure Share™ allows users to exchange files using a convenient web-based interface or right from their Microsoft Outlook inboxes. Proofpoint Secure Share's™ seamless user experience increases end-user adoption, simplifies file transfer workflows and reduces the risks associated with employees using unsanctioned file sharing alternatives.

Proofpoint Secure Share™ provides enhanced security and administrative control over traditional file transfer methods, existing on-premises solutions, and public cloud file sharing services. Proofpoint Secure Share™ leverages the enterprise-class data loss prevention features of Proofpoint Enterprise Privacy™ suite to automatically enforce DLP rules such as blocking or encrypting sensitive content. Recipient authentication features protect confidential information and help ensure that only valid, verified recipients can receive sensitive files.

Each Proofpoint Secure Share file link is assigned a limited lifespan with an administrator-configurable expiration time. Flexible DLP options enable blocking and/or quarantining of files that violate enterprise policies, end-user notification and reporting features. Return receipts let end users confirm that their files were delivered, while an audit trail is maintained to provide file access tracking and reporting features. File recipients can easily respond and share large files with original senders via Secure Share's web-based user interface which also maintains an audit history of file sharing actions.

For an overview of the capabilities of Proofpoint Secure Share, see this brief video demonstration: http://www.proofpoint.com/secure-share-demo. In February, Proofpoint will host a webinar featuring Proofpoint Secure Share™: http://www.proofpoint.com/id/webinar-q113-privacy/index.php?id=7.

Proofpoint Enterprise Protection, Targeted Attack Protection and Privacy Enhancements
The Proofpoint Winter 2013 release includes updates to Proofpoint's threat management and regulatory compliance capabilities. The Proofpoint Enterprise Protection™ email security solution incorporates enhancements including:

  • Enhanced custom threat and spam definitions and classification rules: The latest version of Proofpoint Enterprise Protection gives administrators more control over threat classifications including phish, bulk mail, and adult content messages, enabling more granular handling of particular message types and improving overall effectiveness.
  • The administrative interface for Proofpoint Enterprise Protection and Privacy is now available in English, Japanese, German and French versions, configurable on a per-administrator basis.
  • Access to various components of the Proofpoint Enterprise administrative interface is now more granular, giving Proofpoint's, large multi-national customers precise control over the rights and permissions granted to individual administrators.

In addition, the Proofpoint Targeted Attack Protection™ solution -- which uses big data analytics and other advanced technologies to provide reliable protection against spear phishing and other malicious, targeted attacks -- continues to be enhanced with new threat detection techniques and advanced malware sandboxing features.

The latest version of Proofpoint Enterprise Privacy™, which provides data loss prevention and policy-based email encryption capabilities, allows even more flexibility in creating customized DLP policies. The solution now includes more than 20 pre-defined lexicons and 35 "smart identifiers" (including a wide variety of international identifiers) to detect personal information, financial information and protected health information and address customer needs to comply with complex, global data protection regulations. Other updates include enhanced control over end-user enrollment for Proofpoint Encryption™ and new customization options for the Proofpoint Secure Reader web-based encryption interface.

Archiving and Information Governance Enhancements
The Proofpoint Enterprise Archive™ cloud archiving solution has been enhanced with a variety of administrative and end-user features including:

  • New user interface localizations: The interface for Proofpoint Enterprise Archive now allows end users to select their preferred language from more than a dozen options including Chinese (Simplified or Traditional), Czech, English, French, German, Italian, Japanese, Polish, Russian, Spanish, Thai and Turkish.
  • Delegated administration and discovery segmentation enhancements: Large organizations that use Proofpoint Enterprise Archive across a number of different business units, agencies or divisions can now limit administrator access to only those mailboxes within an administrator's scope of responsibility. This allows multi-division organizations to delegate mailbox administration to local IT staff while constraining those staff members to manage only those mailboxes within their division. Proofpoint Enterprise Archive's discovery segmentation features (which enable per-division searches and legal holds) are now available to Microsoft Office 365 customers.
  • Enhanced legal discovery export capabilities: The latest version introduces a variety of enhancements to the workflow and capabilities around export of messages to PST or EDRM file formats.
  • Availability of Content Collection option: The latest version includes support for the recently introduced Proofpoint Enterprise Archive Content Collection™ option, which extends Proofpoint's powerful eDiscovery and legal hold capabilities beyond email to a wide variety of documents. With the addition of the Content Collection option, Proofpoint Enterprise Archive provides a unified, secure and searchable legal hold repository of both files and messages.

Gartner positions Proofpoint in the Leaders Quadrant of its recently published 2012 Magic Quadrant for Enterprise Information Archiving. Read the full report, compliments of Proofpoint, at http://www.proofpoint.com/email-archiving-magic-quadrant.

About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.

Proofpoint, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Encryption, Proofpoint Secure Share, Proofpoint Enterprise Archive, Proofpoint Enterprise Governance and Digital Thread are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

MEDIA CONTACT:
Orlando DeBruce
Proofpoint, Inc.
408-338-6829
[email protected]

Lisette Paras
Ogilvy Public Relations
415-677-2771
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the abili...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they responded to were some very unique security capabilities that we have," explained Mark Figley, Director of LinuxONE Offerings at IBM, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.