|By Marketwired .||
|January 23, 2013 08:00 AM EST||
SUNNYVALE, CA -- (Marketwire) -- 01/23/13 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider, today announced its Winter 2013 release which delivers significant enhancements to the Proofpoint Enterprise suite of cloud-based threat management, regulatory compliance, information governance and secure communication solutions. Among the features and enhancements in the Proofpoint Winter 2013 release is a new cloud-based solution for secure, compliant file transfer, Proofpoint Secure Share.
"Rapid innovation enabled by the cloud is one of the primary drivers of strong adoption of the Proofpoint information security and governance suite," said David Knight, executive vice president of products for Proofpoint. "Our Winter 2013 release continues this innovation with the introduction of Proofpoint Secure Share, the third significant new module introduced to the Proofpoint Enterprise suite in the past three quarters."
Introducing Proofpoint Secure Share
Proofpoint Secure Share is a cloud-based, managed file transfer solution that makes it easy for end users to exchange large files securely -- and in compliance with enterprise policies such as data loss prevention rules -- without impacting the organization's email systems or other IT infrastructure. Proofpoint Secure Share is designed to simplify the process of exchanging large or sensitive files while also meeting the strict security and compliance requirements of today's enterprise. Benefits include:
- Highly-secure file sharing experience: Proofpoint Secure Share incorporates enterprise-grade security controls including sender/recipient authentication, encryption, malware detection and data management capabilities.
- Simple enforcement of file sharing policies, including data loss prevention: Proofpoint Secure Share allows administrators to easily customize and enforce a wide variety of file transfer policies for data retention and file management. Integrated data loss prevention (DLP) capabilities enable Proofpoint Secure Share to detect private, sensitive or confidential information in transferred files and help minimize data exposure risks.
- End-user ease of use: Proofpoint Secure Share allows users to exchange files using a convenient web-based interface or right from their Microsoft Outlook inboxes. Proofpoint Secure Share's seamless user experience increases end-user adoption, simplifies file transfer workflows and reduces the risks associated with employees using unsanctioned file sharing alternatives.
Proofpoint Secure Share provides enhanced security and administrative control over traditional file transfer methods, existing on-premises solutions, and public cloud file sharing services. Proofpoint Secure Share leverages the enterprise-class data loss prevention features of Proofpoint Enterprise Privacy suite to automatically enforce DLP rules such as blocking or encrypting sensitive content. Recipient authentication features protect confidential information and help ensure that only valid, verified recipients can receive sensitive files.
Each Proofpoint Secure Share file link is assigned a limited lifespan with an administrator-configurable expiration time. Flexible DLP options enable blocking and/or quarantining of files that violate enterprise policies, end-user notification and reporting features. Return receipts let end users confirm that their files were delivered, while an audit trail is maintained to provide file access tracking and reporting features. File recipients can easily respond and share large files with original senders via Secure Share's web-based user interface which also maintains an audit history of file sharing actions.
For an overview of the capabilities of Proofpoint Secure Share, see this brief video demonstration: http://www.proofpoint.com/secure-share-demo. In February, Proofpoint will host a webinar featuring Proofpoint Secure Share: http://www.proofpoint.com/id/webinar-q113-privacy/index.php?id=7.
Proofpoint Enterprise Protection, Targeted Attack Protection and Privacy Enhancements
The Proofpoint Winter 2013 release includes updates to Proofpoint's threat management and regulatory compliance capabilities. The Proofpoint Enterprise Protection email security solution incorporates enhancements including:
- Enhanced custom threat and spam definitions and classification rules: The latest version of Proofpoint Enterprise Protection gives administrators more control over threat classifications including phish, bulk mail, and adult content messages, enabling more granular handling of particular message types and improving overall effectiveness.
- The administrative interface for Proofpoint Enterprise Protection and Privacy is now available in English, Japanese, German and French versions, configurable on a per-administrator basis.
- Access to various components of the Proofpoint Enterprise administrative interface is now more granular, giving Proofpoint's, large multi-national customers precise control over the rights and permissions granted to individual administrators.
In addition, the Proofpoint Targeted Attack Protection solution -- which uses big data analytics and other advanced technologies to provide reliable protection against spear phishing and other malicious, targeted attacks -- continues to be enhanced with new threat detection techniques and advanced malware sandboxing features.
The latest version of Proofpoint Enterprise Privacy, which provides data loss prevention and policy-based email encryption capabilities, allows even more flexibility in creating customized DLP policies. The solution now includes more than 20 pre-defined lexicons and 35 "smart identifiers" (including a wide variety of international identifiers) to detect personal information, financial information and protected health information and address customer needs to comply with complex, global data protection regulations. Other updates include enhanced control over end-user enrollment for Proofpoint Encryption and new customization options for the Proofpoint Secure Reader web-based encryption interface.
Archiving and Information Governance Enhancements
The Proofpoint Enterprise Archive cloud archiving solution has been enhanced with a variety of administrative and end-user features including:
- New user interface localizations: The interface for Proofpoint Enterprise Archive now allows end users to select their preferred language from more than a dozen options including Chinese (Simplified or Traditional), Czech, English, French, German, Italian, Japanese, Polish, Russian, Spanish, Thai and Turkish.
- Delegated administration and discovery segmentation enhancements: Large organizations that use Proofpoint Enterprise Archive across a number of different business units, agencies or divisions can now limit administrator access to only those mailboxes within an administrator's scope of responsibility. This allows multi-division organizations to delegate mailbox administration to local IT staff while constraining those staff members to manage only those mailboxes within their division. Proofpoint Enterprise Archive's discovery segmentation features (which enable per-division searches and legal holds) are now available to Microsoft Office 365 customers.
- Enhanced legal discovery export capabilities: The latest version introduces a variety of enhancements to the workflow and capabilities around export of messages to PST or EDRM file formats.
- Availability of Content Collection option: The latest version includes support for the recently introduced Proofpoint Enterprise Archive Content Collection option, which extends Proofpoint's powerful eDiscovery and legal hold capabilities beyond email to a wide variety of documents. With the addition of the Content Collection option, Proofpoint Enterprise Archive provides a unified, secure and searchable legal hold repository of both files and messages.
Gartner positions Proofpoint in the Leaders Quadrant of its recently published 2012 Magic Quadrant for Enterprise Information Archiving. Read the full report, compliments of Proofpoint, at http://www.proofpoint.com/email-archiving-magic-quadrant.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Encryption, Proofpoint Secure Share, Proofpoint Enterprise Archive, Proofpoint Enterprise Governance and Digital Thread are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Dec. 28, 2014 02:00 PM EST Reads: 2,895
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Dec. 28, 2014 12:00 PM EST Reads: 2,868
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Dec. 28, 2014 12:00 PM EST Reads: 3,689
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Dec. 28, 2014 11:00 AM EST Reads: 3,371
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
Dec. 28, 2014 11:00 AM EST Reads: 3,411
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
Dec. 28, 2014 11:00 AM EST Reads: 3,522
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 28, 2014 11:00 AM EST Reads: 2,757
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Dec. 28, 2014 11:00 AM EST Reads: 3,119
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
Dec. 28, 2014 10:00 AM EST Reads: 3,429
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
Dec. 28, 2014 10:00 AM EST Reads: 3,075
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Dec. 28, 2014 09:45 AM EST Reads: 2,750
SYS-CON Events announced today that Cloudian, Inc., the leading provider of hybrid cloud storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Cloudian, Inc., is a Foster City, California - based software company specializing in cloud storage software. The main product is Cloudian, an Amazon S3-compliant cloud object storage platform, the bedrock of cloud computing systems, that enables c...
Dec. 28, 2014 09:00 AM EST Reads: 2,212
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionalit...
Dec. 28, 2014 08:30 AM EST Reads: 3,430
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Dec. 28, 2014 08:30 AM EST Reads: 3,666
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Dec. 28, 2014 08:00 AM EST Reads: 3,809
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
Dec. 28, 2014 05:45 AM EST Reads: 3,223
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Dec. 28, 2014 05:30 AM EST Reads: 3,084
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 28, 2014 05:30 AM EST Reads: 2,821
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Dec. 28, 2014 04:00 AM EST Reads: 3,614
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
Dec. 28, 2014 03:45 AM EST Reads: 4,198