|By Marketwired .||
|January 23, 2013 08:00 AM EST||
SUNNYVALE, CA -- (Marketwire) -- 01/23/13 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider, today announced its Winter 2013 release which delivers significant enhancements to the Proofpoint Enterprise suite of cloud-based threat management, regulatory compliance, information governance and secure communication solutions. Among the features and enhancements in the Proofpoint Winter 2013 release is a new cloud-based solution for secure, compliant file transfer, Proofpoint Secure Share.
"Rapid innovation enabled by the cloud is one of the primary drivers of strong adoption of the Proofpoint information security and governance suite," said David Knight, executive vice president of products for Proofpoint. "Our Winter 2013 release continues this innovation with the introduction of Proofpoint Secure Share, the third significant new module introduced to the Proofpoint Enterprise suite in the past three quarters."
Introducing Proofpoint Secure Share
Proofpoint Secure Share is a cloud-based, managed file transfer solution that makes it easy for end users to exchange large files securely -- and in compliance with enterprise policies such as data loss prevention rules -- without impacting the organization's email systems or other IT infrastructure. Proofpoint Secure Share is designed to simplify the process of exchanging large or sensitive files while also meeting the strict security and compliance requirements of today's enterprise. Benefits include:
- Highly-secure file sharing experience: Proofpoint Secure Share incorporates enterprise-grade security controls including sender/recipient authentication, encryption, malware detection and data management capabilities.
- Simple enforcement of file sharing policies, including data loss prevention: Proofpoint Secure Share allows administrators to easily customize and enforce a wide variety of file transfer policies for data retention and file management. Integrated data loss prevention (DLP) capabilities enable Proofpoint Secure Share to detect private, sensitive or confidential information in transferred files and help minimize data exposure risks.
- End-user ease of use: Proofpoint Secure Share allows users to exchange files using a convenient web-based interface or right from their Microsoft Outlook inboxes. Proofpoint Secure Share's seamless user experience increases end-user adoption, simplifies file transfer workflows and reduces the risks associated with employees using unsanctioned file sharing alternatives.
Proofpoint Secure Share provides enhanced security and administrative control over traditional file transfer methods, existing on-premises solutions, and public cloud file sharing services. Proofpoint Secure Share leverages the enterprise-class data loss prevention features of Proofpoint Enterprise Privacy suite to automatically enforce DLP rules such as blocking or encrypting sensitive content. Recipient authentication features protect confidential information and help ensure that only valid, verified recipients can receive sensitive files.
Each Proofpoint Secure Share file link is assigned a limited lifespan with an administrator-configurable expiration time. Flexible DLP options enable blocking and/or quarantining of files that violate enterprise policies, end-user notification and reporting features. Return receipts let end users confirm that their files were delivered, while an audit trail is maintained to provide file access tracking and reporting features. File recipients can easily respond and share large files with original senders via Secure Share's web-based user interface which also maintains an audit history of file sharing actions.
For an overview of the capabilities of Proofpoint Secure Share, see this brief video demonstration: http://www.proofpoint.com/secure-share-demo. In February, Proofpoint will host a webinar featuring Proofpoint Secure Share: http://www.proofpoint.com/id/webinar-q113-privacy/index.php?id=7.
Proofpoint Enterprise Protection, Targeted Attack Protection and Privacy Enhancements
The Proofpoint Winter 2013 release includes updates to Proofpoint's threat management and regulatory compliance capabilities. The Proofpoint Enterprise Protection email security solution incorporates enhancements including:
- Enhanced custom threat and spam definitions and classification rules: The latest version of Proofpoint Enterprise Protection gives administrators more control over threat classifications including phish, bulk mail, and adult content messages, enabling more granular handling of particular message types and improving overall effectiveness.
- The administrative interface for Proofpoint Enterprise Protection and Privacy is now available in English, Japanese, German and French versions, configurable on a per-administrator basis.
- Access to various components of the Proofpoint Enterprise administrative interface is now more granular, giving Proofpoint's, large multi-national customers precise control over the rights and permissions granted to individual administrators.
In addition, the Proofpoint Targeted Attack Protection solution -- which uses big data analytics and other advanced technologies to provide reliable protection against spear phishing and other malicious, targeted attacks -- continues to be enhanced with new threat detection techniques and advanced malware sandboxing features.
The latest version of Proofpoint Enterprise Privacy, which provides data loss prevention and policy-based email encryption capabilities, allows even more flexibility in creating customized DLP policies. The solution now includes more than 20 pre-defined lexicons and 35 "smart identifiers" (including a wide variety of international identifiers) to detect personal information, financial information and protected health information and address customer needs to comply with complex, global data protection regulations. Other updates include enhanced control over end-user enrollment for Proofpoint Encryption and new customization options for the Proofpoint Secure Reader web-based encryption interface.
Archiving and Information Governance Enhancements
The Proofpoint Enterprise Archive cloud archiving solution has been enhanced with a variety of administrative and end-user features including:
- New user interface localizations: The interface for Proofpoint Enterprise Archive now allows end users to select their preferred language from more than a dozen options including Chinese (Simplified or Traditional), Czech, English, French, German, Italian, Japanese, Polish, Russian, Spanish, Thai and Turkish.
- Delegated administration and discovery segmentation enhancements: Large organizations that use Proofpoint Enterprise Archive across a number of different business units, agencies or divisions can now limit administrator access to only those mailboxes within an administrator's scope of responsibility. This allows multi-division organizations to delegate mailbox administration to local IT staff while constraining those staff members to manage only those mailboxes within their division. Proofpoint Enterprise Archive's discovery segmentation features (which enable per-division searches and legal holds) are now available to Microsoft Office 365 customers.
- Enhanced legal discovery export capabilities: The latest version introduces a variety of enhancements to the workflow and capabilities around export of messages to PST or EDRM file formats.
- Availability of Content Collection option: The latest version includes support for the recently introduced Proofpoint Enterprise Archive Content Collection option, which extends Proofpoint's powerful eDiscovery and legal hold capabilities beyond email to a wide variety of documents. With the addition of the Content Collection option, Proofpoint Enterprise Archive provides a unified, secure and searchable legal hold repository of both files and messages.
Gartner positions Proofpoint in the Leaders Quadrant of its recently published 2012 Magic Quadrant for Enterprise Information Archiving. Read the full report, compliments of Proofpoint, at http://www.proofpoint.com/email-archiving-magic-quadrant.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Encryption, Proofpoint Secure Share, Proofpoint Enterprise Archive, Proofpoint Enterprise Governance and Digital Thread are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 06:30 AM EST Reads: 1,111
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Dec. 8, 2016 06:15 AM EST Reads: 5,909
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 8, 2016 05:00 AM EST Reads: 2,159
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Dec. 8, 2016 04:30 AM EST Reads: 730
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:15 AM EST Reads: 946
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Dec. 8, 2016 04:00 AM EST Reads: 3,797
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 8, 2016 04:00 AM EST Reads: 4,814
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:00 AM EST Reads: 1,045
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 8, 2016 02:45 AM EST Reads: 1,298
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 02:30 AM EST Reads: 1,120
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Dec. 8, 2016 01:45 AM EST Reads: 1,409
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 8, 2016 01:30 AM EST Reads: 1,925
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 8, 2016 01:00 AM EST Reads: 3,957
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 8, 2016 12:15 AM EST Reads: 1,360
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 7, 2016 10:30 PM EST Reads: 884
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 10:00 PM EST Reads: 1,196
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Dec. 7, 2016 09:15 PM EST Reads: 410
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 7, 2016 08:45 PM EST Reads: 1,640
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 7, 2016 08:15 PM EST Reads: 2,230
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Dec. 7, 2016 07:15 PM EST Reads: 1,817