Click here to close now.

Welcome!

AJAX & REA Authors: Pat Romanski, Liz McMillan, XebiaLabs Blog, AppDynamics Blog, Elizabeth White

News Feed Item

Proofpoint Announces Winter 2013 Update to Its Cloud-Based Security and Compliance Solutions

Highlights Include New Proofpoint Secure Share(TM) Cloud-Based File Transfer Solution

SUNNYVALE, CA -- (Marketwire) -- 01/23/13 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider, today announced its Winter 2013 release which delivers significant enhancements to the Proofpoint Enterprise™ suite of cloud-based threat management, regulatory compliance, information governance and secure communication solutions. Among the features and enhancements in the Proofpoint Winter 2013 release is a new cloud-based solution for secure, compliant file transfer, Proofpoint Secure Share™.

"Rapid innovation enabled by the cloud is one of the primary drivers of strong adoption of the Proofpoint information security and governance suite," said David Knight, executive vice president of products for Proofpoint. "Our Winter 2013 release continues this innovation with the introduction of Proofpoint Secure Share, the third significant new module introduced to the Proofpoint Enterprise suite in the past three quarters."

Introducing Proofpoint Secure Share™
Proofpoint Secure Share™ is a cloud-based, managed file transfer solution that makes it easy for end users to exchange large files securely -- and in compliance with enterprise policies such as data loss prevention rules -- without impacting the organization's email systems or other IT infrastructure. Proofpoint Secure Share™ is designed to simplify the process of exchanging large or sensitive files while also meeting the strict security and compliance requirements of today's enterprise. Benefits include:

  • Highly-secure file sharing experience: Proofpoint Secure Share™ incorporates enterprise-grade security controls including sender/recipient authentication, encryption, malware detection and data management capabilities.
  • Simple enforcement of file sharing policies, including data loss prevention: Proofpoint Secure Share™ allows administrators to easily customize and enforce a wide variety of file transfer policies for data retention and file management. Integrated data loss prevention (DLP) capabilities enable Proofpoint Secure Share™ to detect private, sensitive or confidential information in transferred files and help minimize data exposure risks.
  • End-user ease of use: Proofpoint Secure Share™ allows users to exchange files using a convenient web-based interface or right from their Microsoft Outlook inboxes. Proofpoint Secure Share's™ seamless user experience increases end-user adoption, simplifies file transfer workflows and reduces the risks associated with employees using unsanctioned file sharing alternatives.

Proofpoint Secure Share™ provides enhanced security and administrative control over traditional file transfer methods, existing on-premises solutions, and public cloud file sharing services. Proofpoint Secure Share™ leverages the enterprise-class data loss prevention features of Proofpoint Enterprise Privacy™ suite to automatically enforce DLP rules such as blocking or encrypting sensitive content. Recipient authentication features protect confidential information and help ensure that only valid, verified recipients can receive sensitive files.

Each Proofpoint Secure Share file link is assigned a limited lifespan with an administrator-configurable expiration time. Flexible DLP options enable blocking and/or quarantining of files that violate enterprise policies, end-user notification and reporting features. Return receipts let end users confirm that their files were delivered, while an audit trail is maintained to provide file access tracking and reporting features. File recipients can easily respond and share large files with original senders via Secure Share's web-based user interface which also maintains an audit history of file sharing actions.

For an overview of the capabilities of Proofpoint Secure Share, see this brief video demonstration: http://www.proofpoint.com/secure-share-demo. In February, Proofpoint will host a webinar featuring Proofpoint Secure Share™: http://www.proofpoint.com/id/webinar-q113-privacy/index.php?id=7.

Proofpoint Enterprise Protection, Targeted Attack Protection and Privacy Enhancements
The Proofpoint Winter 2013 release includes updates to Proofpoint's threat management and regulatory compliance capabilities. The Proofpoint Enterprise Protection™ email security solution incorporates enhancements including:

  • Enhanced custom threat and spam definitions and classification rules: The latest version of Proofpoint Enterprise Protection gives administrators more control over threat classifications including phish, bulk mail, and adult content messages, enabling more granular handling of particular message types and improving overall effectiveness.
  • The administrative interface for Proofpoint Enterprise Protection and Privacy is now available in English, Japanese, German and French versions, configurable on a per-administrator basis.
  • Access to various components of the Proofpoint Enterprise administrative interface is now more granular, giving Proofpoint's, large multi-national customers precise control over the rights and permissions granted to individual administrators.

In addition, the Proofpoint Targeted Attack Protection™ solution -- which uses big data analytics and other advanced technologies to provide reliable protection against spear phishing and other malicious, targeted attacks -- continues to be enhanced with new threat detection techniques and advanced malware sandboxing features.

The latest version of Proofpoint Enterprise Privacy™, which provides data loss prevention and policy-based email encryption capabilities, allows even more flexibility in creating customized DLP policies. The solution now includes more than 20 pre-defined lexicons and 35 "smart identifiers" (including a wide variety of international identifiers) to detect personal information, financial information and protected health information and address customer needs to comply with complex, global data protection regulations. Other updates include enhanced control over end-user enrollment for Proofpoint Encryption™ and new customization options for the Proofpoint Secure Reader web-based encryption interface.

Archiving and Information Governance Enhancements
The Proofpoint Enterprise Archive™ cloud archiving solution has been enhanced with a variety of administrative and end-user features including:

  • New user interface localizations: The interface for Proofpoint Enterprise Archive now allows end users to select their preferred language from more than a dozen options including Chinese (Simplified or Traditional), Czech, English, French, German, Italian, Japanese, Polish, Russian, Spanish, Thai and Turkish.
  • Delegated administration and discovery segmentation enhancements: Large organizations that use Proofpoint Enterprise Archive across a number of different business units, agencies or divisions can now limit administrator access to only those mailboxes within an administrator's scope of responsibility. This allows multi-division organizations to delegate mailbox administration to local IT staff while constraining those staff members to manage only those mailboxes within their division. Proofpoint Enterprise Archive's discovery segmentation features (which enable per-division searches and legal holds) are now available to Microsoft Office 365 customers.
  • Enhanced legal discovery export capabilities: The latest version introduces a variety of enhancements to the workflow and capabilities around export of messages to PST or EDRM file formats.
  • Availability of Content Collection option: The latest version includes support for the recently introduced Proofpoint Enterprise Archive Content Collection™ option, which extends Proofpoint's powerful eDiscovery and legal hold capabilities beyond email to a wide variety of documents. With the addition of the Content Collection option, Proofpoint Enterprise Archive provides a unified, secure and searchable legal hold repository of both files and messages.

Gartner positions Proofpoint in the Leaders Quadrant of its recently published 2012 Magic Quadrant for Enterprise Information Archiving. Read the full report, compliments of Proofpoint, at http://www.proofpoint.com/email-archiving-magic-quadrant.

About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.

Proofpoint, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Encryption, Proofpoint Secure Share, Proofpoint Enterprise Archive, Proofpoint Enterprise Governance and Digital Thread are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, discussed how a user-centric Application Performance Management solution can help inspire your users with every applicati...
The consumption economy is here and so are cloud applications and solutions that offer more than subscription and flat fee models and at the same time are available on a pure consumption model, which not only reduces IT spend but also lowers infrastructure costs, and offers ease of use and availability. In their session at 15th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed this shifting dynamic with an ...
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackI...
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT transformation?
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises ...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
Over the years, a variety of methodologies have emerged in order to overcome the challenges related to project constraints. The successful use of each methodology seems highly context-dependent. However, communication seems to be the common denominator of the many challenges that project management methodologies intend to resolve. In this respect, Information and Communication Technologies (ICTs) can be viewed as powerful tools for managing projects. Few research papers have focused on the way...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...