SlideShare a Scribd company logo
1 of 56
Proofpoint Email Solutions




Proofpoint, Inc. Proprietary and Confidential ©2011   1
Agenda

            Proofpoint Overview
            Proofpoint Solution
            Proofpoint Architecture
            Soluções
            Demo
            Q&A




Proofpoint, Inc. Proprietary and Confidential ©2011   2
Proofpoint Overview




Proofpoint, Inc. Proprietary and Confidential ©2011    3
Proofpoint:
 Cloud-Enabled Email Solutions

     4000                                             Leading email security, compliance &
Customers                                             archiving solutions for complex organizations


                                                      Enterprise-class protection for
                                                      lowest email risk & cost-of-ownership


                                                      Industry leadership

                                                      Leaders Quadrant,    Fastest Growing     Best Buy
                                                        Most Visionary    Messaging Security    (2009)
                                                        (2008 & 2010)           (2008)




Proofpoint, Inc. Proprietary and Confidential ©2011        4
Robust Partner Ecosystem

  Partnerships
                                                                SaaS Security
 maximize value                                                 Resellers
  to customers

                                          Archiving
                                             OEMs




                                                                             Appliance
                                                                             OEM


                                 Strategic
                             Partnerships



                                                          Value Added
                                                          Resellers/Distributors


Proofpoint, Inc. Proprietary and Confidential ©2011   5
Gartner Positions Proofpoint in the Leaders Quadrant
 2011 Magic Quadrant for Secure Email Gateways


           Gartner positions Proofpoint
           in the Leaders Quadrant


           Evaluation based on
           Completeness of Vision
           and Ability to Execute

           Magic Quadrant for Secure Email Gateways
           by Peter Firstbrook and Eric Ouellet
           Gartner, Inc., August 10, 2011
           This Magic Quadrant graphic was published by
           Gartner, Inc. as part of a larger research note and
           should be evaluated in the context of the entire report.

           The Gartner report is available from Proofpoint
           upon request. Read the full report:

           www.proofpoint.com/magicquadrant



Proofpoint, Inc. Proprietary and Confidential ©2011                   6
Proofpoint: Protegendo Empresas na America
 Latina




Proofpoint, Inc. Proprietary and Confidential ©2011   7
Caso de Sucesso: Banco do Brasil

                  Segmento Financeiro
                     –    80.000 users
                     –    40 milhões de e-mails/ mês

                  Solução Anterior: McAfee
                     –    Não suportava o volume de e-mails
                     –    Configurações sem granularidade
                     –    Interface sem gerenciamento centralizado
                     –    Não há controle para usuário final

                  Proofpoint
                     –    Redução de custos – número de
                          appliances requeridos
                     –    Digest para usuário final
                     –    Gerenciamento centralizado, configuração
                          granular e escalabilidade

Proofpoint, Inc. Proprietary and Confidential ©2011            8
Caso de Sucesso: Camed

                Segmento Insurance Company
                  –     Solução Anterior: Mcafee


                Requerimentos do Cliente
                  –     Anti-spam / anti-virus: alta acuracidade e
                        baixo número de falso positivo
                  –     Escalabilidade
                  –     Flexibilidade


                Proofpoint
                  –     Ambiente Virtual – VMWare
                  –     Resultado imediato no POC
                  –     Interface amigável
                  –     Alta disponibilidade

Proofpoint, Inc. Proprietary and Confidential ©2011             9
Case de Sucesso: Camed



                                      “Tivemos um impacto financeiro relevante,
                                       referente ao resgate de tempo gasto com
                                  improdutividade oriunda de e-mails indesejados e
                                 incompativeis com o nosso negócio. O levantamento
                                 estatístico apontou que recuperamos a média de 20
                                 horas mensais do nosso tempo. Além desse impacto
                                    financeiro e produtivo, aumentamos o nível de
                                 segurança da nossa rede, a confiança dos usuários,
                                      e reduzimos uma demanda interna de nossos
                                        especialistas de correio e helpdesk.”


                                                                  Jose Leite, Camed



Proofpoint, Inc. Proprietary and Confidential ©2011   10
Proofpoint Solution




Proofpoint, Inc. Proprietary and Confidential ©2011    11
Email Today:
 More than Just the Mail Server




                                                      Mail Servers




Proofpoint, Inc. Proprietary and Confidential ©2011        12
Email Today:
 Soaring Costs and Complexity



                                                                    Content     Data Loss
                                    Anti-spam         Anti-virus    Filtering   Prevention       Encryption




                                                                                   Mail Server    Disaster
                      Routing MTAs                                                 Anti-Virus     Recovery    Mobility (BES)




                                                               Mail Servers




                   Archiving                                   eDiscovery                    Compliance
Proofpoint, Inc. Proprietary and Confidential ©2011                    13
Email Today:
 Soaring Costs and Complexity

                                Mail Servers                                                      $50- $100

                                Routing MTAs                                                       $0 - $20

                                Anti-spam                           Content     Data Loss         $10 - $20
                                  Anti-spam           Anti-virus    Filtering   Prevention       Encryption
                                Anti-virus                                                         $2 - $4

                                Content Filtering                                                  $0 - $30

                                Data Loss Prevention                                              $10 - $20

                                Encryption                                         Mail Server    $10 - $15
                                                                                                  Disaster
                      Routing MTAs (BES)                                           Anti-Virus     Recovery    Mobility (BES)
                             Mobility                                                              $5 - $10

                                Mail Server Anti-Virus                                             $0 - $5

                                Disaster Recovery                                                  $0 - $25

                                Archiving                      Mail Servers                        $0 - $80

                                Compliance                                                         $0 - $30

                                eDiscovery                                                         $0 - $20

                   Archiving       TOTAL                       eDiscovery                    $87 - $259
                                                                                               Compliance
Proofpoint, Inc. Proprietary and Confidential ©2011                    14
Our Vision:
 Cloud-based Email Suite

                                Mail Servers                                       $50- $100

                                Routing MTAs                                        $0 - $20

                                Anti-spam                                          $10 - $20
                        Benefits                                    Email Threat
                                Anti-virus                                          $2 - $4
                                                                     Protection
              Simple            Content Filtering
                                Content Filtering                                   $0 - $30
              Lowest TCO                                                             Data Loss
                                Data Loss Prevention
                • 30-50% savings typical                              Email and $10Prevention
                                                                                      - $20

              CompatibleEncryption
                        Encryption                                   Collaboration - $15
                                                                                  $10

              Support for regulated                         Secure                        Archiving and
                         Mobility (BES)                                            $5 - $10
              industries                                 Communication                      eDiscovery
                                Mail Server Anti-Virus                              $0 - $ 5
              All capabilities available
                                Disaster Recovery                                   $0 - $25

                                Archiving                                           $0 - $80

                                Compliance                                          $0 - $30

                                eDiscovery
                                eDiscovery                                          $0 - $20

                                   TOTAL                                      $87 - $259
Proofpoint, Inc. Proprietary and Confidential ©2011           15
Enterprise-class Cloud-enabled
 Email Suite
  Email Threat                                                                             Data Loss
  Protection                                                                              Prevention
  Protect the                                                                             Ensure external
  infrastructure                                                                        requirements and
  from outside threats                                                                    internal policies
                                                      Email Threat                                 are met
                                                       Protection
                                                             Email
                                                                 and
                                                          Collaboration Loss
                                                                    Data
                                                       Email and       Prevention
                                                       Complete platform for
                                                     Collaboration
                                                          business email,
                                                                        Archiving and
                                                  Secure collaboration and
                                                            calendaring eDiscovery
                                               Communication

Secure                                                                                  Archiving and
Communication                                                                             eDiscovery
Encrypt emails                                                                               Enable search,
and send large                                                                           eDiscovery, storage
attachments securely                                                                       management and
                                                                                                compliance

Proofpoint, Inc. Proprietary and Confidential ©2011              16
Proofpoint Solutions

            Consolidation of Mail Devices
                                                           AV/AS




                                                           AV/AS
                                                            DLP
                                                                              Internet


        Exchange Server                               DLP + Encryption




                                                        Encryption



Proofpoint, Inc. Proprietary and Confidential ©2011                      18
Introducing Proofpoint Mobile
 Suite of mobile apps for the enterprise

          Enhance Productivity For Mobile Users
            •     Empower the employee & admin and boost productivity by providing access from
                  anywhere

          Controlled, Secure and Compliant Access
            •     Empower users with controlled mobile access to Proofpoint cloud services

          Compatible with the Enterprise
            •     Provides an organization with maximum flexibility in device deployment, supporting
                  key mobile platforms




Proofpoint, Inc. Proprietary and Confidential ©2011   19
Proofpoint Architecture




Proofpoint, Inc. Proprietary and Confidential ©2011     20
Security and Compliance Platform
 in the Cloud

                                                                        Bringing “web scale” architecture to
                                                                        the enterprise
                                                                         • Designed for the largest of enterprises
                                                                         • Operates at the highest levels of performance,
                                                                           scalability, reliability
                                                                         • Leverages cloud cost model for the lowest TCO

                                                                        Real-time intelligence from
                                                                        community delivers rapid response
                                                                        and enhanced protection
                                                                         • Delivers insights, automatically triggers action
                                                                           for enhanced monitoring and security
                                                                         • Real-time processing of Big Data (thousands of
                                                                           data points) for rapid turnaround and action

                                                                        Extensible platform
               FISMA                                  Sarbanes Oxley
                                                                         • Cloud services enable rapid development of
                                                                           new applications quickly to quickly meet
                                                                           customer’s security and compliance needs
                                                                         • New apps through Proofpoint Connect API,
                                                                           which enable ecosystem of partners
                                                                         • Integrates into existing private, public clouds

Proofpoint, Inc. Proprietary and Confidential ©2011                21
Benchmarking Your
 Cloud-based Security

                 Reliability
                                                99.999% service
                                                 availability




                                                99% spam
                 Accuracy                        effectiveness
                                                100% virus control
                                                < 1 in 350,000 false
                                                 positives



                                                Sub-minute email
                     Speed                       latency
                                                20 second archive
                                                 search results

Proofpoint, Inc. Proprietary and Confidential ©2011                  22
SaaS Architecture Advantages


           Requirement                          Proofpoint
           Resilience                           Multi-datacenter processing across all applications

           Security                             Encryption of data at rest

           Isolation                            No co-mingling of data

           Integration                          Tied to corporate directory

                                                Unique storage grid leveraging inexpensive storage
           Cost
                                                Multi-customer cost leverage for load processing


                                           Delivering complete control and SaaS without compromise




Proofpoint, Inc. Proprietary and Confidential ©2011                  23
Enterprise-class Cloud Infrastructure

                                           Worldwide Data Center Coverage
                                            Worldwide Datacenter Coverage




Proofpoint, Inc. Proprietary and Confidential ©2011      25
Soluções




Proofpoint, Inc. Proprietary and Confidential ©2011   27
Soluções

            Enterprise Protection
               •    Resumo: Garantir a segurança do e-mail corporativo na entrada e saída.
               •    Uso: AS, AV, disclaimer, limite de tamanho de arquivo, exclusão de vídeo, etc.

            Enterprise Privacy
               •    Resumo: Prevenir contra perda de informação principalmente na saída do e-mail
                    corporativo.
               •    Uso: Cartão de Crédito, CPF, Histórico médico, Informes financeiros, etc.

            Enterprise Archive
               •    Resumo: Armazenamento, indexação e busca de e-mails de uma forma segura,
                    rápida e eficiente.
               •    Uso: Acabar com o gerenciamento de arquivos PSTs e manutenção do
                    crescimento das caixas de e-mail.

            Secure File Transfer
               •    Resumo: Transferir arquivos (geralmente grandes) de forma rápida e segura.
               •    Uso: Transferências de imagens médicas, plantas para construção civíl, etc.
Proofpoint, Inc. Proprietary and Confidential ©2011    28
Proofpoint Product Family

                       Proofpoint Products                                            Proofpoint Protection
                                                                                         Server Modules

                                                                              Proofpoint Protection
                                                                               •   Proofpoint   Dynamic Reputation
                                                                               •   Proofpoint   Spam Detection
                                                                               •   Proofpoint   Virus Protection
          Proofpoint on                          Proofpoint Protection
                                                                               •   Proofpoint   Zero-Hour Anti-Virus
            Demand™                                      Server

                                                                              Proofpoint Privacy
                                                                               •   Proofpoint Regulatory Compliance
                                                                               •   Proofpoint Digital Asset Security
                                                                               •   Proofpoint Encryption

                                                                              Infrastructure & Optimization
                                                                               •   Proofpoint Smart Search
        Proofpoint Email                                 Proofpoint
            Archiving                                    Secure File
                                                           Transfer




Proofpoint, Inc. Proprietary and Confidential ©2011                      29
Enterprise Protection

            E-mail Firewall
            AntiSpam
               • Proofpoint Dynamic Reputation (PDR)
               • Proofpoint Spam Detection

            AntiVírus
               • Proofpoint Virus Protection Module (F-Secure ou McAfee)
               • Proofpoint Zero-hour AntiVírus Module

            Recipient Verification (integração LDAP, AD, etc)
            SMTP Rate Control

Proofpoint, Inc. Proprietary and Confidential ©2011   30
Enterprise Privacy

            Data Loss Prevention (DLP)
               • Regulatory Compliance
               • Digital Asset Security (DAS)

            Encriptação (Criptografia) de E-mails
               • Proofpoint Encryption (PE)

            Smart Send                                Immediate
                                                      Notification
                                                                     Message
                                                                     temporarily held




Proofpoint, Inc. Proprietary and Confidential ©2011           31
Regulatory Compliance

            Detect structured data in your email stream


            Regulatory Compliance conditions
               • Dictionaries
               • Smart Identifiers
               • Proximity (combine dictionaries with smart identifiers)




Proofpoint, Inc. Proprietary and Confidential ©2011   32
Digital Asset Security

            Goal of the Digital Asset
            Security module is to stop
            intellectual property from
            leaving the organization                                              Proprietary
                                                                                  and Confid

            Features
               • Identifies portions of documents
               • Links to file shares, web servers,
                 content management systems
               • Automatic time out of documents
               • Business users maintain content
               • Email and administrator upload              Upload       Email
                 also available
               • Signature based database
                                                           File systems     DBs


Proofpoint, Inc. Proprietary and Confidential ©2011   33
Proofpoint Encryption

         No keys to manage
            •    Keys managed and secured by
                 Proofpoint Key Service
            •    All recipient interaction (encryption,
                 authentication, decryption) is through
                 customer system

         Message Control
            •    Expire messages by policy
            •    Revoke keys for specific messages
            •    Revoke keys for specific users                 Proofpoint Technology

         Policy-Based Encryption                               11 Patents

            •    Ensure sensitive information is               2 Patent Applications in
                 encrypted                                     Process




Proofpoint, Inc. Proprietary and Confidential ©2011       34
Enterprise Archive – Addressing eDiscovery,
 Compliance, Email Management Needs
       Centralize Data                                 Enforce Policy                Expedite Discovery




    Regulatory compliant storage                      Flexible Policy Engine to       Real-time search to enable
    that can’t be tampered with                       comply with evolving            quick insights
    Utilizes patented DoubleBlind                     requirements                    Unique search performance
    Encryption for complete                           Preserve data without           guarantee via SLA
    security/privacy                                  dependency on end-user          Improved legal & investigative
    Cloud-based grid architecture                     Provides full audit trail to    team self-service
    to scale without hardware                         ensure process defensibility    Quickly export data to PSTs
    investment                                                                        or EDRM XML

Proofpoint, Inc. Proprietary and Confidential ©2011               35
Archiving Must Address User Access
 & Storage Management Challenges
            Fast Information Access
               • Provide immediate access to data – and consistently as
                 data volumes grow
               • Reduce volume of unmanageable PST files
               • On-demand litigation & investigative needs

            Familiar End User Experience
               • Provide intuitive tools that fit existing work habits

            Management of Email As a Business Asset
               • Provide enterprise-class security and privacy protection

            Cost Effectively Managing Exchange Growth
               • Reduce TCO and infrastructure management hassles
Proofpoint, Inc. Proprietary and Confidential ©2011   36
Enterprise Archive

                            Exchange journaling
                            records a copy of all
                                 your email


            Search results are
             returned to the
           appliance, decrypted                                             Proofpoint
           and presented to the                                            DoubleBlind
           end user in real time                                         Encryption: The
                                                                      Proofpoint appliance
                                                                       retrieves, encrypts
                                                                          and securely
                                                                      transmits your data
                                                                        to the Proofpoint
      The Most Secure                                                        network

       Archive In the                                      When an end user
                                                           conducts a search,
          Industry                                         the search request
                                                              is encrypted
Proofpoint, Inc. Proprietary and Confidential ©2011   37
How Stubbing Works




                                                           Seamless, Native Data Access

                                                            Replaces attachment with pointer
                                                            to file in archive
                                                            Enables flexibility within email
                                                            quotas – without PST growth
                                                            Dramatically impacts Exchange
                                                            growth and performance
Proofpoint, Inc. Proprietary and Confidential ©2011   38
Significant TCO Advantage Over On-
 Premises Products
                                        Year 1 Costs                                                            4 Year Costs
         $900,000                                                                        $2,500,000



         $800,000


                                                                                         $2,000,000
         $700,000



         $600,000

                                                                                         $1,500,000
         $500,000
                                                         Software Licensing Costs                                              Software Licensing Costs
                                                         Hardware Costs                                                        Hardware Costs
         $400,000                                        One-time Costs                                                        One-time Costs
                                                                                         $1,000,000
                                                         Operational Expenses                                                  Operational Expenses
         $300,000



         $200,000
                                                                                          $500,000


         $100,000



              $0                                                                                $0
                        On-Prem                 SaaS                                                  On-Prem          SaaS




                       Total Cost of Ownership (TCO) Summary by Category
                                                                          Year 1                               4-Year Totals
                                                       On-Prem          SaaS          % Savings    On-Prem     SaaS            % Savings
                       Software Licensing Costs                $253,200      $230,000           9%    $425,927       $991,329     -133%
                       Hardware Costs                          $315,000       $31,960         90%     $802,652         $63,920      92%
                       One-time Costs                          $80,000         $4,000         95% $155,000              $8,000      95%
                       Operational Expenses                    $178,750       $19,588         89%     $734,538         $78,352      89%
                       Total Costs                             $826,950      $285,548         65% $2,118,116       $1,141,601       46%
                       Usual Implementation Time       90 days          5 days


Proofpoint, Inc. Proprietary and Confidential ©2011                                 39
Reduce Messaging Challenges While
 Enhancing User Productivity

                   Challenges                              Key Archive Features

   Users demand immediate                                  Fast information access
   access to information                                   backed by Search SLA

   Managing mailbox and                                    Stubbing to reduce
   PST growth                                              mailbox size with familiar
                                                           user experience
   Trade off: more to
   manage vs. less                                         Hybrid Architecture for
   functionality                                           performance and TCO

   Security & Privacy issues                               DoubleBlind EncryptionTM
                                                           and secure AD integration
Proofpoint, Inc. Proprietary and Confidential ©2011   40
Proofpoint Secure File Transfer™
 Ad-hoc Secure Transfer of Files

                                       Recipient
                                                             Eases Management of File
                                                             Attachments
                                                             • Reduces email storage
              Email with secure link




                                                                requirements
                                                             • Avoids blocked messages and
                                           Attachment




                                                                stripped attachments


                                                             Enables Security and Compliance
                                                             • Provides tracking and reporting
                                                             • Eliminates use of non-secure
                                          Email with large
                                          attachment
                                                               workarounds like IM, P2P


                                                             Eliminates Frustrations with FTP
                                                              • Intuitive interfaces, designed with
                                                             41
                                                                end-users in mind
Proofpoint, Inc. Proprietary and Confidential ©2011
EDN Capabilities

                                                Web app to manage email, events, contacts and user preferences
          Mail                                  Standards-based (AJAX, iCalendar, SSL/TLS, SMTP, IMAP, LDAP)
                                                Email, folders: email rules stay synced with desktop & mobile apps.


                                                Online “virtual USB flash drive” for storing and sending files
          File Storage                          Seamlessly integrated with one_mail web app



                                                Keeps email, events, contacts in sync with EAS-compatible devices
          Mobile                                Supports iPhone, Android, BlackBerry (with Astra Sync), Windows
                                                 Mobile, and webOS

                                                MAPI connector for Outlook 2003 and 2007, Outlook and web
          Outlook Sync                           calendars in sync
                                                Enables shared calendaring, group scheduling for Outlook users

                                                Administrative backup of all users’ sent and received email
          Mailbox                               Search for and restore messages directly back to user account
          Retention

Proofpoint, Inc. Proprietary and Confidential ©2011                  42
Multitenant SaaS Email




                         Desktop                      Web Browser   Mobile


Proofpoint, Inc. Proprietary and Confidential ©2011      43
EDN Packages

                                        Pr o 10
                                              1                                  Pr o 31
                                                                                       0


                          F o r B asi c Web                          F o r Adv ced W
                                                                              an       eb
                               W rk s
                                o er                                W r k s o r Mi n m
                                                                     o er             i al
                                                                       Outlo o k User s

                • 1GB m lb xes
                   0   ai o                                       • All f eatur es o f Pr o 10 plus:
                                                                                             1,
                • I MAP, POP, W access
                               eb                                 • Outlo o k an Mo b le sy n
                                                                               d     i      c
                • An - v r us an An - spam
                   ti i        d  ti                              • Mai lb x r eten o n w/ 1 m s.
                                                                          o       ti        2- o
                • Mai lb x r eten o n w/ 7- day r eten o n
                        o       ti                   ti           r eten o n
                                                                       ti

                • On n f i le sto r age, f i le sh i n
                     li e                         ar g            • On n f i le sto r age, f i le sh i n
                                                                      li e                          ar g
                ( 1MB )
                   0                                              ( 5GB )

                • S i lver lev suppo r t
                              el                                  • Plati n lev suppo r t
                                                                          um el




Proofpoint, Inc. Proprietary and Confidential ©2011          44
Proofpoint, Inc. Proprietary and Confidential ©2011   45
Proofpoint, Inc. Proprietary and Confidential ©2011   46
Proofpoint, Inc. Proprietary and Confidential ©2011   47
Proofpoint, Inc. Proprietary and Confidential ©2011   48
Demo




Proofpoint, Inc. Proprietary and Confidential ©2011   49
Questions?




Proofpoint, Inc. Proprietary and Confidential ©2011       50
Recent Customer Momentum:
 Email Security

                                      John Deere (55,000 users)
                                         •    SaaS Inbound Security, Cisco competitive win

                                      Skywest Airlines (3,200 users)
                                         •    SaaS Inbound, Postini Takeout

                                      Pearson (100,000 users)
                                         •    SaaS Inbound, Postini Takeout

                                      Sanofi Aventis (100,000 users)
                                         •    Ciphertrust/Trend Takeout

                                      Apple (3,000,000+ users)
                                         •    Inbound Security for Mobile Me service




Proofpoint, Inc. Proprietary and Confidential ©2011               51
Recent Customer Momentum:
 Email Security (cont’d)


                                    Rent-A-Center (6,000 users)
                                     • SaaS Inbound & Outbound, Postini Takeout
                                    Lockheed Martin (100,000 users)
                                      • Cisco competitive win
                                    Turner Broadcasting (65,000 users)
                                     • Cisco takeout, SNWL takeout




Proofpoint, Inc. Proprietary and Confidential ©2011        52
Recent Customer Momentum:
 DLP, Encryption
                                    Blue Cross/Blue Shield – South Carolina (6500 users)
                                     • SaaS inbound and outbound solution
                                    Foster Wheeler (6,500 users)
                                      • SaaS inbound and outbound solution
                                    PNC Bank (27,500 users)
                                     • DLP and Encryption
                                    TJX (5,500+ users)
                                     • PCI Compliance and Encryption – all SaaS
                                    Mastercard (8,000 users)
                                     • Encryption




Proofpoint, Inc. Proprietary and Confidential ©2011       53
Recent Customer Momentum:
 Archiving
                                    Genworth Financial (10,000 users)
                                       •    Compliance-driven archiving
                                    Glaxo Smith-Kline (58,000 users, 100 terabytes)
                                       •    Microsoft’s largest Hosted Exchange customer
                                    Christus Health (30,000 users)
                                       •    All products, SaaS
                                    Home Depot (10,000 users)


                                    Royal Mail Group (30,000 users)


                                    Weatherford (29,000 users)


                                    AON (28,000 users)
                                       •    Started with 30TB import
Proofpoint, Inc. Proprietary and Confidential ©2011              54
Proofpoint SaaS & Hybrid Customers
        Financial                             Retail    Services        Health Care     Education




    International                   Entertainment      Manufacturing   Technology     Public Sector




Proofpoint, Inc. Proprietary and Confidential ©2011        55
Appendix




Proofpoint, Inc. Proprietary and Confidential ©2011   56
Proofpoint Mobile Encryption

            Finally…. Easy, seamless decryption on mobile devices!
               • Decrypt Assist enables any recipient to decrypt email without apps to install
               • Overlays temporary mobile pull technology on push infrastructure

            Easy encryption for Blackberry users
               • Plug-in enables Blackberry users to encrypt messages from device




                     Proofpoint Encryption
                                                      Proofpoint Connect


                                 Appliance /
                 Private Cloud Infrastructure



                     Proofpoint Encryption
                   Public Cloud Infrastructure


Proofpoint, Inc. Proprietary and Confidential ©2011                        57
Proofpoint Mobile Archive

            Extends Proofpoint Archive to mobile users
               • Infinite inbox in your pocket!

            Provides seamless email search from iPhone
               • Across multi-year archive (per retention policy)
               • Quick deployment
                                                      Proofpoint Connect




             Proofpoint Archive SaaS Proofpoint Archive
                  Infrastructure             Appliance

Proofpoint, Inc. Proprietary and Confidential ©2011                        58
Proofpoint Mobile Dashboard


           Instant access to vital security information
             • Security updates, such as global spam
               effectiveness
             • Customer’s cluster / deployment stats

           Easy management of support portal
             • Access to Customer Tracking System (CTS) tickets)

           Designed for admins and IT personnel




Proofpoint, Inc. Proprietary and Confidential ©2011   59

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceTom K
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxAmrMousa51
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesSlideTeam
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 

Viewers also liked

Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Proofpoint
 
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...DataStax
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaDataStax Academy
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
行脚2012年次報告書
行脚2012年次報告書行脚2012年次報告書
行脚2012年次報告書Satoshi Kanke
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnRiccardoPelliccioli
 
Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast PresentationMichelle6518
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
E-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimizedE-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimizedLynn Feltner
 
Proofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey ResultsProofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey Resultsshapetech
 
Compliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesCompliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesLinkedIn Sales Solutions
 
Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017BLRDATA
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security TechnologyGainsight
 
Tecnoset curitiba printing services
Tecnoset curitiba   printing servicesTecnoset curitiba   printing services
Tecnoset curitiba printing servicesFernando Misato
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec
 

Viewers also liked (19)

Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social Media
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
National Reputation Management
National Reputation ManagementNational Reputation Management
National Reputation Management
 
Demoprez
DemoprezDemoprez
Demoprez
 
Magosto
MagostoMagosto
Magosto
 
行脚2012年次報告書
行脚2012年次報告書行脚2012年次報告書
行脚2012年次報告書
 
Papa noel
Papa noelPapa noel
Papa noel
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
 
Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast Presentation
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
E-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimizedE-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimized
 
Proofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey ResultsProofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey Results
 
Compliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesCompliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial Services
 
Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security Technology
 
Tecnoset curitiba printing services
Tecnoset curitiba   printing servicesTecnoset curitiba   printing services
Tecnoset curitiba printing services
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 

Similar to Proofpoint Email Solutions Overview

SMB Information Protection Portfolio
SMB Information Protection PortfolioSMB Information Protection Portfolio
SMB Information Protection PortfolioSymantec
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1truong14
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000Symantec
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1truong14
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1truong14
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0Peter de Haas
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Dropbox
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Agora Group
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
eFolder Webinar_How One Partner Wins with the eFolder AppAssure Cloud
eFolder Webinar_How One Partner Wins with the eFolder AppAssure CloudeFolder Webinar_How One Partner Wins with the eFolder AppAssure Cloud
eFolder Webinar_How One Partner Wins with the eFolder AppAssure CloudDropbox
 
2012 Windstream Overview[1]
2012 Windstream Overview[1]2012 Windstream Overview[1]
2012 Windstream Overview[1]cmatt27
 
eFolder Webinar, Continuity Cloud Demo
eFolder Webinar, Continuity Cloud DemoeFolder Webinar, Continuity Cloud Demo
eFolder Webinar, Continuity Cloud DemoDropbox
 
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?SAP Ariba
 

Similar to Proofpoint Email Solutions Overview (20)

SMB Information Protection Portfolio
SMB Information Protection PortfolioSMB Information Protection Portfolio
SMB Information Protection Portfolio
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
eFolder Webinar_How One Partner Wins with the eFolder AppAssure Cloud
eFolder Webinar_How One Partner Wins with the eFolder AppAssure CloudeFolder Webinar_How One Partner Wins with the eFolder AppAssure Cloud
eFolder Webinar_How One Partner Wins with the eFolder AppAssure Cloud
 
2012 Windstream Overview[1]
2012 Windstream Overview[1]2012 Windstream Overview[1]
2012 Windstream Overview[1]
 
eFolder Webinar, Continuity Cloud Demo
eFolder Webinar, Continuity Cloud DemoeFolder Webinar, Continuity Cloud Demo
eFolder Webinar, Continuity Cloud Demo
 
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Proofpoint Email Solutions Overview

  • 1. Proofpoint Email Solutions Proofpoint, Inc. Proprietary and Confidential ©2011 1
  • 2. Agenda Proofpoint Overview Proofpoint Solution Proofpoint Architecture Soluções Demo Q&A Proofpoint, Inc. Proprietary and Confidential ©2011 2
  • 3. Proofpoint Overview Proofpoint, Inc. Proprietary and Confidential ©2011 3
  • 4. Proofpoint: Cloud-Enabled Email Solutions 4000 Leading email security, compliance & Customers archiving solutions for complex organizations Enterprise-class protection for lowest email risk & cost-of-ownership Industry leadership Leaders Quadrant, Fastest Growing Best Buy Most Visionary Messaging Security (2009) (2008 & 2010) (2008) Proofpoint, Inc. Proprietary and Confidential ©2011 4
  • 5. Robust Partner Ecosystem Partnerships SaaS Security maximize value Resellers to customers Archiving OEMs Appliance OEM Strategic Partnerships Value Added Resellers/Distributors Proofpoint, Inc. Proprietary and Confidential ©2011 5
  • 6. Gartner Positions Proofpoint in the Leaders Quadrant 2011 Magic Quadrant for Secure Email Gateways Gartner positions Proofpoint in the Leaders Quadrant Evaluation based on Completeness of Vision and Ability to Execute Magic Quadrant for Secure Email Gateways by Peter Firstbrook and Eric Ouellet Gartner, Inc., August 10, 2011 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available from Proofpoint upon request. Read the full report: www.proofpoint.com/magicquadrant Proofpoint, Inc. Proprietary and Confidential ©2011 6
  • 7. Proofpoint: Protegendo Empresas na America Latina Proofpoint, Inc. Proprietary and Confidential ©2011 7
  • 8. Caso de Sucesso: Banco do Brasil Segmento Financeiro – 80.000 users – 40 milhões de e-mails/ mês Solução Anterior: McAfee – Não suportava o volume de e-mails – Configurações sem granularidade – Interface sem gerenciamento centralizado – Não há controle para usuário final Proofpoint – Redução de custos – número de appliances requeridos – Digest para usuário final – Gerenciamento centralizado, configuração granular e escalabilidade Proofpoint, Inc. Proprietary and Confidential ©2011 8
  • 9. Caso de Sucesso: Camed Segmento Insurance Company – Solução Anterior: Mcafee Requerimentos do Cliente – Anti-spam / anti-virus: alta acuracidade e baixo número de falso positivo – Escalabilidade – Flexibilidade Proofpoint – Ambiente Virtual – VMWare – Resultado imediato no POC – Interface amigável – Alta disponibilidade Proofpoint, Inc. Proprietary and Confidential ©2011 9
  • 10. Case de Sucesso: Camed “Tivemos um impacto financeiro relevante, referente ao resgate de tempo gasto com improdutividade oriunda de e-mails indesejados e incompativeis com o nosso negócio. O levantamento estatístico apontou que recuperamos a média de 20 horas mensais do nosso tempo. Além desse impacto financeiro e produtivo, aumentamos o nível de segurança da nossa rede, a confiança dos usuários, e reduzimos uma demanda interna de nossos especialistas de correio e helpdesk.” Jose Leite, Camed Proofpoint, Inc. Proprietary and Confidential ©2011 10
  • 11. Proofpoint Solution Proofpoint, Inc. Proprietary and Confidential ©2011 11
  • 12. Email Today: More than Just the Mail Server Mail Servers Proofpoint, Inc. Proprietary and Confidential ©2011 12
  • 13. Email Today: Soaring Costs and Complexity Content Data Loss Anti-spam Anti-virus Filtering Prevention Encryption Mail Server Disaster Routing MTAs Anti-Virus Recovery Mobility (BES) Mail Servers Archiving eDiscovery Compliance Proofpoint, Inc. Proprietary and Confidential ©2011 13
  • 14. Email Today: Soaring Costs and Complexity Mail Servers $50- $100 Routing MTAs $0 - $20 Anti-spam Content Data Loss $10 - $20 Anti-spam Anti-virus Filtering Prevention Encryption Anti-virus $2 - $4 Content Filtering $0 - $30 Data Loss Prevention $10 - $20 Encryption Mail Server $10 - $15 Disaster Routing MTAs (BES) Anti-Virus Recovery Mobility (BES) Mobility $5 - $10 Mail Server Anti-Virus $0 - $5 Disaster Recovery $0 - $25 Archiving Mail Servers $0 - $80 Compliance $0 - $30 eDiscovery $0 - $20 Archiving TOTAL eDiscovery $87 - $259 Compliance Proofpoint, Inc. Proprietary and Confidential ©2011 14
  • 15. Our Vision: Cloud-based Email Suite Mail Servers $50- $100 Routing MTAs $0 - $20 Anti-spam $10 - $20 Benefits Email Threat Anti-virus $2 - $4 Protection Simple Content Filtering Content Filtering $0 - $30 Lowest TCO Data Loss Data Loss Prevention • 30-50% savings typical Email and $10Prevention - $20 CompatibleEncryption Encryption Collaboration - $15 $10 Support for regulated Secure Archiving and Mobility (BES) $5 - $10 industries Communication eDiscovery Mail Server Anti-Virus $0 - $ 5 All capabilities available Disaster Recovery $0 - $25 Archiving $0 - $80 Compliance $0 - $30 eDiscovery eDiscovery $0 - $20 TOTAL $87 - $259 Proofpoint, Inc. Proprietary and Confidential ©2011 15
  • 16. Enterprise-class Cloud-enabled Email Suite Email Threat Data Loss Protection Prevention Protect the Ensure external infrastructure requirements and from outside threats internal policies Email Threat are met Protection Email and Collaboration Loss Data Email and Prevention Complete platform for Collaboration business email, Archiving and Secure collaboration and calendaring eDiscovery Communication Secure Archiving and Communication eDiscovery Encrypt emails Enable search, and send large eDiscovery, storage attachments securely management and compliance Proofpoint, Inc. Proprietary and Confidential ©2011 16
  • 17. Proofpoint Solutions Consolidation of Mail Devices AV/AS AV/AS DLP Internet Exchange Server DLP + Encryption Encryption Proofpoint, Inc. Proprietary and Confidential ©2011 18
  • 18. Introducing Proofpoint Mobile Suite of mobile apps for the enterprise Enhance Productivity For Mobile Users • Empower the employee & admin and boost productivity by providing access from anywhere Controlled, Secure and Compliant Access • Empower users with controlled mobile access to Proofpoint cloud services Compatible with the Enterprise • Provides an organization with maximum flexibility in device deployment, supporting key mobile platforms Proofpoint, Inc. Proprietary and Confidential ©2011 19
  • 19. Proofpoint Architecture Proofpoint, Inc. Proprietary and Confidential ©2011 20
  • 20. Security and Compliance Platform in the Cloud Bringing “web scale” architecture to the enterprise • Designed for the largest of enterprises • Operates at the highest levels of performance, scalability, reliability • Leverages cloud cost model for the lowest TCO Real-time intelligence from community delivers rapid response and enhanced protection • Delivers insights, automatically triggers action for enhanced monitoring and security • Real-time processing of Big Data (thousands of data points) for rapid turnaround and action Extensible platform FISMA Sarbanes Oxley • Cloud services enable rapid development of new applications quickly to quickly meet customer’s security and compliance needs • New apps through Proofpoint Connect API, which enable ecosystem of partners • Integrates into existing private, public clouds Proofpoint, Inc. Proprietary and Confidential ©2011 21
  • 21. Benchmarking Your Cloud-based Security Reliability  99.999% service availability  99% spam Accuracy effectiveness  100% virus control  < 1 in 350,000 false positives  Sub-minute email Speed latency  20 second archive search results Proofpoint, Inc. Proprietary and Confidential ©2011 22
  • 22. SaaS Architecture Advantages Requirement Proofpoint Resilience Multi-datacenter processing across all applications Security Encryption of data at rest Isolation No co-mingling of data Integration Tied to corporate directory Unique storage grid leveraging inexpensive storage Cost Multi-customer cost leverage for load processing Delivering complete control and SaaS without compromise Proofpoint, Inc. Proprietary and Confidential ©2011 23
  • 23. Enterprise-class Cloud Infrastructure Worldwide Data Center Coverage Worldwide Datacenter Coverage Proofpoint, Inc. Proprietary and Confidential ©2011 25
  • 24. Soluções Proofpoint, Inc. Proprietary and Confidential ©2011 27
  • 25. Soluções Enterprise Protection • Resumo: Garantir a segurança do e-mail corporativo na entrada e saída. • Uso: AS, AV, disclaimer, limite de tamanho de arquivo, exclusão de vídeo, etc. Enterprise Privacy • Resumo: Prevenir contra perda de informação principalmente na saída do e-mail corporativo. • Uso: Cartão de Crédito, CPF, Histórico médico, Informes financeiros, etc. Enterprise Archive • Resumo: Armazenamento, indexação e busca de e-mails de uma forma segura, rápida e eficiente. • Uso: Acabar com o gerenciamento de arquivos PSTs e manutenção do crescimento das caixas de e-mail. Secure File Transfer • Resumo: Transferir arquivos (geralmente grandes) de forma rápida e segura. • Uso: Transferências de imagens médicas, plantas para construção civíl, etc. Proofpoint, Inc. Proprietary and Confidential ©2011 28
  • 26. Proofpoint Product Family Proofpoint Products Proofpoint Protection Server Modules Proofpoint Protection • Proofpoint Dynamic Reputation • Proofpoint Spam Detection • Proofpoint Virus Protection Proofpoint on Proofpoint Protection • Proofpoint Zero-Hour Anti-Virus Demand™ Server Proofpoint Privacy • Proofpoint Regulatory Compliance • Proofpoint Digital Asset Security • Proofpoint Encryption Infrastructure & Optimization • Proofpoint Smart Search Proofpoint Email Proofpoint Archiving Secure File Transfer Proofpoint, Inc. Proprietary and Confidential ©2011 29
  • 27. Enterprise Protection E-mail Firewall AntiSpam • Proofpoint Dynamic Reputation (PDR) • Proofpoint Spam Detection AntiVírus • Proofpoint Virus Protection Module (F-Secure ou McAfee) • Proofpoint Zero-hour AntiVírus Module Recipient Verification (integração LDAP, AD, etc) SMTP Rate Control Proofpoint, Inc. Proprietary and Confidential ©2011 30
  • 28. Enterprise Privacy Data Loss Prevention (DLP) • Regulatory Compliance • Digital Asset Security (DAS) Encriptação (Criptografia) de E-mails • Proofpoint Encryption (PE) Smart Send Immediate Notification Message temporarily held Proofpoint, Inc. Proprietary and Confidential ©2011 31
  • 29. Regulatory Compliance Detect structured data in your email stream Regulatory Compliance conditions • Dictionaries • Smart Identifiers • Proximity (combine dictionaries with smart identifiers) Proofpoint, Inc. Proprietary and Confidential ©2011 32
  • 30. Digital Asset Security Goal of the Digital Asset Security module is to stop intellectual property from leaving the organization Proprietary and Confid Features • Identifies portions of documents • Links to file shares, web servers, content management systems • Automatic time out of documents • Business users maintain content • Email and administrator upload Upload Email also available • Signature based database File systems DBs Proofpoint, Inc. Proprietary and Confidential ©2011 33
  • 31. Proofpoint Encryption No keys to manage • Keys managed and secured by Proofpoint Key Service • All recipient interaction (encryption, authentication, decryption) is through customer system Message Control • Expire messages by policy • Revoke keys for specific messages • Revoke keys for specific users Proofpoint Technology Policy-Based Encryption 11 Patents • Ensure sensitive information is 2 Patent Applications in encrypted Process Proofpoint, Inc. Proprietary and Confidential ©2011 34
  • 32. Enterprise Archive – Addressing eDiscovery, Compliance, Email Management Needs Centralize Data Enforce Policy Expedite Discovery Regulatory compliant storage Flexible Policy Engine to Real-time search to enable that can’t be tampered with comply with evolving quick insights Utilizes patented DoubleBlind requirements Unique search performance Encryption for complete Preserve data without guarantee via SLA security/privacy dependency on end-user Improved legal & investigative Cloud-based grid architecture Provides full audit trail to team self-service to scale without hardware ensure process defensibility Quickly export data to PSTs investment or EDRM XML Proofpoint, Inc. Proprietary and Confidential ©2011 35
  • 33. Archiving Must Address User Access & Storage Management Challenges Fast Information Access • Provide immediate access to data – and consistently as data volumes grow • Reduce volume of unmanageable PST files • On-demand litigation & investigative needs Familiar End User Experience • Provide intuitive tools that fit existing work habits Management of Email As a Business Asset • Provide enterprise-class security and privacy protection Cost Effectively Managing Exchange Growth • Reduce TCO and infrastructure management hassles Proofpoint, Inc. Proprietary and Confidential ©2011 36
  • 34. Enterprise Archive Exchange journaling records a copy of all your email Search results are returned to the appliance, decrypted Proofpoint and presented to the DoubleBlind end user in real time Encryption: The Proofpoint appliance retrieves, encrypts and securely transmits your data to the Proofpoint The Most Secure network Archive In the When an end user conducts a search, Industry the search request is encrypted Proofpoint, Inc. Proprietary and Confidential ©2011 37
  • 35. How Stubbing Works Seamless, Native Data Access Replaces attachment with pointer to file in archive Enables flexibility within email quotas – without PST growth Dramatically impacts Exchange growth and performance Proofpoint, Inc. Proprietary and Confidential ©2011 38
  • 36. Significant TCO Advantage Over On- Premises Products Year 1 Costs 4 Year Costs $900,000 $2,500,000 $800,000 $2,000,000 $700,000 $600,000 $1,500,000 $500,000 Software Licensing Costs Software Licensing Costs Hardware Costs Hardware Costs $400,000 One-time Costs One-time Costs $1,000,000 Operational Expenses Operational Expenses $300,000 $200,000 $500,000 $100,000 $0 $0 On-Prem SaaS On-Prem SaaS Total Cost of Ownership (TCO) Summary by Category Year 1 4-Year Totals On-Prem SaaS % Savings On-Prem SaaS % Savings Software Licensing Costs $253,200 $230,000 9% $425,927 $991,329 -133% Hardware Costs $315,000 $31,960 90% $802,652 $63,920 92% One-time Costs $80,000 $4,000 95% $155,000 $8,000 95% Operational Expenses $178,750 $19,588 89% $734,538 $78,352 89% Total Costs $826,950 $285,548 65% $2,118,116 $1,141,601 46% Usual Implementation Time 90 days 5 days Proofpoint, Inc. Proprietary and Confidential ©2011 39
  • 37. Reduce Messaging Challenges While Enhancing User Productivity Challenges Key Archive Features Users demand immediate Fast information access access to information backed by Search SLA Managing mailbox and Stubbing to reduce PST growth mailbox size with familiar user experience Trade off: more to manage vs. less Hybrid Architecture for functionality performance and TCO Security & Privacy issues DoubleBlind EncryptionTM and secure AD integration Proofpoint, Inc. Proprietary and Confidential ©2011 40
  • 38. Proofpoint Secure File Transfer™ Ad-hoc Secure Transfer of Files Recipient Eases Management of File Attachments • Reduces email storage Email with secure link requirements • Avoids blocked messages and Attachment stripped attachments Enables Security and Compliance • Provides tracking and reporting • Eliminates use of non-secure Email with large attachment workarounds like IM, P2P Eliminates Frustrations with FTP • Intuitive interfaces, designed with 41 end-users in mind Proofpoint, Inc. Proprietary and Confidential ©2011
  • 39. EDN Capabilities  Web app to manage email, events, contacts and user preferences Mail  Standards-based (AJAX, iCalendar, SSL/TLS, SMTP, IMAP, LDAP)  Email, folders: email rules stay synced with desktop & mobile apps.  Online “virtual USB flash drive” for storing and sending files File Storage  Seamlessly integrated with one_mail web app  Keeps email, events, contacts in sync with EAS-compatible devices Mobile  Supports iPhone, Android, BlackBerry (with Astra Sync), Windows Mobile, and webOS  MAPI connector for Outlook 2003 and 2007, Outlook and web Outlook Sync calendars in sync  Enables shared calendaring, group scheduling for Outlook users  Administrative backup of all users’ sent and received email Mailbox  Search for and restore messages directly back to user account Retention Proofpoint, Inc. Proprietary and Confidential ©2011 42
  • 40. Multitenant SaaS Email Desktop Web Browser Mobile Proofpoint, Inc. Proprietary and Confidential ©2011 43
  • 41. EDN Packages Pr o 10 1 Pr o 31 0 F o r B asi c Web F o r Adv ced W an eb W rk s o er W r k s o r Mi n m o er i al Outlo o k User s • 1GB m lb xes 0 ai o • All f eatur es o f Pr o 10 plus: 1, • I MAP, POP, W access eb • Outlo o k an Mo b le sy n d i c • An - v r us an An - spam ti i d ti • Mai lb x r eten o n w/ 1 m s. o ti 2- o • Mai lb x r eten o n w/ 7- day r eten o n o ti ti r eten o n ti • On n f i le sto r age, f i le sh i n li e ar g • On n f i le sto r age, f i le sh i n li e ar g ( 1MB ) 0 ( 5GB ) • S i lver lev suppo r t el • Plati n lev suppo r t um el Proofpoint, Inc. Proprietary and Confidential ©2011 44
  • 42. Proofpoint, Inc. Proprietary and Confidential ©2011 45
  • 43. Proofpoint, Inc. Proprietary and Confidential ©2011 46
  • 44. Proofpoint, Inc. Proprietary and Confidential ©2011 47
  • 45. Proofpoint, Inc. Proprietary and Confidential ©2011 48
  • 46. Demo Proofpoint, Inc. Proprietary and Confidential ©2011 49
  • 47. Questions? Proofpoint, Inc. Proprietary and Confidential ©2011 50
  • 48. Recent Customer Momentum: Email Security John Deere (55,000 users) • SaaS Inbound Security, Cisco competitive win Skywest Airlines (3,200 users) • SaaS Inbound, Postini Takeout Pearson (100,000 users) • SaaS Inbound, Postini Takeout Sanofi Aventis (100,000 users) • Ciphertrust/Trend Takeout Apple (3,000,000+ users) • Inbound Security for Mobile Me service Proofpoint, Inc. Proprietary and Confidential ©2011 51
  • 49. Recent Customer Momentum: Email Security (cont’d) Rent-A-Center (6,000 users) • SaaS Inbound & Outbound, Postini Takeout Lockheed Martin (100,000 users) • Cisco competitive win Turner Broadcasting (65,000 users) • Cisco takeout, SNWL takeout Proofpoint, Inc. Proprietary and Confidential ©2011 52
  • 50. Recent Customer Momentum: DLP, Encryption Blue Cross/Blue Shield – South Carolina (6500 users) • SaaS inbound and outbound solution Foster Wheeler (6,500 users) • SaaS inbound and outbound solution PNC Bank (27,500 users) • DLP and Encryption TJX (5,500+ users) • PCI Compliance and Encryption – all SaaS Mastercard (8,000 users) • Encryption Proofpoint, Inc. Proprietary and Confidential ©2011 53
  • 51. Recent Customer Momentum: Archiving Genworth Financial (10,000 users) • Compliance-driven archiving Glaxo Smith-Kline (58,000 users, 100 terabytes) • Microsoft’s largest Hosted Exchange customer Christus Health (30,000 users) • All products, SaaS Home Depot (10,000 users) Royal Mail Group (30,000 users) Weatherford (29,000 users) AON (28,000 users) • Started with 30TB import Proofpoint, Inc. Proprietary and Confidential ©2011 54
  • 52. Proofpoint SaaS & Hybrid Customers Financial Retail Services Health Care Education International Entertainment Manufacturing Technology Public Sector Proofpoint, Inc. Proprietary and Confidential ©2011 55
  • 53. Appendix Proofpoint, Inc. Proprietary and Confidential ©2011 56
  • 54. Proofpoint Mobile Encryption Finally…. Easy, seamless decryption on mobile devices! • Decrypt Assist enables any recipient to decrypt email without apps to install • Overlays temporary mobile pull technology on push infrastructure Easy encryption for Blackberry users • Plug-in enables Blackberry users to encrypt messages from device Proofpoint Encryption Proofpoint Connect Appliance / Private Cloud Infrastructure Proofpoint Encryption Public Cloud Infrastructure Proofpoint, Inc. Proprietary and Confidential ©2011 57
  • 55. Proofpoint Mobile Archive Extends Proofpoint Archive to mobile users • Infinite inbox in your pocket! Provides seamless email search from iPhone • Across multi-year archive (per retention policy) • Quick deployment Proofpoint Connect Proofpoint Archive SaaS Proofpoint Archive Infrastructure Appliance Proofpoint, Inc. Proprietary and Confidential ©2011 58
  • 56. Proofpoint Mobile Dashboard Instant access to vital security information • Security updates, such as global spam effectiveness • Customer’s cluster / deployment stats Easy management of support portal • Access to Customer Tracking System (CTS) tickets) Designed for admins and IT personnel Proofpoint, Inc. Proprietary and Confidential ©2011 59