More Related Content
Similar to Proofpoint Email Solutions Overview
Similar to Proofpoint Email Solutions Overview (20)
Proofpoint Email Solutions Overview
- 2. Agenda
Proofpoint Overview
Proofpoint Solution
Proofpoint Architecture
Soluções
Demo
Q&A
Proofpoint, Inc. Proprietary and Confidential ©2011 2
- 4. Proofpoint:
Cloud-Enabled Email Solutions
4000 Leading email security, compliance &
Customers archiving solutions for complex organizations
Enterprise-class protection for
lowest email risk & cost-of-ownership
Industry leadership
Leaders Quadrant, Fastest Growing Best Buy
Most Visionary Messaging Security (2009)
(2008 & 2010) (2008)
Proofpoint, Inc. Proprietary and Confidential ©2011 4
- 5. Robust Partner Ecosystem
Partnerships
SaaS Security
maximize value Resellers
to customers
Archiving
OEMs
Appliance
OEM
Strategic
Partnerships
Value Added
Resellers/Distributors
Proofpoint, Inc. Proprietary and Confidential ©2011 5
- 6. Gartner Positions Proofpoint in the Leaders Quadrant
2011 Magic Quadrant for Secure Email Gateways
Gartner positions Proofpoint
in the Leaders Quadrant
Evaluation based on
Completeness of Vision
and Ability to Execute
Magic Quadrant for Secure Email Gateways
by Peter Firstbrook and Eric Ouellet
Gartner, Inc., August 10, 2011
This Magic Quadrant graphic was published by
Gartner, Inc. as part of a larger research note and
should be evaluated in the context of the entire report.
The Gartner report is available from Proofpoint
upon request. Read the full report:
www.proofpoint.com/magicquadrant
Proofpoint, Inc. Proprietary and Confidential ©2011 6
- 8. Caso de Sucesso: Banco do Brasil
Segmento Financeiro
– 80.000 users
– 40 milhões de e-mails/ mês
Solução Anterior: McAfee
– Não suportava o volume de e-mails
– Configurações sem granularidade
– Interface sem gerenciamento centralizado
– Não há controle para usuário final
Proofpoint
– Redução de custos – número de
appliances requeridos
– Digest para usuário final
– Gerenciamento centralizado, configuração
granular e escalabilidade
Proofpoint, Inc. Proprietary and Confidential ©2011 8
- 9. Caso de Sucesso: Camed
Segmento Insurance Company
– Solução Anterior: Mcafee
Requerimentos do Cliente
– Anti-spam / anti-virus: alta acuracidade e
baixo número de falso positivo
– Escalabilidade
– Flexibilidade
Proofpoint
– Ambiente Virtual – VMWare
– Resultado imediato no POC
– Interface amigável
– Alta disponibilidade
Proofpoint, Inc. Proprietary and Confidential ©2011 9
- 10. Case de Sucesso: Camed
“Tivemos um impacto financeiro relevante,
referente ao resgate de tempo gasto com
improdutividade oriunda de e-mails indesejados e
incompativeis com o nosso negócio. O levantamento
estatístico apontou que recuperamos a média de 20
horas mensais do nosso tempo. Além desse impacto
financeiro e produtivo, aumentamos o nível de
segurança da nossa rede, a confiança dos usuários,
e reduzimos uma demanda interna de nossos
especialistas de correio e helpdesk.”
Jose Leite, Camed
Proofpoint, Inc. Proprietary and Confidential ©2011 10
- 12. Email Today:
More than Just the Mail Server
Mail Servers
Proofpoint, Inc. Proprietary and Confidential ©2011 12
- 13. Email Today:
Soaring Costs and Complexity
Content Data Loss
Anti-spam Anti-virus Filtering Prevention Encryption
Mail Server Disaster
Routing MTAs Anti-Virus Recovery Mobility (BES)
Mail Servers
Archiving eDiscovery Compliance
Proofpoint, Inc. Proprietary and Confidential ©2011 13
- 14. Email Today:
Soaring Costs and Complexity
Mail Servers $50- $100
Routing MTAs $0 - $20
Anti-spam Content Data Loss $10 - $20
Anti-spam Anti-virus Filtering Prevention Encryption
Anti-virus $2 - $4
Content Filtering $0 - $30
Data Loss Prevention $10 - $20
Encryption Mail Server $10 - $15
Disaster
Routing MTAs (BES) Anti-Virus Recovery Mobility (BES)
Mobility $5 - $10
Mail Server Anti-Virus $0 - $5
Disaster Recovery $0 - $25
Archiving Mail Servers $0 - $80
Compliance $0 - $30
eDiscovery $0 - $20
Archiving TOTAL eDiscovery $87 - $259
Compliance
Proofpoint, Inc. Proprietary and Confidential ©2011 14
- 15. Our Vision:
Cloud-based Email Suite
Mail Servers $50- $100
Routing MTAs $0 - $20
Anti-spam $10 - $20
Benefits Email Threat
Anti-virus $2 - $4
Protection
Simple Content Filtering
Content Filtering $0 - $30
Lowest TCO Data Loss
Data Loss Prevention
• 30-50% savings typical Email and $10Prevention
- $20
CompatibleEncryption
Encryption Collaboration - $15
$10
Support for regulated Secure Archiving and
Mobility (BES) $5 - $10
industries Communication eDiscovery
Mail Server Anti-Virus $0 - $ 5
All capabilities available
Disaster Recovery $0 - $25
Archiving $0 - $80
Compliance $0 - $30
eDiscovery
eDiscovery $0 - $20
TOTAL $87 - $259
Proofpoint, Inc. Proprietary and Confidential ©2011 15
- 16. Enterprise-class Cloud-enabled
Email Suite
Email Threat Data Loss
Protection Prevention
Protect the Ensure external
infrastructure requirements and
from outside threats internal policies
Email Threat are met
Protection
Email
and
Collaboration Loss
Data
Email and Prevention
Complete platform for
Collaboration
business email,
Archiving and
Secure collaboration and
calendaring eDiscovery
Communication
Secure Archiving and
Communication eDiscovery
Encrypt emails Enable search,
and send large eDiscovery, storage
attachments securely management and
compliance
Proofpoint, Inc. Proprietary and Confidential ©2011 16
- 17. Proofpoint Solutions
Consolidation of Mail Devices
AV/AS
AV/AS
DLP
Internet
Exchange Server DLP + Encryption
Encryption
Proofpoint, Inc. Proprietary and Confidential ©2011 18
- 18. Introducing Proofpoint Mobile
Suite of mobile apps for the enterprise
Enhance Productivity For Mobile Users
• Empower the employee & admin and boost productivity by providing access from
anywhere
Controlled, Secure and Compliant Access
• Empower users with controlled mobile access to Proofpoint cloud services
Compatible with the Enterprise
• Provides an organization with maximum flexibility in device deployment, supporting
key mobile platforms
Proofpoint, Inc. Proprietary and Confidential ©2011 19
- 20. Security and Compliance Platform
in the Cloud
Bringing “web scale” architecture to
the enterprise
• Designed for the largest of enterprises
• Operates at the highest levels of performance,
scalability, reliability
• Leverages cloud cost model for the lowest TCO
Real-time intelligence from
community delivers rapid response
and enhanced protection
• Delivers insights, automatically triggers action
for enhanced monitoring and security
• Real-time processing of Big Data (thousands of
data points) for rapid turnaround and action
Extensible platform
FISMA Sarbanes Oxley
• Cloud services enable rapid development of
new applications quickly to quickly meet
customer’s security and compliance needs
• New apps through Proofpoint Connect API,
which enable ecosystem of partners
• Integrates into existing private, public clouds
Proofpoint, Inc. Proprietary and Confidential ©2011 21
- 21. Benchmarking Your
Cloud-based Security
Reliability
99.999% service
availability
99% spam
Accuracy effectiveness
100% virus control
< 1 in 350,000 false
positives
Sub-minute email
Speed latency
20 second archive
search results
Proofpoint, Inc. Proprietary and Confidential ©2011 22
- 22. SaaS Architecture Advantages
Requirement Proofpoint
Resilience Multi-datacenter processing across all applications
Security Encryption of data at rest
Isolation No co-mingling of data
Integration Tied to corporate directory
Unique storage grid leveraging inexpensive storage
Cost
Multi-customer cost leverage for load processing
Delivering complete control and SaaS without compromise
Proofpoint, Inc. Proprietary and Confidential ©2011 23
- 25. Soluções
Enterprise Protection
• Resumo: Garantir a segurança do e-mail corporativo na entrada e saída.
• Uso: AS, AV, disclaimer, limite de tamanho de arquivo, exclusão de vídeo, etc.
Enterprise Privacy
• Resumo: Prevenir contra perda de informação principalmente na saída do e-mail
corporativo.
• Uso: Cartão de Crédito, CPF, Histórico médico, Informes financeiros, etc.
Enterprise Archive
• Resumo: Armazenamento, indexação e busca de e-mails de uma forma segura,
rápida e eficiente.
• Uso: Acabar com o gerenciamento de arquivos PSTs e manutenção do
crescimento das caixas de e-mail.
Secure File Transfer
• Resumo: Transferir arquivos (geralmente grandes) de forma rápida e segura.
• Uso: Transferências de imagens médicas, plantas para construção civíl, etc.
Proofpoint, Inc. Proprietary and Confidential ©2011 28
- 26. Proofpoint Product Family
Proofpoint Products Proofpoint Protection
Server Modules
Proofpoint Protection
• Proofpoint Dynamic Reputation
• Proofpoint Spam Detection
• Proofpoint Virus Protection
Proofpoint on Proofpoint Protection
• Proofpoint Zero-Hour Anti-Virus
Demand™ Server
Proofpoint Privacy
• Proofpoint Regulatory Compliance
• Proofpoint Digital Asset Security
• Proofpoint Encryption
Infrastructure & Optimization
• Proofpoint Smart Search
Proofpoint Email Proofpoint
Archiving Secure File
Transfer
Proofpoint, Inc. Proprietary and Confidential ©2011 29
- 27. Enterprise Protection
E-mail Firewall
AntiSpam
• Proofpoint Dynamic Reputation (PDR)
• Proofpoint Spam Detection
AntiVírus
• Proofpoint Virus Protection Module (F-Secure ou McAfee)
• Proofpoint Zero-hour AntiVírus Module
Recipient Verification (integração LDAP, AD, etc)
SMTP Rate Control
Proofpoint, Inc. Proprietary and Confidential ©2011 30
- 28. Enterprise Privacy
Data Loss Prevention (DLP)
• Regulatory Compliance
• Digital Asset Security (DAS)
Encriptação (Criptografia) de E-mails
• Proofpoint Encryption (PE)
Smart Send Immediate
Notification
Message
temporarily held
Proofpoint, Inc. Proprietary and Confidential ©2011 31
- 29. Regulatory Compliance
Detect structured data in your email stream
Regulatory Compliance conditions
• Dictionaries
• Smart Identifiers
• Proximity (combine dictionaries with smart identifiers)
Proofpoint, Inc. Proprietary and Confidential ©2011 32
- 30. Digital Asset Security
Goal of the Digital Asset
Security module is to stop
intellectual property from
leaving the organization Proprietary
and Confid
Features
• Identifies portions of documents
• Links to file shares, web servers,
content management systems
• Automatic time out of documents
• Business users maintain content
• Email and administrator upload Upload Email
also available
• Signature based database
File systems DBs
Proofpoint, Inc. Proprietary and Confidential ©2011 33
- 31. Proofpoint Encryption
No keys to manage
• Keys managed and secured by
Proofpoint Key Service
• All recipient interaction (encryption,
authentication, decryption) is through
customer system
Message Control
• Expire messages by policy
• Revoke keys for specific messages
• Revoke keys for specific users Proofpoint Technology
Policy-Based Encryption 11 Patents
• Ensure sensitive information is 2 Patent Applications in
encrypted Process
Proofpoint, Inc. Proprietary and Confidential ©2011 34
- 32. Enterprise Archive – Addressing eDiscovery,
Compliance, Email Management Needs
Centralize Data Enforce Policy Expedite Discovery
Regulatory compliant storage Flexible Policy Engine to Real-time search to enable
that can’t be tampered with comply with evolving quick insights
Utilizes patented DoubleBlind requirements Unique search performance
Encryption for complete Preserve data without guarantee via SLA
security/privacy dependency on end-user Improved legal & investigative
Cloud-based grid architecture Provides full audit trail to team self-service
to scale without hardware ensure process defensibility Quickly export data to PSTs
investment or EDRM XML
Proofpoint, Inc. Proprietary and Confidential ©2011 35
- 33. Archiving Must Address User Access
& Storage Management Challenges
Fast Information Access
• Provide immediate access to data – and consistently as
data volumes grow
• Reduce volume of unmanageable PST files
• On-demand litigation & investigative needs
Familiar End User Experience
• Provide intuitive tools that fit existing work habits
Management of Email As a Business Asset
• Provide enterprise-class security and privacy protection
Cost Effectively Managing Exchange Growth
• Reduce TCO and infrastructure management hassles
Proofpoint, Inc. Proprietary and Confidential ©2011 36
- 34. Enterprise Archive
Exchange journaling
records a copy of all
your email
Search results are
returned to the
appliance, decrypted Proofpoint
and presented to the DoubleBlind
end user in real time Encryption: The
Proofpoint appliance
retrieves, encrypts
and securely
transmits your data
to the Proofpoint
The Most Secure network
Archive In the When an end user
conducts a search,
Industry the search request
is encrypted
Proofpoint, Inc. Proprietary and Confidential ©2011 37
- 35. How Stubbing Works
Seamless, Native Data Access
Replaces attachment with pointer
to file in archive
Enables flexibility within email
quotas – without PST growth
Dramatically impacts Exchange
growth and performance
Proofpoint, Inc. Proprietary and Confidential ©2011 38
- 36. Significant TCO Advantage Over On-
Premises Products
Year 1 Costs 4 Year Costs
$900,000 $2,500,000
$800,000
$2,000,000
$700,000
$600,000
$1,500,000
$500,000
Software Licensing Costs Software Licensing Costs
Hardware Costs Hardware Costs
$400,000 One-time Costs One-time Costs
$1,000,000
Operational Expenses Operational Expenses
$300,000
$200,000
$500,000
$100,000
$0 $0
On-Prem SaaS On-Prem SaaS
Total Cost of Ownership (TCO) Summary by Category
Year 1 4-Year Totals
On-Prem SaaS % Savings On-Prem SaaS % Savings
Software Licensing Costs $253,200 $230,000 9% $425,927 $991,329 -133%
Hardware Costs $315,000 $31,960 90% $802,652 $63,920 92%
One-time Costs $80,000 $4,000 95% $155,000 $8,000 95%
Operational Expenses $178,750 $19,588 89% $734,538 $78,352 89%
Total Costs $826,950 $285,548 65% $2,118,116 $1,141,601 46%
Usual Implementation Time 90 days 5 days
Proofpoint, Inc. Proprietary and Confidential ©2011 39
- 37. Reduce Messaging Challenges While
Enhancing User Productivity
Challenges Key Archive Features
Users demand immediate Fast information access
access to information backed by Search SLA
Managing mailbox and Stubbing to reduce
PST growth mailbox size with familiar
user experience
Trade off: more to
manage vs. less Hybrid Architecture for
functionality performance and TCO
Security & Privacy issues DoubleBlind EncryptionTM
and secure AD integration
Proofpoint, Inc. Proprietary and Confidential ©2011 40
- 38. Proofpoint Secure File Transfer™
Ad-hoc Secure Transfer of Files
Recipient
Eases Management of File
Attachments
• Reduces email storage
Email with secure link
requirements
• Avoids blocked messages and
Attachment
stripped attachments
Enables Security and Compliance
• Provides tracking and reporting
• Eliminates use of non-secure
Email with large
attachment
workarounds like IM, P2P
Eliminates Frustrations with FTP
• Intuitive interfaces, designed with
41
end-users in mind
Proofpoint, Inc. Proprietary and Confidential ©2011
- 39. EDN Capabilities
Web app to manage email, events, contacts and user preferences
Mail Standards-based (AJAX, iCalendar, SSL/TLS, SMTP, IMAP, LDAP)
Email, folders: email rules stay synced with desktop & mobile apps.
Online “virtual USB flash drive” for storing and sending files
File Storage Seamlessly integrated with one_mail web app
Keeps email, events, contacts in sync with EAS-compatible devices
Mobile Supports iPhone, Android, BlackBerry (with Astra Sync), Windows
Mobile, and webOS
MAPI connector for Outlook 2003 and 2007, Outlook and web
Outlook Sync calendars in sync
Enables shared calendaring, group scheduling for Outlook users
Administrative backup of all users’ sent and received email
Mailbox Search for and restore messages directly back to user account
Retention
Proofpoint, Inc. Proprietary and Confidential ©2011 42
- 41. EDN Packages
Pr o 10
1 Pr o 31
0
F o r B asi c Web F o r Adv ced W
an eb
W rk s
o er W r k s o r Mi n m
o er i al
Outlo o k User s
• 1GB m lb xes
0 ai o • All f eatur es o f Pr o 10 plus:
1,
• I MAP, POP, W access
eb • Outlo o k an Mo b le sy n
d i c
• An - v r us an An - spam
ti i d ti • Mai lb x r eten o n w/ 1 m s.
o ti 2- o
• Mai lb x r eten o n w/ 7- day r eten o n
o ti ti r eten o n
ti
• On n f i le sto r age, f i le sh i n
li e ar g • On n f i le sto r age, f i le sh i n
li e ar g
( 1MB )
0 ( 5GB )
• S i lver lev suppo r t
el • Plati n lev suppo r t
um el
Proofpoint, Inc. Proprietary and Confidential ©2011 44
- 48. Recent Customer Momentum:
Email Security
John Deere (55,000 users)
• SaaS Inbound Security, Cisco competitive win
Skywest Airlines (3,200 users)
• SaaS Inbound, Postini Takeout
Pearson (100,000 users)
• SaaS Inbound, Postini Takeout
Sanofi Aventis (100,000 users)
• Ciphertrust/Trend Takeout
Apple (3,000,000+ users)
• Inbound Security for Mobile Me service
Proofpoint, Inc. Proprietary and Confidential ©2011 51
- 49. Recent Customer Momentum:
Email Security (cont’d)
Rent-A-Center (6,000 users)
• SaaS Inbound & Outbound, Postini Takeout
Lockheed Martin (100,000 users)
• Cisco competitive win
Turner Broadcasting (65,000 users)
• Cisco takeout, SNWL takeout
Proofpoint, Inc. Proprietary and Confidential ©2011 52
- 50. Recent Customer Momentum:
DLP, Encryption
Blue Cross/Blue Shield – South Carolina (6500 users)
• SaaS inbound and outbound solution
Foster Wheeler (6,500 users)
• SaaS inbound and outbound solution
PNC Bank (27,500 users)
• DLP and Encryption
TJX (5,500+ users)
• PCI Compliance and Encryption – all SaaS
Mastercard (8,000 users)
• Encryption
Proofpoint, Inc. Proprietary and Confidential ©2011 53
- 51. Recent Customer Momentum:
Archiving
Genworth Financial (10,000 users)
• Compliance-driven archiving
Glaxo Smith-Kline (58,000 users, 100 terabytes)
• Microsoft’s largest Hosted Exchange customer
Christus Health (30,000 users)
• All products, SaaS
Home Depot (10,000 users)
Royal Mail Group (30,000 users)
Weatherford (29,000 users)
AON (28,000 users)
• Started with 30TB import
Proofpoint, Inc. Proprietary and Confidential ©2011 54
- 52. Proofpoint SaaS & Hybrid Customers
Financial Retail Services Health Care Education
International Entertainment Manufacturing Technology Public Sector
Proofpoint, Inc. Proprietary and Confidential ©2011 55
- 54. Proofpoint Mobile Encryption
Finally…. Easy, seamless decryption on mobile devices!
• Decrypt Assist enables any recipient to decrypt email without apps to install
• Overlays temporary mobile pull technology on push infrastructure
Easy encryption for Blackberry users
• Plug-in enables Blackberry users to encrypt messages from device
Proofpoint Encryption
Proofpoint Connect
Appliance /
Private Cloud Infrastructure
Proofpoint Encryption
Public Cloud Infrastructure
Proofpoint, Inc. Proprietary and Confidential ©2011 57
- 55. Proofpoint Mobile Archive
Extends Proofpoint Archive to mobile users
• Infinite inbox in your pocket!
Provides seamless email search from iPhone
• Across multi-year archive (per retention policy)
• Quick deployment
Proofpoint Connect
Proofpoint Archive SaaS Proofpoint Archive
Infrastructure Appliance
Proofpoint, Inc. Proprietary and Confidential ©2011 58
- 56. Proofpoint Mobile Dashboard
Instant access to vital security information
• Security updates, such as global spam
effectiveness
• Customer’s cluster / deployment stats
Easy management of support portal
• Access to Customer Tracking System (CTS) tickets)
Designed for admins and IT personnel
Proofpoint, Inc. Proprietary and Confidential ©2011 59