|By Marketwired .||
|July 16, 2014 07:30 AM EDT||
SUNNYVALE, CA -- (Marketwired) -- 07/16/14 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider and Microsoft Gold Independent Software Vendor, today announced the availability of the Proofpoint Security and Compliance Suite for Office 365. The new Proofpoint cloud-based suite provides essential advanced threat protection, global regulatory compliance and comprehensive eDiscovery capabilities for organizations migrating to Microsoft® Office 365.
"Enterprises moving to Microsoft Office 365 need to adequately protect themselves with third-party advanced threat protection and compliance capabilities," said Michael Osterman, Principal Analyst with Osterman Research. "Proofpoint has a proven track record of stopping advanced attacks and meeting complex global regulations. Using the same third-party vendor for threat protection and compliance measures really makes sense."
As attackers launch more sophisticated campaigns, and regulations and litigation multiply, enterprise risk exposure is increasing rapidly. The Proofpoint Security and Compliance Suite for Office 365 is designed to reduce risk across three crucial areas of exposure:
- Advanced Threat Protection: Proofpoint Enterprise Protection and Proofpoint Targeted Attack Protection complement Microsoft Office 365 email security measures by protecting high value data from targeted spear-phishing attacks and zero-day malware. Proofpoint employs a range of advanced threat detection technology, including dynamic malware analysis and big-data analytics, to defeat advanced threats and targeted attacks that bypass traditional anti-spam solutions.
- Global Compliance: Proofpoint Enterprise Privacy provides global regulatory compliance functionality that automatically and accurately identifies a wide range of sensitive data including credit card numbers, government IDs and health care records. This allows administrators to easily secure communications and comply with compliance regulations including HIPAA, GLBA and PCI based on a central policy. Proofpoint also extends the capability of Microsoft Office 365 to meet rigorous enterprise-class data retention regulations, including those specified by the U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA).
- Comprehensive eDiscovery: Proofpoint Enterprise Archive enhances legal discovery with rapid search insight, legal hold capabilities and granular retention policies. Enterprises have the flexibility to segregate legal holds by both group and geography, and can prevent end users from deleting sensitive data. Proofpoint eDiscovery also covers social network content and non-Microsoft document types.
"Advanced phishing attacks and continued data loss have made email the number one threat vector and compliance concern facing most enterprises," said David Knight, EVP and general manager for information security products at Proofpoint. "The new Proofpoint Security and Compliance Suite for Microsoft Office 365 provides the additional layer of advanced threat protection and compliance functionality that enterprises running on Office 365 need to stop phishing attacks and comply with global regulations. This enables organizations of all sizes to take full advantage of the benefits of Office 365 without sacrificing security or compliance."
This week, Microsoft Partner Conference attendees can visit Proofpoint booth #632 for details on the new Proofpoint suite. For additional information on the Proofpoint Security and Compliance Suite for Office 365, please visit www.proofpoint.com/O365.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint, Proofpoint Security and Compliance Suite, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive, Proofpoint Targeted Attack Protection are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and/or other countries. Microsoft and Office 365 are registered trademarks of Microsoft Corp. All other trademarks contained herein are the property of their respective owners.
Samsung VP Jacopo Lenzi, who headed the company's recent SmartThings acquisition under the auspices of Samsung's Open Innovaction Center (OIC), answered a few questions we had about the deal. This interview was in conjunction with our interview with SmartThings CEO Alex Hawkinson. IoT Journal: SmartThings was developed in an open, standards-agnostic platform, and will now be part of Samsung's Ope...
Oct. 26, 2014 01:00 AM EDT Reads: 2,702
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an In...
Oct. 25, 2014 05:00 PM EDT Reads: 1,728
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud...
Oct. 25, 2014 11:45 AM EDT Reads: 1,852
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and manage them efficiently. Our software’s modular architecture allows customers to integrate nearly any application wi...
Oct. 25, 2014 10:00 AM EDT Reads: 1,789
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, will focus on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19...
Oct. 25, 2014 10:00 AM EDT Reads: 1,729
As Platform as a Service (PaaS) matures as a category, developers should have the ability to use the programming language of their choice to build applications and have access to a wide array of services. Bluemix is IBM's open cloud development platform that enables users to easily build cloud-based, creative mobile and web applications without having to spend large amounts of time and resources o...
Oct. 25, 2014 08:00 AM EDT Reads: 1,796
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at Internet of @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, will discuss how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will nee...
Oct. 24, 2014 09:30 PM EDT Reads: 1,446
When you set off to build an app that will change the world, designing your system architecture to be reliable and scalable is important but the stark reality is that, for your MVP, you probably had a “need for speed” (of development). You didn’t know what all the axes were to scale your application, where your stress points would be, and what weird and wonderful ways your customers would use it d...
Oct. 24, 2014 09:00 PM EDT Reads: 1,272
Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private and hybrid clouds. In his session at 15th Cloud Expo, Holland Barry, VP of Technology at Catbird, will discuss the impact of this new paradigm and what organizations can do to...
Oct. 24, 2014 07:00 PM EDT Reads: 1,548
SYS-CON Events announced today that Red Hat, the world's leading provider of open source solutions, will exhibit at Internet of @ThingsExpo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, ...
Oct. 23, 2014 11:30 PM EDT Reads: 1,741