Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, AppDynamics Blog, Ian Goldsmith, Ed Featherston

News Feed Item

Proofpoint Launches Suite of Protection and Compliance Products for Office 365

New Proofpoint Suite Extends Office 365 With Advanced Threat Protection, Global Compliance and Comprehensive eDiscovery

SUNNYVALE, CA -- (Marketwired) -- 07/16/14 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider and Microsoft Gold Independent Software Vendor, today announced the availability of the Proofpoint Security and Compliance Suite for Office 365. The new Proofpoint cloud-based suite provides essential advanced threat protection, global regulatory compliance and comprehensive eDiscovery capabilities for organizations migrating to Microsoft® Office 365™.

"Enterprises moving to Microsoft Office 365 need to adequately protect themselves with third-party advanced threat protection and compliance capabilities," said Michael Osterman, Principal Analyst with Osterman Research. "Proofpoint has a proven track record of stopping advanced attacks and meeting complex global regulations. Using the same third-party vendor for threat protection and compliance measures really makes sense."

As attackers launch more sophisticated campaigns, and regulations and litigation multiply, enterprise risk exposure is increasing rapidly. The Proofpoint Security and Compliance Suite for Office 365 is designed to reduce risk across three crucial areas of exposure:

  • Advanced Threat Protection: Proofpoint Enterprise Protection™ and Proofpoint Targeted Attack Protection™ complement Microsoft Office 365 email security measures by protecting high value data from targeted spear-phishing attacks and zero-day malware. Proofpoint employs a range of advanced threat detection technology, including dynamic malware analysis and big-data analytics, to defeat advanced threats and targeted attacks that bypass traditional anti-spam solutions.

  • Global Compliance: Proofpoint Enterprise Privacy™ provides global regulatory compliance functionality that automatically and accurately identifies a wide range of sensitive data including credit card numbers, government IDs and health care records. This allows administrators to easily secure communications and comply with compliance regulations including HIPAA, GLBA and PCI based on a central policy. Proofpoint also extends the capability of Microsoft Office 365 to meet rigorous enterprise-class data retention regulations, including those specified by the U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA).

  • Comprehensive eDiscovery: Proofpoint Enterprise Archive™ enhances legal discovery with rapid search insight, legal hold capabilities and granular retention policies. Enterprises have the flexibility to segregate legal holds by both group and geography, and can prevent end users from deleting sensitive data. Proofpoint eDiscovery also covers social network content and non-Microsoft document types.

"Advanced phishing attacks and continued data loss have made email the number one threat vector and compliance concern facing most enterprises," said David Knight, EVP and general manager for information security products at Proofpoint. "The new Proofpoint Security and Compliance Suite for Microsoft Office 365 provides the additional layer of advanced threat protection and compliance functionality that enterprises running on Office 365 need to stop phishing attacks and comply with global regulations. This enables organizations of all sizes to take full advantage of the benefits of Office 365 without sacrificing security or compliance."

This week, Microsoft Partner Conference attendees can visit Proofpoint booth #632 for details on the new Proofpoint suite. For additional information on the Proofpoint Security and Compliance Suite for Office 365, please visit www.proofpoint.com/O365.

About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.

Proofpoint, Proofpoint Security and Compliance Suite, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive, Proofpoint Targeted Attack Protection are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and/or other countries. Microsoft and Office 365 are registered trademarks of Microsoft Corp. All other trademarks contained herein are the property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Information Technology (IT) service providers have historically struggled between the huge capital expenditure and long development cycles of building their own cloud versus the thin margins and limited flexibility of using public retailers such as Amazon Web Services (AWS). The emergence of wholesale cloud, and the technologies that make it possible, is revolutionizing how and by whom enterprise IT is delivered. Wholesale cloud is the game-changing third option between building your own (BYO) c...
Shipping daily, injecting faults, and keeping an extremely high availability "without Ops"? Understand why NoOps does not mean no operations. Agile development methodologies require evolved operations to be successful. In his keynote at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how Microsoft teams who have made huge progress with a DevOps transformation effectively utilize operations staff and how challenges were overcome. Regardless ...
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently. In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, will cover the union between the two topics and why this is important. He will cover an overview of Immutable Infrastructure then show how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He will end the session with some interesting case study examples.
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SYS-CON Media named Andi Mann editor of DevOps Journal. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Andi Mann, Vice President, Strategic Solutions, at CA Technologies, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, communicator, and thought lea...
Announced separately, New Relic is joining the Cloud Foundry Foundation to continue the support of customers and partners investing in this leading PaaS. As a member, New Relic is contributing the New Relic tile, service broker and build pack with the goal of easing the development of applications on Cloud Foundry and enabling the success of these applications without dedicated monitoring infrastructure. Supporting Quotes "The proliferation of microservices and new technologies like Docker ha...
Even though it’s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL – soa.sys-con.com – remains unchanged. And that’s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is passé, and now that people are ...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
Cloud services are the newest tool in the arsenal of IT products in the market today. These cloud services integrate process and tools. In order to use these products effectively, organizations must have a good understanding of themselves and their business requirements. In his session at 15th Cloud Expo, Brian Lewis, Principal Architect at Verizon Cloud, outlined key areas of organizational focus, and how to formalize an actionable plan when migrating applications and internal services to the ...
Most companies hope for rapid growth so it's important to invest in scalable core technologies that won't demand a complete overhaul when a business goes through a growth spurt. Cloud technology enables previously difficult-to-scale solutions like phone, network infrastructure or billing systems to automatically scale based on demand. For example, with a virtual PBX service, a single-user cloud phone service can easily transition into an advanced VoIP system that supports hundreds of phones and ...
The worldwide cellular network will be the backbone of the future IoT, and the telecom industry is clamoring to get on board as more than just a data pipe. In his session at @ThingsExpo, Evan McGee, CTO of Ring Plus, Inc., discussed what service operators can offer that would benefit IoT entrepreneurs, inventors, and consumers. Evan McGee is the CTO of RingPlus, a leading innovative U.S. MVNO and wireless enabler. His focus is on combining web technologies with traditional telecom to create a ...
"We have developers who are really passionate about getting their code out to customers, no matter what, in the shortest possible time. Operations are very focused on procedures and policies," explained Stan Klimoff, CTO of Qubell, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Agility is top of mind for Cloud/Service providers and Enterprises alike. Policy Driven Data Center provides a policy model for application deployment by decoupling application needs from the underlying infrastructure primitives. In his session at 15th Cloud Expo, David Klebanov, a Technical Solutions Architect with Cisco Systems, discussed how it differentiates from the software-defined top-down control by offering a declarative approach to allow faster and simpler application deployment. Davi...
Sematext is a globally distributed organization that builds innovative Cloud and On Premises solutions for performance monitoring, alerting and anomaly detection (SPM), log management and analytics (Logsene), and search analytics (SSA). We also provide Search and Big Data consulting services and offer 24/7 production support for Solr and Elasticsearch.