|By Marketwired .||
|July 16, 2014 07:30 AM EDT||
SUNNYVALE, CA -- (Marketwired) -- 07/16/14 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider and Microsoft Gold Independent Software Vendor, today announced the availability of the Proofpoint Security and Compliance Suite for Office 365. The new Proofpoint cloud-based suite provides essential advanced threat protection, global regulatory compliance and comprehensive eDiscovery capabilities for organizations migrating to Microsoft® Office 365.
"Enterprises moving to Microsoft Office 365 need to adequately protect themselves with third-party advanced threat protection and compliance capabilities," said Michael Osterman, Principal Analyst with Osterman Research. "Proofpoint has a proven track record of stopping advanced attacks and meeting complex global regulations. Using the same third-party vendor for threat protection and compliance measures really makes sense."
As attackers launch more sophisticated campaigns, and regulations and litigation multiply, enterprise risk exposure is increasing rapidly. The Proofpoint Security and Compliance Suite for Office 365 is designed to reduce risk across three crucial areas of exposure:
- Advanced Threat Protection: Proofpoint Enterprise Protection and Proofpoint Targeted Attack Protection complement Microsoft Office 365 email security measures by protecting high value data from targeted spear-phishing attacks and zero-day malware. Proofpoint employs a range of advanced threat detection technology, including dynamic malware analysis and big-data analytics, to defeat advanced threats and targeted attacks that bypass traditional anti-spam solutions.
- Global Compliance: Proofpoint Enterprise Privacy provides global regulatory compliance functionality that automatically and accurately identifies a wide range of sensitive data including credit card numbers, government IDs and health care records. This allows administrators to easily secure communications and comply with compliance regulations including HIPAA, GLBA and PCI based on a central policy. Proofpoint also extends the capability of Microsoft Office 365 to meet rigorous enterprise-class data retention regulations, including those specified by the U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA).
- Comprehensive eDiscovery: Proofpoint Enterprise Archive enhances legal discovery with rapid search insight, legal hold capabilities and granular retention policies. Enterprises have the flexibility to segregate legal holds by both group and geography, and can prevent end users from deleting sensitive data. Proofpoint eDiscovery also covers social network content and non-Microsoft document types.
"Advanced phishing attacks and continued data loss have made email the number one threat vector and compliance concern facing most enterprises," said David Knight, EVP and general manager for information security products at Proofpoint. "The new Proofpoint Security and Compliance Suite for Microsoft Office 365 provides the additional layer of advanced threat protection and compliance functionality that enterprises running on Office 365 need to stop phishing attacks and comply with global regulations. This enables organizations of all sizes to take full advantage of the benefits of Office 365 without sacrificing security or compliance."
This week, Microsoft Partner Conference attendees can visit Proofpoint booth #632 for details on the new Proofpoint suite. For additional information on the Proofpoint Security and Compliance Suite for Office 365, please visit www.proofpoint.com/O365.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint, Proofpoint Security and Compliance Suite, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive, Proofpoint Targeted Attack Protection are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and/or other countries. Microsoft and Office 365 are registered trademarks of Microsoft Corp. All other trademarks contained herein are the property of their respective owners.
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Mar. 4, 2015 04:00 AM EST Reads: 1,062
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
Mar. 4, 2015 04:00 AM EST Reads: 3,093
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
Mar. 4, 2015 03:30 AM EST Reads: 2,705
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Mar. 4, 2015 02:45 AM EST Reads: 3,809
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
Mar. 4, 2015 02:30 AM EST Reads: 1,154
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
Mar. 4, 2015 02:00 AM EST Reads: 3,124
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and ex...
Mar. 4, 2015 01:30 AM EST Reads: 3,510
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Mar. 4, 2015 01:00 AM EST Reads: 4,383
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Mar. 4, 2015 12:30 AM EST Reads: 3,533
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
Mar. 4, 2015 12:00 AM EST Reads: 3,086
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
Mar. 3, 2015 11:15 PM EST Reads: 742
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures...
Mar. 3, 2015 09:15 PM EST Reads: 861
Business and IT leaders today need better application delivery capabilities to support critical new innovation. But how often do you hear objections to improving application delivery like, “I can harden it against attack, but not on this timeline”; “I can make it better, but it will cost more”; “I can deliver faster, but not with these specs”; or “I can stay strong on cost control, but quality will suffer”? In the new application economy, these tradeoffs are no longer acceptable. Customers will ...
Mar. 3, 2015 07:30 PM EST Reads: 946
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
Mar. 3, 2015 06:30 PM EST Reads: 707
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at FreeLoadBalancer.com. Load balancing, security and traffic optimization are all key enablers for application performance and functionality. Without these, application services will not perform as expected or have the...
Mar. 3, 2015 05:30 PM EST Reads: 621