Welcome!

News Feed Item

Proofpoint Launches Suite of Protection and Compliance Products for Office 365

New Proofpoint Suite Extends Office 365 With Advanced Threat Protection, Global Compliance and Comprehensive eDiscovery

SUNNYVALE, CA -- (Marketwired) -- 07/16/14 -- Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider and Microsoft Gold Independent Software Vendor, today announced the availability of the Proofpoint Security and Compliance Suite for Office 365. The new Proofpoint cloud-based suite provides essential advanced threat protection, global regulatory compliance and comprehensive eDiscovery capabilities for organizations migrating to Microsoft® Office 365™.

"Enterprises moving to Microsoft Office 365 need to adequately protect themselves with third-party advanced threat protection and compliance capabilities," said Michael Osterman, Principal Analyst with Osterman Research. "Proofpoint has a proven track record of stopping advanced attacks and meeting complex global regulations. Using the same third-party vendor for threat protection and compliance measures really makes sense."

As attackers launch more sophisticated campaigns, and regulations and litigation multiply, enterprise risk exposure is increasing rapidly. The Proofpoint Security and Compliance Suite for Office 365 is designed to reduce risk across three crucial areas of exposure:

  • Advanced Threat Protection: Proofpoint Enterprise Protection™ and Proofpoint Targeted Attack Protection™ complement Microsoft Office 365 email security measures by protecting high value data from targeted spear-phishing attacks and zero-day malware. Proofpoint employs a range of advanced threat detection technology, including dynamic malware analysis and big-data analytics, to defeat advanced threats and targeted attacks that bypass traditional anti-spam solutions.

  • Global Compliance: Proofpoint Enterprise Privacy™ provides global regulatory compliance functionality that automatically and accurately identifies a wide range of sensitive data including credit card numbers, government IDs and health care records. This allows administrators to easily secure communications and comply with compliance regulations including HIPAA, GLBA and PCI based on a central policy. Proofpoint also extends the capability of Microsoft Office 365 to meet rigorous enterprise-class data retention regulations, including those specified by the U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA).

  • Comprehensive eDiscovery: Proofpoint Enterprise Archive™ enhances legal discovery with rapid search insight, legal hold capabilities and granular retention policies. Enterprises have the flexibility to segregate legal holds by both group and geography, and can prevent end users from deleting sensitive data. Proofpoint eDiscovery also covers social network content and non-Microsoft document types.

"Advanced phishing attacks and continued data loss have made email the number one threat vector and compliance concern facing most enterprises," said David Knight, EVP and general manager for information security products at Proofpoint. "The new Proofpoint Security and Compliance Suite for Microsoft Office 365 provides the additional layer of advanced threat protection and compliance functionality that enterprises running on Office 365 need to stop phishing attacks and comply with global regulations. This enables organizations of all sizes to take full advantage of the benefits of Office 365 without sacrificing security or compliance."

This week, Microsoft Partner Conference attendees can visit Proofpoint booth #632 for details on the new Proofpoint suite. For additional information on the Proofpoint Security and Compliance Suite for Office 365, please visit www.proofpoint.com/O365.

About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.

Proofpoint, Proofpoint Security and Compliance Suite, Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive, Proofpoint Targeted Attack Protection are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and/or other countries. Microsoft and Office 365 are registered trademarks of Microsoft Corp. All other trademarks contained herein are the property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists looked at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deliver...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...