1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in e-mails Integrated.

Slides:



Advertisements
Similar presentations
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
Advertisements

1 Eloqua Providing Industry-Leading Management Tools May 2009.
Eloqua Providing Industry-Leading Management Tools.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Hosted Exchange 2007 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses.
1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Jay Flanyak Channel Business Manager
Office 365 for Enterprises ITExpo February 2, 2012.
© 2010 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. TIBCO Spotfire Application Data Services TIBCO Spotfire European User Conference.
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Security in the Cloud Computing Era Stephen Hui.
Internet Protocol Security (IPSec)
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Filter Services. Advantages of Using Spam Filters Effective Filter Bigger Bandwidth Space Easy Interface Accurate Results.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Barracuda Networks Steve Scheidegger Commercial Account Manager
Eliminating Spam, Viruses and Outbound Compliance Risks in the Collegiate IT Environment Sallie Wright, Information Security Officer, Oklahoma State University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Offer Exchange Let your customers pick their preferred version of the world’s most popular business and collaboration platform Lync Secure, business-grade,
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
BUSINESS B1 Information Security.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Webroot Web Security SaaS A Better Approach to Web Security
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Small Business Security Keith Slagle April 24, 2007.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Fortinet Advanced Threat Protection- Part 4
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
Information explosion 1.4X 44X Protect communications.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Encrypted from CDS Office Technologies
Barracuda Web Filtering Service
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Unique features of Bitdefender Cloud Security for MSPs
Introduction to Symantec Security Service
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization Encryption Easy for administrators and end users Proofpoint Protection Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content, viruses for both inbound and outbound . Low false positives End-user friendly – Intuitive end user digest Helpdesk friendly with fast message tracking Set / forget – Low administration Flexibility – The ability to tailor to your needs

2 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Proposal Proposal Options GiveGet Option # 1: 1 Year Proofpoint Privacy and Protection on Virtual (150 users) $6,000 / Purchase Order by 12/23/11 $1,200 / Installation and Configuration 1 year of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 1 year of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option # 2: 3 Year Proofpoint Privacy and Protection on Virtual(150 users) $15,000 / Purchase Order by 12/23/11 Installation and configuration included 3 years of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 3 years of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option #3: Proofpoint Privacy and Protection SaaS (150 users) $10,000 a year 1-year Proofpoint Protection and Privacy Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. Includes: ePHI filtering, policy-based encryption, 24x7 Platinum Support

3 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint: Security Solutions Customers Leading security, compliance, & archiving solutions for Global 2000 Enterprise-class protection for lowest risk & cost of ownership Industry leadership Fastest Growing in Messaging Security (2008) Leaders Quadrant, Security Boundaries (2008, 2010, 2011) Best Buy (2009)

4 Proofpoint, Inc. Proprietary and Confidential ©2010 Summary Proofpoint is specialized and focused in Security and Compliance Better Effectiveness against the latest threat types. Including phishing and low volume targeted attacks, and protecting your companys brand by blocking outbound spam. Multi-layered defense in depth Smart Identifiers for SSNs, PANs, ABA Routing Numbers, etc. Proximity and correlation analysis to client data Integrated encryption Native, integrated, strong encryption technology Encrypt messages automatically, based on presence of sensitive data Easy to implement and use Deploy in days Proofpoint Key Service eliminates key management overhead Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on security issues and continued product enhancements. Gartner 2011