We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEstevan Nute
Modified over 5 years ago
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in e-mails Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization E-mail Encryption Easy for administrators and end users Proofpoint Protection Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content, viruses for both inbound and outbound e-mail. Low false positives End-user friendly – Intuitive end user digest Helpdesk friendly with fast message tracking Set / forget – Low administration Flexibility – The ability to tailor to your needs
2 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Proposal Proposal Options GiveGet Option # 1: 1 Year Proofpoint Privacy and Protection on Virtual (150 users) $6,000 / Purchase Order by 12/23/11 $1,200 / Installation and Configuration 1 year of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 1 year of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option # 2: 3 Year Proofpoint Privacy and Protection on Virtual(150 users) $15,000 / Purchase Order by 12/23/11 Installation and configuration included 3 years of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 3 years of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option #3: Proofpoint Privacy and Protection SaaS (150 users) $10,000 a year 1-year Proofpoint Protection and Privacy Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. Includes: ePHI filtering, policy-based encryption, 24x7 Platinum Support
3 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint: Email Security Solutions 4000 + Customers Leading email security, compliance, & archiving solutions for Global 2000 Enterprise-class protection for lowest email risk & cost of ownership Industry leadership Fastest Growing in Messaging Security (2008) Leaders Quadrant, Email Security Boundaries (2008, 2010, 2011) Best Buy (2009)
4 Proofpoint, Inc. Proprietary and Confidential ©2010 Summary Proofpoint is specialized and focused in Email Security and Compliance Better Effectiveness against the latest threat types. Including phishing and low volume targeted attacks, and protecting your companys brand by blocking outbound spam. Multi-layered defense in depth Smart Identifiers for SSNs, PANs, ABA Routing Numbers, etc. Proximity and correlation analysis to client data Integrated encryption Native, integrated, strong encryption technology Encrypt messages automatically, based on presence of sensitive data Easy to implement and use Deploy in days Proofpoint Key Service eliminates key management overhead Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on email security issues and continued product enhancements. Gartner 2011
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Eloqua Providing Industry-Leading Management Tools.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Hosted Exchange 2007 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses.
1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Jay Flanyak Channel Business Manager
Office 365 for Enterprises ITExpo February 2, 2012.
© 2010 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. TIBCO Spotfire Application Data Services TIBCO Spotfire European User Conference.
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
© 2019 SlidePlayer.com Inc. All rights reserved.