We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEstevan Nute
Modified over 2 years ago
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization Encryption Easy for administrators and end users Proofpoint Protection Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content, viruses for both inbound and outbound . Low false positives End-user friendly – Intuitive end user digest Helpdesk friendly with fast message tracking Set / forget – Low administration Flexibility – The ability to tailor to your needs
2 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Proposal Proposal Options GiveGet Option # 1: 1 Year Proofpoint Privacy and Protection on Virtual (150 users) $6,000 / Purchase Order by 12/23/11 $1,200 / Installation and Configuration 1 year of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 1 year of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option # 2: 3 Year Proofpoint Privacy and Protection on Virtual(150 users) $15,000 / Purchase Order by 12/23/11 Installation and configuration included 3 years of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 3 years of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty Option #3: Proofpoint Privacy and Protection SaaS (150 users) $10,000 a year 1-year Proofpoint Protection and Privacy Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. Includes: ePHI filtering, policy-based encryption, 24x7 Platinum Support
3 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint: Security Solutions Customers Leading security, compliance, & archiving solutions for Global 2000 Enterprise-class protection for lowest risk & cost of ownership Industry leadership Fastest Growing in Messaging Security (2008) Leaders Quadrant, Security Boundaries (2008, 2010, 2011) Best Buy (2009)
4 Proofpoint, Inc. Proprietary and Confidential ©2010 Summary Proofpoint is specialized and focused in Security and Compliance Better Effectiveness against the latest threat types. Including phishing and low volume targeted attacks, and protecting your companys brand by blocking outbound spam. Multi-layered defense in depth Smart Identifiers for SSNs, PANs, ABA Routing Numbers, etc. Proximity and correlation analysis to client data Integrated encryption Native, integrated, strong encryption technology Encrypt messages automatically, based on presence of sensitive data Easy to implement and use Deploy in days Proofpoint Key Service eliminates key management overhead Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on security issues and continued product enhancements. Gartner 2011
Sophos Security and Data Protection Overview by: Mun Foong, Che – Channel Manager.
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 FireEye Overview Nathan Labadie Systems Engineer, US-Central FireEye.
IronPort & Web Gateway Security Solutions PROTECTING OVER 300 MILLION BOXES WORLDWIDE Frederic Benichou Director, South Europe, Middle-East.
Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,
1 27-Dec-13 © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved Intellinx Ltd. Intellinx The Enterprise Fraud and Monitoring Solution.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
1 Eloqua Providing Industry-Leading Management Tools May 2009.
ViPNt ViPNet Product Presentation Infotecs GmbH 2008.
Infinigate Security Day September 9 th 2011 Marcel Kooring Business Development Manager.
© 2013 Infoblox Inc. All Rights Reserved. Tim Connelly, Manager, Systems Engineering Tim Connelly, Manager, Systems Engineering.
Eloqua Providing Industry-Leading Management Tools.
1 Symantec Endpoint Protection 12.1 Unrivaled Security. Blazing Performance. Built for Virtual Environments. May 2011.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
Enterprise Threat Management (ETM): Bringing Security Together Through Intelligence David Thomason Director of Security Engineering.
Websense Confidential web security | data security | security © 2009 Websense, Inc. All rights reserved. Websense Confidential Websense Hosted Web.
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
Avaya Unified Communications for Teleworkers. Agenda © 2009 Avaya Inc. All rights reserved.2 OverviewBusiness ValueSolution Overview.
Multi-Card Solutions Purchasing Card Travel Card eVA electronic payments tool (vPayment) GE CPS - Payment Services The Commonwealth of Virginia Payments.
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
Retrospect Sales & Technical Master Presentation Covers Win v8 and Mac v10.
Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales Daryl Jung - SE
© 2009 VMware Inc. All rights reserved VMware vShield – Foundation for the Most Secure Cloud Deployments.
Protection Against Spear Phishing and the Modern Cyber Threats.
Is technology ubiquity a chance to re-connect security? Greg Day Director of Security Strategy.
INTRODUCTION In business today, the formula for success includes two vital ingredients, effectively utilizing the latest technologies and proper information.
EX04: Exchange 2007 Security, Part II Jim McBee
How Microsoft does end-to-end IT Security Bruce Cowper Senior Program Manager, Security Initiative Microsoft Canada.
© 2016 SlidePlayer.com Inc. All rights reserved.