ProofPoint

ProofPoint


Proofpoint Integrates Security Solutions

Proofpoint has a complete suite of Information Security products. They are strongly represented in the Social Media realm where they offer solid, robust solutions that address the risks posed by social media and potential reputational damage.

Proofpoint partner Securite

Email Protection

Proofpoint Email Protection provides protection from unwanted and malicious email, with granular visibility and business continuity for organisations of all sizes. These controls enable IT and security teams to have confidence that they can secure their end users from email threats including phishing, business email compromise (BEC), and malware, while maintaining email communications in the event of an outage.

Resources
Securite protects mobile email

SMB Email Essentials

Proofpoint Essentials harnesses the capabilities of Proofpoint Email Protection to fit the needs of smaller businesses. Proofpoint Essentials provides spam filtering, phishing detection, multi-layer anti-virus, a robust filter rules engine, email continuity, policy-enforced encryption, and email archive – all managed in a simple and intuitive user interface

Resources

Targeted Attack Protection (TAP) in Email

Proofpoint Targeted Attack Protection (TAP) helps detect, mitigate, and block advanced threats that target people through email. We detect known and unknown threats that use malicious attachments and URLs. TAP is unmatched in stopping targeted attacks that use ransomware, polymorphic malware, weapon cloaked documents, and credential-stealing phishing techniques to access sensitive information.

Resources

TAP Mobile Defense

Proofpoint TAP Mobile Defense combines rich mobile app analysis data with an automated workflow to give IT teams the information and visibility they need to manage risks from mobile apps. TAP Mobile Defense works with enterprise mobile device management (MDM), enterprise mobility management (EMM), and mobile security management (MSM) tools. Having analysed more than 3 million apps to date from more than 500,000 publishers, TAP Mobile Defense offers deep threat intelligence to stop malicious and data-leaking iOS and Android apps.

Resources

Threat Response

Proofpoint Threat Response is designed for security operations teams working towards security maturity, automates the threat data enrichment, forensic verification, and response processes after a security alert is received. Unlike traditional incident response process related tools, Threat Response automatically confirms malware infections, checks for evidence of past infections, and enriches security alerts by automatically adding internal and external context and intelligence.

Resources

Emerging Threats (ET) Intelligence

Proofpoint ET Intelligence is the gold standard for threat researchers, offering 100% verified threat intelligence. Unlike other intelligence sources that report only domains or IP addresses, our intel includes a five-year history, proof of conviction, more than 40 threat categories and related IPs, domains, and samples.

Resources


Social Media


Social Discover

Proofpoint Social Discover gives you a detailed understanding of your social media footprint. Protect your brand across social media platforms such as Facebook, Twitter, YouTube, and Instagram, and more. Social Discover scans social networks to find, inventory, and remediate fraudulent or unauthorised social media accounts.

Social Patrol

Proofpoint SocialPatrol provides advanced protection for companies, customers, and brands across all major social networks, including Facebook, Instagram, Twitter, LinkedIn, Google+, and YouTube. Using patent-pending technology, SocialPatrol empowers organisations to stop hackers from defacing their brands by locking corporate-owned social media accounts, prevent security incidents by blocking malware and phishing attacks, manage compliance and acceptable use policy by removing inappropriate content, and prevent unauthorised publishing by controlling connected applications.

Securite helps you control social media

Social Sight

Proofpoint SocialSight brings privacy-first security to employee social media programs by protecting personal accounts from risks that negatively impact your brand. It acts as a social media security coach: helping employees avoid confidential data exposure, eliminate embarrassing mistakes, prevent hacks, and protect feeds from malicious content.

Resources

Data Discover

Proofpoint Data Discover provides complete visibility and response capabilities for unstructured data in the enterprise. It automates content analysis to track information across an organisation’s network including email, file shares, SAN, NAS, and SharePoint sites. Data Discover automatically identifies sensitive data — including PII, PHI, and PII — at risk to unauthorised exposure and enables real-time remediation through quarantine, access revocation, or deletion.

Resources

Email DLP

Proofpoint Email DLP prevents employee negligence with more accurate and transparent control for outgoing communication. Instead of forcing your end users to make policy decisions about the nature and protection of the content they send, simply have them operate normally while our solution enforces email communication policies centrally and automatically.

Resources

Email Encryption

Proofpoint Email Encryption makes secure communication simple, seamless, and automated with policy-based encryption of messages and attachments. Protect sensitive email messages while ensuring your affiliates, business partners, and end users still have seamless access to secured messages on computers or mobile devices

Resources

Information Archive

Proofpoint Information Archive leverages cloud intelligence to preserve, discover, and supervise business-critical information. It is a next-generation archiving solution that addresses three fundamental challenges — legal discovery, regulatory compliance and reduce cost and complexity — without the headaches of manag ing archiving in-house. It provides a scalable cloud architecture, guaranteed search performance, unmatched customer satisfaction, and the industry’s most sophisticated encryption for complete legal and compliance control.

Resources