+ All Categories
Home > Documents > Proofpoint Protection/Privacy Offering

Proofpoint Protection/Privacy Offering

Date post: 21-Feb-2016
Category:
Upload: keola
View: 47 times
Download: 0 times
Share this document with a friend
Description:
Proofpoint Protection/Privacy Offering. Proofpoint Privacy Accurately detect ePHI in e-mails Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization E-mail Encryption - PowerPoint PPT Presentation
Popular Tags:
4
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in e-mails Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis • Customization E-mail Encryption Easy for administrators and end users Proofpoint Protection Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content, viruses for both inbound and outbound e-mail. Low false positives End-user friendly – Intuitive end user digest Helpdesk friendly with fast message tracking Set / forget – Low administration Flexibility – The ability to tailor to your needs
Transcript
Page 1: Proofpoint Protection/Privacy Offering

1Proofpoint, Inc. Proprietary and Confidential ©2010

Proofpoint Protection/Privacy Offering

Proofpoint Privacy• Accurately detect ePHI in e-mails• Integrated DLP with Encryption• Workflow to automate process of securing content• Incident identification to understand your risk• Unstructured Data Analysis• Customization• E-mail Encryption• Easy for administrators and end users

Proofpoint Protection• Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content,

viruses for both inbound and outbound e-mail.• Low false positives • End-user friendly – Intuitive end user digest • Helpdesk friendly with fast message tracking• Set / forget – Low administration• Flexibility – The ability to tailor to your needs

Page 2: Proofpoint Protection/Privacy Offering

2Proofpoint, Inc. Proprietary and Confidential ©2010

Proofpoint ProposalProposal Options Give Get

Option # 1: 1 YearProofpoint Privacy and Protection on Virtual (150 users)

$6,000 / Purchase Order by 12/23/11

$1,200 / Installation and Configuration

1 year of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 1 year of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty

Option # 2: 3 YearProofpoint Privacy and Protection on Virtual(150 users)

$15,000 / Purchase Order by 12/23/11

Installation and configuration included

3 years of Proofpoint Protection (150 users) Includes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. 3 years of Proofpoint Privacy (150 users) Includes: ePHI filtering, policy-based encryption, P350 Appliance – 1 year 24 hour hardware warranty

Option #3: Proofpoint Privacy and Protection SaaS (150 users)

$10,000 a year 1-year Proofpoint Protection and PrivacyIncludes: Anti-spam, Antivirus, Zero-hour Antivirus, Proofpoint Dynamic Reputation, Smart Search Message Tracking. Includes: ePHI filtering, policy-based encryption, 24x7 Platinum Support

Page 4: Proofpoint Protection/Privacy Offering

4Proofpoint, Inc. Proprietary and Confidential ©2010

Summary

Proofpoint is specialized and focused in Email Security and ComplianceBetter Effectiveness against the latest threat types.

• Including phishing and low volume targeted attacks, and protecting your company’s brand by blocking outbound spam.

Multi-layered defense in depth• Smart Identifiers for SSNs, PANs, ABA Routing Numbers, etc.

• Proximity and correlation analysis to client data

Integrated encryption• Native, integrated, strong encryption technology

• Encrypt messages automatically, based on presence of sensitive data

Easy to implement and use• Deploy in days

• Proofpoint Key Service eliminates key management overhead

“Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on email security issues and continued product enhancements.” Gartner 2011


Recommended