Proofpoint
Website:
www.proofpoint.com/uk
Company Profile
Proofpoint, Inc. helps the most successful companies in the world protect and govern their most sensitive business data.
Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organisations
protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data
governance mandates that have been spawned from highly publicised data breaches.
Proofpoint, 7 year Leader Gartner Quadrant 2015 Magic Quadrant for Secure Email Gateways, and 2015 Magic Quadrant
for Enterprise Information Archiving, delivers an integrated suite of on-demand data protection solutions spanning threat
management, regulatory compliance, data governance and secure communications—all of which are based on a common
security-as-a-service platform.
Company’s USP
What Solutions Do You Offer?
•
•
•
•
•
•
•
•
Keep malicious content out of their environments
Prevent the theft or inadvertent loss of sensitive
information
Collect, securely retain, govern and discover sensitive
data for compliance and litigation support
Securely communicate and collaborate on sensitive data
with customers, partners and suppliers
Threat Protection including Email, Mobile and Social
Compliance
Discovery
O/365 Security Solutions
Discussion Synopsis
People Make the Best Exploits: Roadmapping Your Security Investment in Line With Emerging Threat Landscape
The threat landscape has changed funda mentally over the last couple of years. Social engineering became the No. 1 attack
technique. Attackers have shifted away from automated exploits and instead engaged people to do the dirty work—infecting
systems, stealing credentials, and transferring funds. Across all vectors and in attacks of all sizes, threat actors used social
engineering to trick people into doing things that once depended on malicious code. You will get better visibility into the
nature of attacks against your organisation so you can quickly distinguish between targeted and indiscriminate campaigns,
which will ultimately help you in making the right decisions for your investment in security solutions.
Page 24