ExecLN Event (CIO | CMO | CISO) 7th Sep 2016 | Page 24

Proofpoint Website: www.proofpoint.com/uk Company Profile Proofpoint, Inc. helps the most successful companies in the world protect and govern their most sensitive business data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organisations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicised data breaches. Proofpoint, 7 year Leader Gartner Quadrant 2015 Magic Quadrant for Secure Email Gateways, and 2015 Magic Quadrant for Enterprise Information Archiving, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform. Company’s USP What Solutions Do You Offer? • • • • • • • • Keep malicious content out of their environments Prevent the theft or inadvertent loss of sensitive information Collect, securely retain, govern and discover sensitive data for compliance and litigation support Securely communicate and collaborate on sensitive data with customers, partners and suppliers Threat Protection including Email, Mobile and Social Compliance Discovery O/365 Security Solutions Discussion Synopsis People Make the Best Exploits: Roadmapping Your Security Investment in Line With Emerging Threat Landscape The threat landscape has changed funda mentally over the last couple of years. Social engineering became the No. 1 attack technique. Attackers have shifted away from automated exploits and instead engaged people to do the dirty work—infecting systems, stealing credentials, and transferring funds. Across all vectors and in attacks of all sizes, threat actors used social engineering to trick people into doing things that once depended on malicious code. You will get better visibility into the nature of attacks against your organisation so you can quickly distinguish between targeted and indiscriminate campaigns, which will ultimately help you in making the right decisions for your investment in security solutions. Page 24