Proofpoint Protection/Privacy Offering. Proofpoint Privacy Accurately detect ePHI in e-mails Integrated DLP with Encryption Workflow to automate process of securing content Incident identification to understand your risk Unstructured Data Analysis Customization E-mail Encryption - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Proofpoint Privacy• Accurately detect ePHI in e-mails• Integrated DLP with Encryption• Workflow to automate process of securing content• Incident identification to understand your risk• Unstructured Data Analysis• Customization• E-mail Encryption• Easy for administrators and end users
Proofpoint Protection• Accuracy in the detection of (spear) phishing messages, spam, bulk mail, adult content,
viruses for both inbound and outbound e-mail.• Low false positives • End-user friendly – Intuitive end user digest • Helpdesk friendly with fast message tracking• Set / forget – Low administration• Flexibility – The ability to tailor to your needs
• Encrypt messages automatically, based on presence of sensitive data
Easy to implement and use• Deploy in days
• Proofpoint Key Service eliminates key management overhead
“Proofpoint increased in execution this year due to a combination of a high growth rate relative to peers, dedicated focus on email security issues and continued product enhancements.” Gartner 2011