28.08.2013 Views

Proofpoint on Demand - Falken Secure Networks

Proofpoint on Demand - Falken Secure Networks

Proofpoint on Demand - Falken Secure Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong><br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> delivers <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s unified email security and data<br />

loss preventi<strong>on</strong> features as a cost-effective, easy-to-adopt and easy-to-manage<br />

SaaS (Software-as-a-Service) soluti<strong>on</strong>. Based <strong>on</strong> the same enterprise-proven<br />

platform that powers <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Messaging Security Gateway appliances,<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> offers the industry’s most effective protecti<strong>on</strong> against<br />

both inbound and outbound email-borne threats, without requiring the installati<strong>on</strong><br />

of <strong>on</strong>-premises hardware or software. Available in both Enterprise and<br />

Standard editi<strong>on</strong>s to meet your organizati<strong>on</strong>’s unique requirements.<br />

features<br />

Enterprise-class email security... <strong>on</strong> demand<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> combines the power and customizability of <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s enterprise-proven<br />

email security platform with the cost-effective c<strong>on</strong> venience of the hosted<br />

delivery model. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> is highly c<strong>on</strong>figurable and available with a wide<br />

variety of email security and data loss preventi<strong>on</strong> services. Organizati<strong>on</strong>s of all types will<br />

benefit from <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s unrivalled anti-spam effectiveness, comprehensive DLP (Data<br />

Loss Preventi<strong>on</strong>) features and unparalleled ease-of-use.<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> is available in two versi<strong>on</strong>s. Designed specifically to meet the<br />

needs of mid- and large-sized enterprises, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise Editi<strong>on</strong><br />

is the first hosted email security soluti<strong>on</strong> to offer the level of flexibility, security and c<strong>on</strong>trol<br />

that larger organizati<strong>on</strong>s require. For small- and medium-sized organizati<strong>on</strong>s that<br />

demand powerful spam blocking, virus protecti<strong>on</strong> and c<strong>on</strong>tent filtering capabilities, but<br />

d<strong>on</strong>’t require advanced customizati<strong>on</strong> or DLP features, we also offer <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Standard<br />

Editi<strong>on</strong>.<br />

Complete protecti<strong>on</strong> against inbound threats<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> blocks all types of undesirable inbound email mes sages, ensuring<br />

that enterprises receive <strong>on</strong>ly a clean, safe stream of valid email. The service includes<br />

comprehensive inbound email security features—including anti-spam, anti-virus, zerohour<br />

anti-virus, email firewall and c<strong>on</strong>necti<strong>on</strong> management.<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> guarantees 99% or higher effectiveness against all types of spam<br />

email using the latest advances in reputati<strong>on</strong>- and c<strong>on</strong>tent-based anti-spam technology.<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Spam Detecti<strong>on</strong> delivers unsurpassed accuracy by examining hundreds of<br />

thousands of attributes in every email to block the most spam, image-based spam and<br />

phishing attacks, while automatically adapting to new attacks as they appear. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g><br />

Dynamic Reputati<strong>on</strong> provides additi<strong>on</strong>al advanced reputati<strong>on</strong> protecti<strong>on</strong> to identify<br />

malicious or compromised email sources, effectively and intelligently blocking those<br />

c<strong>on</strong>necti<strong>on</strong>s. Global updates every two minutes insure all customers are protected from<br />

botnet attacks at the first sign of malicious activity.<br />

Dual-layer virus protecti<strong>on</strong> completely eliminates viruses, worms and other malicious<br />

code. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> leverages both signature-based and zero-hour detecti<strong>on</strong> to<br />

protect against known and emerging viruses in the earliest stages of their proliferati<strong>on</strong>—<br />

stopping them hours before competing soluti<strong>on</strong>s even begin to react.<br />

Comprehensive data loss preventi<strong>on</strong><br />

With <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise Editi<strong>on</strong>, you can also add powerful DLP capabilities<br />

“in the cloud.” <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> is the easiest and most cost-effective way<br />

for organizati<strong>on</strong>s to prevent leaks of sensitive data via email. The regulatory compliance<br />

service secur es private data and protects your organizati<strong>on</strong> from liabilities associated<br />

with privacy and data security regulati<strong>on</strong>s (such as HIPAA, GLBA, PCI, SEC rules, etc.).<br />

Customiz able rules, managed dicti<strong>on</strong>aries and “smart identifiers” are used to automatically<br />

scan for n<strong>on</strong>-public informati<strong>on</strong>—such as protected health informati<strong>on</strong> and pers<strong>on</strong>al<br />

financial informati<strong>on</strong>—and reject or encrypt messages as appropriate.<br />

Benefits<br />

o Delivers <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s industry-leading<br />

messaging security features—<br />

including anti-spam, anti-virus, email<br />

policy enforcement and data loss preventi<strong>on</strong><br />

capabilities—as a cost-effective,<br />

<strong>on</strong>-demand service.<br />

o <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s flexible managed services<br />

architecture meets any enterprise deployment<br />

strategy—from fully hosted to<br />

hybrid <strong>on</strong>-demand/<strong>on</strong>-premises installati<strong>on</strong>s.<br />

o Enterprise Editi<strong>on</strong> offers total c<strong>on</strong>trol and<br />

flexibility for your organizati<strong>on</strong>’s email<br />

security preferences, policies, enabled<br />

services, end-user features, alerts and<br />

reporting.<br />

o Next-generati<strong>on</strong>, dedicated hosting platform<br />

ensures complete security of customer<br />

data and c<strong>on</strong>tinuous service.<br />

“We needed a soluti<strong>on</strong> that could<br />

easily scale with our c<strong>on</strong>tinued<br />

growth... <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong><br />

is really the best of both worlds.<br />

It gives us all of the c<strong>on</strong>trol and<br />

customizability of an <strong>on</strong>-premises<br />

soluti<strong>on</strong>, with the c<strong>on</strong>venience,<br />

scalability and cost-effectiveness<br />

of a hosted service.”<br />

Viji Murali<br />

Chief Informati<strong>on</strong> Officer<br />

Washingt<strong>on</strong> State University<br />

o SaaS email security and data loss preventi<strong>on</strong> www.proofpoint.com 1 408 517 4710


<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise and Standard Editi<strong>on</strong>s<br />

features<br />

Comprehensive data loss preventi<strong>on</strong> (c<strong>on</strong>tinued)<br />

The digital asset security opti<strong>on</strong> keeps valuable corporate assets and c<strong>on</strong>fidential data<br />

from leaking outside your organizati<strong>on</strong> by analyzing and classifying your c<strong>on</strong>fidential<br />

documents and then m<strong>on</strong>itoring for that informati<strong>on</strong> (or parts of that informa ti<strong>on</strong>) in the<br />

outbound message stream—stopping c<strong>on</strong>tent security breaches before they happen.<br />

Easy-to-use encrypti<strong>on</strong> protects sensitive informati<strong>on</strong><br />

Protecting protected and sensitive informati<strong>on</strong> has never been easier or safer. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g><br />

<strong>on</strong> <strong>Demand</strong>—Enterprise offers several ways to protect data in transit. TLS encrypti<strong>on</strong><br />

protects all data between trusted business partners. The opti<strong>on</strong>al <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>Secure</strong> Messaging<br />

opti<strong>on</strong> protects individual messages c<strong>on</strong>taining protected informati<strong>on</strong> in emails<br />

or attachments. Messages can be automatically encrypted based <strong>on</strong> policies, eliminating<br />

end user adopti<strong>on</strong> and training issues, or manually encrypted by users as needed.<br />

Web-based policy management and administrati<strong>on</strong><br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise provides an easy-to-use, web-based administrati<strong>on</strong><br />

interface that makes it easy to m<strong>on</strong>itor and c<strong>on</strong>trol all services and define messaging<br />

policies. Different policies can even be defined for different groups of end-users. The<br />

Ajax-based interface enables “drag and drop” customizati<strong>on</strong> of the reports, status informati<strong>on</strong>,<br />

RSS feeds and other displays. The soluti<strong>on</strong> also provides access to more than 50<br />

real-time, graphical reports and alerts that give complete visibility into the state of your<br />

enterprise messaging system. Reports can be scheduled and delivered as email or HTML<br />

to groups or individuals, providing a powerful communicati<strong>on</strong>s tool with management.<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Standard is designed for true “lights out” operati<strong>on</strong> and zero<br />

administrati<strong>on</strong> overhead. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> handles all implementati<strong>on</strong>, 24x7 m<strong>on</strong>itoring and<br />

operati<strong>on</strong>al support, updates and upgrades for Standard Editi<strong>on</strong> customers.<br />

<strong>Secure</strong> customer envir<strong>on</strong>ments<br />

Many enterprises like the benefits of a hosted soluti<strong>on</strong>, but are not willing to compromise<br />

<strong>on</strong> c<strong>on</strong>trol, flexibility and security. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise was built to<br />

meet the stringent requirements of demanding enterprises in these areas. Rather than all<br />

customers sharing a comm<strong>on</strong> service, including databases and applicati<strong>on</strong> instances,<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise uniquely provides a dedicated envir<strong>on</strong>ment to each<br />

customer.<br />

A dedicated envir<strong>on</strong>ment separates your organizati<strong>on</strong>’s data and processing from all<br />

others, and gives you dedicated computing resources, including c<strong>on</strong>figurati<strong>on</strong>, user, and<br />

applicati<strong>on</strong> databases, quarantines, log files, disks, memory, CPU and firewalls. This approach<br />

solves the problems associated with traditi<strong>on</strong>al multi-tenant soluti<strong>on</strong>s.<br />

o Complete c<strong>on</strong>trol: Administrators main tain total c<strong>on</strong>trol, whether in “lights out” operati<strong>on</strong><br />

or using robust and active policy management. Administra tors can create<br />

rules as simple or complex as the situati<strong>on</strong> demands.<br />

o Maximum flexibility: <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise provides flex ibility to help<br />

administrators deal with compet ing IT needs, such as lock down periods, simultaneous<br />

upgrades, audits and business c<strong>on</strong>tinuity testing. Upgrades can be jointly scheduled<br />

to avoid other IT c<strong>on</strong>flicts. Individual company rollbacks are possible. No other<br />

SaaS email security soluti<strong>on</strong> offers this level of flexibility.<br />

o Total Security: Security teams, often cautious about moving to a hosted soluti<strong>on</strong>,<br />

can finally smile. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Enterprise solves key se curity c<strong>on</strong>cerns<br />

including separati<strong>on</strong> of company data from other clients. Encrypti<strong>on</strong> from your premises<br />

to <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s datacenters protects all data in transit. DDOS and DHA attacks<br />

<strong>on</strong> other deployments do not impact the performance of your organizati<strong>on</strong>’s unique<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> envir<strong>on</strong>ment.<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong>—Standard Editi<strong>on</strong> is hosted in a secure, multi-tenant envir<strong>on</strong>ment<br />

that uses the same world-class datacenters as Enterprise Editi<strong>on</strong>.<br />

Enterprise-grade SaaS<br />

Infrastructure and Services<br />

Hosted in <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>’s world-class datacenters,<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong> <strong>Demand</strong> offers<br />

enterprise-grade availability, performance,<br />

reliability and security.<br />

Industry Leading SLAs<br />

o 99.999% Service Availability<br />

o 99% Spam Effectiveness<br />

o 100% Anti-Virus Protecti<strong>on</strong><br />

o < 1 minute Email Latency<br />

o 1:350,000 False Positives<br />

Flexible Deployment Modes<br />

o Dedicated Envir<strong>on</strong>ment<br />

o Multi-tenant Envir<strong>on</strong>ment<br />

o Hybrid: hosted + <strong>on</strong> premise appliances<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Managed Services<br />

o Installati<strong>on</strong> and provisi<strong>on</strong>ing<br />

o Upgrades and updates<br />

o 24x7 m<strong>on</strong>itoring and support<br />

o System backup and recovery<br />

o System availability, performance and<br />

capacity m<strong>on</strong>itoring<br />

Available Services<br />

Inbound Email Protecti<strong>on</strong><br />

o Spam Detecti<strong>on</strong><br />

o Virus Protecti<strong>on</strong><br />

o Zero-Hour Anti-Virus<br />

o C<strong>on</strong>necti<strong>on</strong> Management<br />

Data Loss Preventi<strong>on</strong><br />

o C<strong>on</strong>tent Compliance<br />

o Regulatory Compliance<br />

o Digital Asset Security<br />

Encrypti<strong>on</strong> & Data Security<br />

o TLS Encrypti<strong>on</strong><br />

o <strong>Secure</strong> Messaging<br />

o Smart Search Message Tracing<br />

o <strong>Secure</strong> File Transfer<br />

Compatible Products<br />

o <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Messaging Security Gateway<br />

o <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Email Archiving o <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Network C<strong>on</strong>tent Sentry o <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>Secure</strong> File Transfer ©2009 <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>, Inc. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Protecti<strong>on</strong> Server is<br />

a registered trademark of <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>, Inc. in the United<br />

States and other countries. <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>on</strong><br />

<strong>Demand</strong>, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> MLX, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Messaging Security<br />

Gateway, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Spam Detecti<strong>on</strong>, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g><br />

Virus Protecti<strong>on</strong>, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Regulatory Compliance,<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Digital Asset Security, MLX Dynamic Reputati<strong>on</strong>,<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Network C<strong>on</strong>tent Sentry, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> Email<br />

Archiving, <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g> <strong>Secure</strong> File Transfer and <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g><br />

Smart Search are trademarks of <str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>, Inc. in the<br />

United States and other countries. All other trademarks<br />

c<strong>on</strong>tained herein are property of their respective owners.<br />

03/09<br />

<str<strong>on</strong>g>Proofpoint</str<strong>on</strong>g>, Inc. 892 Ross Drive Sunnyvale, CA 94089 USA www.proofpoint.com 1 408 517 4710

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!