SlideShare a Scribd company logo
1 of 2
Download to read offline
Our customers, our success
50+% of the global Fortune 100 are customers and 28% of the Fortune 1000
By the
numbers
•	 Strong renewal rate, over 90%.
•	 50 consecutive quarters of growth. Last year our revenue increased 36% year-over-year, to $265.4 million.
•	 A number of our largest customers use our platform to protect more than 1 million users and handle more than
1 billion messages per day.
•	 We protected more than 100 million email boxes, protected 200 million social media accounts and executed 5.6
million TAP scans last year.
•	 International is a big focus for us. 17% of Proofpoint revenue is international. Thirteen countries worldwide and
six data centers across three global regions. Office locations include Australia, Canada, France, Germany, Japan,
Mexico, Taiwan, the United Kingdom and the United States of America.
•	 1,200+ employees worldwide, award-winning customer support team.
•	 95% satisfaction rating secured on most recent Proofpoint customer survey. 44% of customers use multiple products.
•	 Nearly 25% of annual revenues are reinvested back into R&D, one of the highest in the industry.
•	 Proofpoint’s cloud-based solutions have the proven ability to deploy to any scale without issue. Recently our
security solutions were deployed to a 360,000 user global organization in a roughly 48-hour period without incident.
Top 5 U.S.
banks
4 of the top 5 global
pharmaceutical companies
3 of the top 5
U.S. retailers
2 of the top 5 U.S.
oil companies
Third-party Validation
•	 A leader in Gartner’s Magic Quadrant: seven consecutive years for Secure Email Gateways and four consecutive
years for Enterprise Information Archiving.
•	 IDC ranks Proofpoint as the second-largest SaaS-messaging security provider in the world and the fourth-largest
messaging security vendor in the world.
•	 Recognized with accolades from many top third-party organizations, including Deloitte, Gartner, Forrester and
SC Magazine.
•	 World-class partners ecosystem includes Palo Alto Network, Intel (McAfee) Security, Ingram Micro, AT&T, Fijitsu,
Optiv, Swisscom and CDW.
Superior Cybersecurity Protection
•	 Each day, we protect customers from advanced threats in more than 600 million emails, hundreds of millions of
social media posts and, and across 150 million malware samples.
•	 Our global intelligence extends to more than 300 billion data points and monitors more than 7 billion unique URLs
every day.
•	 Proofpoint detected and stopped more than 10 million ransomware-infected emails in just one day. We discovered
the cybercrime kingpins behind the highly-circulated banking Trojan Dridex were distributing a new form of
ransomware called Locky.
•	 Proofpoint has a proven ability to stop more than 99% of attachment-based email attacks including banking Trojans
like Dridex, Dyre and Shifu, ransomware like Cryptowall and Locky, and more highly targeted attack campaigns.
•	 More than 5 million apps on iOS and Android scanned to protect against malicious apps and dangerous apps that
take company and personal data. 40% of our enterprise customers found users that are downloading apps onto
their iPhones from rogue app stores. These apps are tampered with, and many contain malicious code.
•	 Proofpoint protects more than 3,800 social media accounts for some of the world’s largest global brands, including
General Mills, Wells Fargo, Netflix, The Golden State Warriors, ING and Citrix.
About Proofpoint
Proofpoint Inc. (NASDAQ:PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive
threat protection, incident response, secure communications, social media security, compliance, archiving and governance. Organizations around the
world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system. Proofpoint protects against phishing, malware and
spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information. More
information is available at www.proofpoint.com.
© Proofpoint, Inc., 2016. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein
are property of their respective owners.

More Related Content

Similar to Our Customers, Our Success: Fortune 100 Rely on Proofpoint

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Ransomware Mitigation Strategies
Ransomware Mitigation StrategiesRansomware Mitigation Strategies
Ransomware Mitigation StrategiesLANDESK
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011Atlantic Security Conference
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 

Similar to Our Customers, Our Success: Fortune 100 Rely on Proofpoint (20)

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Ransomware Mitigation Strategies
Ransomware Mitigation StrategiesRansomware Mitigation Strategies
Ransomware Mitigation Strategies
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
MMRS Panel Book B2B
MMRS Panel Book B2BMMRS Panel Book B2B
MMRS Panel Book B2B
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
הדרך להצלחה
הדרך להצלחההדרך להצלחה
הדרך להצלחה
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Big data Journalists: influence & interest
Big data Journalists: influence & interestBig data Journalists: influence & interest
Big data Journalists: influence & interest
 

Our Customers, Our Success: Fortune 100 Rely on Proofpoint

  • 1. Our customers, our success 50+% of the global Fortune 100 are customers and 28% of the Fortune 1000 By the numbers • Strong renewal rate, over 90%. • 50 consecutive quarters of growth. Last year our revenue increased 36% year-over-year, to $265.4 million. • A number of our largest customers use our platform to protect more than 1 million users and handle more than 1 billion messages per day. • We protected more than 100 million email boxes, protected 200 million social media accounts and executed 5.6 million TAP scans last year. • International is a big focus for us. 17% of Proofpoint revenue is international. Thirteen countries worldwide and six data centers across three global regions. Office locations include Australia, Canada, France, Germany, Japan, Mexico, Taiwan, the United Kingdom and the United States of America. • 1,200+ employees worldwide, award-winning customer support team. • 95% satisfaction rating secured on most recent Proofpoint customer survey. 44% of customers use multiple products. • Nearly 25% of annual revenues are reinvested back into R&D, one of the highest in the industry. • Proofpoint’s cloud-based solutions have the proven ability to deploy to any scale without issue. Recently our security solutions were deployed to a 360,000 user global organization in a roughly 48-hour period without incident. Top 5 U.S. banks 4 of the top 5 global pharmaceutical companies 3 of the top 5 U.S. retailers 2 of the top 5 U.S. oil companies
  • 2. Third-party Validation • A leader in Gartner’s Magic Quadrant: seven consecutive years for Secure Email Gateways and four consecutive years for Enterprise Information Archiving. • IDC ranks Proofpoint as the second-largest SaaS-messaging security provider in the world and the fourth-largest messaging security vendor in the world. • Recognized with accolades from many top third-party organizations, including Deloitte, Gartner, Forrester and SC Magazine. • World-class partners ecosystem includes Palo Alto Network, Intel (McAfee) Security, Ingram Micro, AT&T, Fijitsu, Optiv, Swisscom and CDW. Superior Cybersecurity Protection • Each day, we protect customers from advanced threats in more than 600 million emails, hundreds of millions of social media posts and, and across 150 million malware samples. • Our global intelligence extends to more than 300 billion data points and monitors more than 7 billion unique URLs every day. • Proofpoint detected and stopped more than 10 million ransomware-infected emails in just one day. We discovered the cybercrime kingpins behind the highly-circulated banking Trojan Dridex were distributing a new form of ransomware called Locky. • Proofpoint has a proven ability to stop more than 99% of attachment-based email attacks including banking Trojans like Dridex, Dyre and Shifu, ransomware like Cryptowall and Locky, and more highly targeted attack campaigns. • More than 5 million apps on iOS and Android scanned to protect against malicious apps and dangerous apps that take company and personal data. 40% of our enterprise customers found users that are downloading apps onto their iPhones from rogue app stores. These apps are tampered with, and many contain malicious code. • Proofpoint protects more than 3,800 social media accounts for some of the world’s largest global brands, including General Mills, Wells Fargo, Netflix, The Golden State Warriors, ING and Citrix. About Proofpoint Proofpoint Inc. (NASDAQ:PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system. Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information. More information is available at www.proofpoint.com. © Proofpoint, Inc., 2016. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.