Institucional proofpoint

2,527 views

Published on

Published in: Technology

Institucional proofpoint

  1. 1. Proofpoint Email SolutionsProofpoint, Inc. Proprietary and Confidential ©2011 1
  2. 2. Agenda Proofpoint Overview Proofpoint Solution Proofpoint Architecture Soluções Demo Q&AProofpoint, Inc. Proprietary and Confidential ©2011 2
  3. 3. Proofpoint OverviewProofpoint, Inc. Proprietary and Confidential ©2011 3
  4. 4. Proofpoint: Cloud-Enabled Email Solutions 4000 Leading email security, compliance &Customers archiving solutions for complex organizations Enterprise-class protection for lowest email risk & cost-of-ownership Industry leadership Leaders Quadrant, Fastest Growing Best Buy Most Visionary Messaging Security (2009) (2008 & 2010) (2008)Proofpoint, Inc. Proprietary and Confidential ©2011 4
  5. 5. Robust Partner Ecosystem Partnerships SaaS Security maximize value Resellers to customers Archiving OEMs Appliance OEM Strategic Partnerships Value Added Resellers/DistributorsProofpoint, Inc. Proprietary and Confidential ©2011 5
  6. 6. Gartner Positions Proofpoint in the Leaders Quadrant 2011 Magic Quadrant for Secure Email Gateways Gartner positions Proofpoint in the Leaders Quadrant Evaluation based on Completeness of Vision and Ability to Execute Magic Quadrant for Secure Email Gateways by Peter Firstbrook and Eric Ouellet Gartner, Inc., August 10, 2011 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available from Proofpoint upon request. Read the full report: www.proofpoint.com/magicquadrantProofpoint, Inc. Proprietary and Confidential ©2011 6
  7. 7. Proofpoint: Protegendo Empresas na America LatinaProofpoint, Inc. Proprietary and Confidential ©2011 7
  8. 8. Caso de Sucesso: Banco do Brasil Segmento Financeiro – 80.000 users – 40 milhões de e-mails/ mês Solução Anterior: McAfee – Não suportava o volume de e-mails – Configurações sem granularidade – Interface sem gerenciamento centralizado – Não há controle para usuário final Proofpoint – Redução de custos – número de appliances requeridos – Digest para usuário final – Gerenciamento centralizado, configuração granular e escalabilidadeProofpoint, Inc. Proprietary and Confidential ©2011 8
  9. 9. Caso de Sucesso: Camed Segmento Insurance Company – Solução Anterior: Mcafee Requerimentos do Cliente – Anti-spam / anti-virus: alta acuracidade e baixo número de falso positivo – Escalabilidade – Flexibilidade Proofpoint – Ambiente Virtual – VMWare – Resultado imediato no POC – Interface amigável – Alta disponibilidadeProofpoint, Inc. Proprietary and Confidential ©2011 9
  10. 10. Case de Sucesso: Camed “Tivemos um impacto financeiro relevante, referente ao resgate de tempo gasto com improdutividade oriunda de e-mails indesejados e incompativeis com o nosso negócio. O levantamento estatístico apontou que recuperamos a média de 20 horas mensais do nosso tempo. Além desse impacto financeiro e produtivo, aumentamos o nível de segurança da nossa rede, a confiança dos usuários, e reduzimos uma demanda interna de nossos especialistas de correio e helpdesk.” Jose Leite, CamedProofpoint, Inc. Proprietary and Confidential ©2011 10
  11. 11. Proofpoint SolutionProofpoint, Inc. Proprietary and Confidential ©2011 11
  12. 12. Email Today: More than Just the Mail Server Mail ServersProofpoint, Inc. Proprietary and Confidential ©2011 12
  13. 13. Email Today: Soaring Costs and Complexity Content Data Loss Anti-spam Anti-virus Filtering Prevention Encryption Mail Server Disaster Routing MTAs Anti-Virus Recovery Mobility (BES) Mail Servers Archiving eDiscovery ComplianceProofpoint, Inc. Proprietary and Confidential ©2011 13
  14. 14. Email Today: Soaring Costs and Complexity Mail Servers $50- $100 Routing MTAs $0 - $20 Anti-spam Content Data Loss $10 - $20 Anti-spam Anti-virus Filtering Prevention Encryption Anti-virus $2 - $4 Content Filtering $0 - $30 Data Loss Prevention $10 - $20 Encryption Mail Server $10 - $15 Disaster Routing MTAs (BES) Anti-Virus Recovery Mobility (BES) Mobility $5 - $10 Mail Server Anti-Virus $0 - $5 Disaster Recovery $0 - $25 Archiving Mail Servers $0 - $80 Compliance $0 - $30 eDiscovery $0 - $20 Archiving TOTAL eDiscovery $87 - $259 ComplianceProofpoint, Inc. Proprietary and Confidential ©2011 14
  15. 15. Our Vision: Cloud-based Email Suite Mail Servers $50- $100 Routing MTAs $0 - $20 Anti-spam $10 - $20 Benefits Email Threat Anti-virus $2 - $4 Protection Simple Content Filtering Content Filtering $0 - $30 Lowest TCO Data Loss Data Loss Prevention • 30-50% savings typical Email and $10Prevention - $20 CompatibleEncryption Encryption Collaboration - $15 $10 Support for regulated Secure Archiving and Mobility (BES) $5 - $10 industries Communication eDiscovery Mail Server Anti-Virus $0 - $ 5 All capabilities available Disaster Recovery $0 - $25 Archiving $0 - $80 Compliance $0 - $30 eDiscovery eDiscovery $0 - $20 TOTAL $87 - $259Proofpoint, Inc. Proprietary and Confidential ©2011 15
  16. 16. Enterprise-class Cloud-enabled Email Suite Email Threat Data Loss Protection Prevention Protect the Ensure external infrastructure requirements and from outside threats internal policies Email Threat are met Protection Email and Collaboration Loss Data Email and Prevention Complete platform for Collaboration business email, Archiving and Secure collaboration and calendaring eDiscovery CommunicationSecure Archiving andCommunication eDiscoveryEncrypt emails Enable search,and send large eDiscovery, storageattachments securely management and complianceProofpoint, Inc. Proprietary and Confidential ©2011 16
  17. 17. Proofpoint Solutions Consolidation of Mail Devices AV/AS AV/AS DLP Internet Exchange Server DLP + Encryption EncryptionProofpoint, Inc. Proprietary and Confidential ©2011 18
  18. 18. Introducing Proofpoint Mobile Suite of mobile apps for the enterprise Enhance Productivity For Mobile Users • Empower the employee & admin and boost productivity by providing access from anywhere Controlled, Secure and Compliant Access • Empower users with controlled mobile access to Proofpoint cloud services Compatible with the Enterprise • Provides an organization with maximum flexibility in device deployment, supporting key mobile platformsProofpoint, Inc. Proprietary and Confidential ©2011 19
  19. 19. Proofpoint ArchitectureProofpoint, Inc. Proprietary and Confidential ©2011 20
  20. 20. Security and Compliance Platform in the Cloud Bringing “web scale” architecture to the enterprise • Designed for the largest of enterprises • Operates at the highest levels of performance, scalability, reliability • Leverages cloud cost model for the lowest TCO Real-time intelligence from community delivers rapid response and enhanced protection • Delivers insights, automatically triggers action for enhanced monitoring and security • Real-time processing of Big Data (thousands of data points) for rapid turnaround and action Extensible platform FISMA Sarbanes Oxley • Cloud services enable rapid development of new applications quickly to quickly meet customer’s security and compliance needs • New apps through Proofpoint Connect API, which enable ecosystem of partners • Integrates into existing private, public cloudsProofpoint, Inc. Proprietary and Confidential ©2011 21
  21. 21. Benchmarking Your Cloud-based Security Reliability  99.999% service availability  99% spam Accuracy effectiveness  100% virus control  < 1 in 350,000 false positives  Sub-minute email Speed latency  20 second archive search resultsProofpoint, Inc. Proprietary and Confidential ©2011 22
  22. 22. SaaS Architecture Advantages Requirement Proofpoint Resilience Multi-datacenter processing across all applications Security Encryption of data at rest Isolation No co-mingling of data Integration Tied to corporate directory Unique storage grid leveraging inexpensive storage Cost Multi-customer cost leverage for load processing Delivering complete control and SaaS without compromiseProofpoint, Inc. Proprietary and Confidential ©2011 23
  23. 23. Enterprise-class Cloud Infrastructure Worldwide Data Center Coverage Worldwide Datacenter CoverageProofpoint, Inc. Proprietary and Confidential ©2011 25
  24. 24. SoluçõesProofpoint, Inc. Proprietary and Confidential ©2011 27
  25. 25. Soluções Enterprise Protection • Resumo: Garantir a segurança do e-mail corporativo na entrada e saída. • Uso: AS, AV, disclaimer, limite de tamanho de arquivo, exclusão de vídeo, etc. Enterprise Privacy • Resumo: Prevenir contra perda de informação principalmente na saída do e-mail corporativo. • Uso: Cartão de Crédito, CPF, Histórico médico, Informes financeiros, etc. Enterprise Archive • Resumo: Armazenamento, indexação e busca de e-mails de uma forma segura, rápida e eficiente. • Uso: Acabar com o gerenciamento de arquivos PSTs e manutenção do crescimento das caixas de e-mail. Secure File Transfer • Resumo: Transferir arquivos (geralmente grandes) de forma rápida e segura. • Uso: Transferências de imagens médicas, plantas para construção civíl, etc.Proofpoint, Inc. Proprietary and Confidential ©2011 28
  26. 26. Proofpoint Product Family Proofpoint Products Proofpoint Protection Server Modules Proofpoint Protection • Proofpoint Dynamic Reputation • Proofpoint Spam Detection • Proofpoint Virus Protection Proofpoint on Proofpoint Protection • Proofpoint Zero-Hour Anti-Virus Demand™ Server Proofpoint Privacy • Proofpoint Regulatory Compliance • Proofpoint Digital Asset Security • Proofpoint Encryption Infrastructure & Optimization • Proofpoint Smart Search Proofpoint Email Proofpoint Archiving Secure File TransferProofpoint, Inc. Proprietary and Confidential ©2011 29
  27. 27. Enterprise Protection E-mail Firewall AntiSpam • Proofpoint Dynamic Reputation (PDR) • Proofpoint Spam Detection AntiVírus • Proofpoint Virus Protection Module (F-Secure ou McAfee) • Proofpoint Zero-hour AntiVírus Module Recipient Verification (integração LDAP, AD, etc) SMTP Rate ControlProofpoint, Inc. Proprietary and Confidential ©2011 30
  28. 28. Enterprise Privacy Data Loss Prevention (DLP) • Regulatory Compliance • Digital Asset Security (DAS) Encriptação (Criptografia) de E-mails • Proofpoint Encryption (PE) Smart Send Immediate Notification Message temporarily heldProofpoint, Inc. Proprietary and Confidential ©2011 31
  29. 29. Regulatory Compliance Detect structured data in your email stream Regulatory Compliance conditions • Dictionaries • Smart Identifiers • Proximity (combine dictionaries with smart identifiers)Proofpoint, Inc. Proprietary and Confidential ©2011 32
  30. 30. Digital Asset Security Goal of the Digital Asset Security module is to stop intellectual property from leaving the organization Proprietary and Confid Features • Identifies portions of documents • Links to file shares, web servers, content management systems • Automatic time out of documents • Business users maintain content • Email and administrator upload Upload Email also available • Signature based database File systems DBsProofpoint, Inc. Proprietary and Confidential ©2011 33
  31. 31. Proofpoint Encryption No keys to manage • Keys managed and secured by Proofpoint Key Service • All recipient interaction (encryption, authentication, decryption) is through customer system Message Control • Expire messages by policy • Revoke keys for specific messages • Revoke keys for specific users Proofpoint Technology Policy-Based Encryption 11 Patents • Ensure sensitive information is 2 Patent Applications in encrypted ProcessProofpoint, Inc. Proprietary and Confidential ©2011 34
  32. 32. Enterprise Archive – Addressing eDiscovery, Compliance, Email Management Needs Centralize Data Enforce Policy Expedite Discovery Regulatory compliant storage Flexible Policy Engine to Real-time search to enable that can’t be tampered with comply with evolving quick insights Utilizes patented DoubleBlind requirements Unique search performance Encryption for complete Preserve data without guarantee via SLA security/privacy dependency on end-user Improved legal & investigative Cloud-based grid architecture Provides full audit trail to team self-service to scale without hardware ensure process defensibility Quickly export data to PSTs investment or EDRM XMLProofpoint, Inc. Proprietary and Confidential ©2011 35
  33. 33. Archiving Must Address User Access & Storage Management Challenges Fast Information Access • Provide immediate access to data – and consistently as data volumes grow • Reduce volume of unmanageable PST files • On-demand litigation & investigative needs Familiar End User Experience • Provide intuitive tools that fit existing work habits Management of Email As a Business Asset • Provide enterprise-class security and privacy protection Cost Effectively Managing Exchange Growth • Reduce TCO and infrastructure management hasslesProofpoint, Inc. Proprietary and Confidential ©2011 36
  34. 34. Enterprise Archive Exchange journaling records a copy of all your email Search results are returned to the appliance, decrypted Proofpoint and presented to the DoubleBlind end user in real time Encryption: The Proofpoint appliance retrieves, encrypts and securely transmits your data to the Proofpoint The Most Secure network Archive In the When an end user conducts a search, Industry the search request is encryptedProofpoint, Inc. Proprietary and Confidential ©2011 37
  35. 35. How Stubbing Works Seamless, Native Data Access Replaces attachment with pointer to file in archive Enables flexibility within email quotas – without PST growth Dramatically impacts Exchange growth and performanceProofpoint, Inc. Proprietary and Confidential ©2011 38
  36. 36. Significant TCO Advantage Over On- Premises Products Year 1 Costs 4 Year Costs $900,000 $2,500,000 $800,000 $2,000,000 $700,000 $600,000 $1,500,000 $500,000 Software Licensing Costs Software Licensing Costs Hardware Costs Hardware Costs $400,000 One-time Costs One-time Costs $1,000,000 Operational Expenses Operational Expenses $300,000 $200,000 $500,000 $100,000 $0 $0 On-Prem SaaS On-Prem SaaS Total Cost of Ownership (TCO) Summary by Category Year 1 4-Year Totals On-Prem SaaS % Savings On-Prem SaaS % Savings Software Licensing Costs $253,200 $230,000 9% $425,927 $991,329 -133% Hardware Costs $315,000 $31,960 90% $802,652 $63,920 92% One-time Costs $80,000 $4,000 95% $155,000 $8,000 95% Operational Expenses $178,750 $19,588 89% $734,538 $78,352 89% Total Costs $826,950 $285,548 65% $2,118,116 $1,141,601 46% Usual Implementation Time 90 days 5 daysProofpoint, Inc. Proprietary and Confidential ©2011 39
  37. 37. Reduce Messaging Challenges While Enhancing User Productivity Challenges Key Archive Features Users demand immediate Fast information access access to information backed by Search SLA Managing mailbox and Stubbing to reduce PST growth mailbox size with familiar user experience Trade off: more to manage vs. less Hybrid Architecture for functionality performance and TCO Security & Privacy issues DoubleBlind EncryptionTM and secure AD integrationProofpoint, Inc. Proprietary and Confidential ©2011 40
  38. 38. Proofpoint Secure File Transfer™ Ad-hoc Secure Transfer of Files Recipient Eases Management of File Attachments • Reduces email storage Email with secure link requirements • Avoids blocked messages and Attachment stripped attachments Enables Security and Compliance • Provides tracking and reporting • Eliminates use of non-secure Email with large attachment workarounds like IM, P2P Eliminates Frustrations with FTP • Intuitive interfaces, designed with 41 end-users in mindProofpoint, Inc. Proprietary and Confidential ©2011
  39. 39. EDN Capabilities  Web app to manage email, events, contacts and user preferences Mail  Standards-based (AJAX, iCalendar, SSL/TLS, SMTP, IMAP, LDAP)  Email, folders: email rules stay synced with desktop & mobile apps.  Online “virtual USB flash drive” for storing and sending files File Storage  Seamlessly integrated with one_mail web app  Keeps email, events, contacts in sync with EAS-compatible devices Mobile  Supports iPhone, Android, BlackBerry (with Astra Sync), Windows Mobile, and webOS  MAPI connector for Outlook 2003 and 2007, Outlook and web Outlook Sync calendars in sync  Enables shared calendaring, group scheduling for Outlook users  Administrative backup of all users’ sent and received email Mailbox  Search for and restore messages directly back to user account RetentionProofpoint, Inc. Proprietary and Confidential ©2011 42
  40. 40. Multitenant SaaS Email Desktop Web Browser MobileProofpoint, Inc. Proprietary and Confidential ©2011 43
  41. 41. EDN Packages Pr o 10 1 Pr o 31 0 F o r B asi c Web F o r Adv ced W an eb W rk s o er W r k s o r Mi n m o er i al Outlo o k User s • 1GB m lb xes 0 ai o • All f eatur es o f Pr o 10 plus: 1, • I MAP, POP, W access eb • Outlo o k an Mo b le sy n d i c • An - v r us an An - spam ti i d ti • Mai lb x r eten o n w/ 1 m s. o ti 2- o • Mai lb x r eten o n w/ 7- day r eten o n o ti ti r eten o n ti • On n f i le sto r age, f i le sh i n li e ar g • On n f i le sto r age, f i le sh i n li e ar g ( 1MB ) 0 ( 5GB ) • S i lver lev suppo r t el • Plati n lev suppo r t um elProofpoint, Inc. Proprietary and Confidential ©2011 44
  42. 42. Proofpoint, Inc. Proprietary and Confidential ©2011 45
  43. 43. Proofpoint, Inc. Proprietary and Confidential ©2011 46
  44. 44. Proofpoint, Inc. Proprietary and Confidential ©2011 47
  45. 45. Proofpoint, Inc. Proprietary and Confidential ©2011 48
  46. 46. DemoProofpoint, Inc. Proprietary and Confidential ©2011 49
  47. 47. Questions?Proofpoint, Inc. Proprietary and Confidential ©2011 50
  48. 48. Recent Customer Momentum: Email Security John Deere (55,000 users) • SaaS Inbound Security, Cisco competitive win Skywest Airlines (3,200 users) • SaaS Inbound, Postini Takeout Pearson (100,000 users) • SaaS Inbound, Postini Takeout Sanofi Aventis (100,000 users) • Ciphertrust/Trend Takeout Apple (3,000,000+ users) • Inbound Security for Mobile Me serviceProofpoint, Inc. Proprietary and Confidential ©2011 51
  49. 49. Recent Customer Momentum: Email Security (cont’d) Rent-A-Center (6,000 users) • SaaS Inbound & Outbound, Postini Takeout Lockheed Martin (100,000 users) • Cisco competitive win Turner Broadcasting (65,000 users) • Cisco takeout, SNWL takeoutProofpoint, Inc. Proprietary and Confidential ©2011 52
  50. 50. Recent Customer Momentum: DLP, Encryption Blue Cross/Blue Shield – South Carolina (6500 users) • SaaS inbound and outbound solution Foster Wheeler (6,500 users) • SaaS inbound and outbound solution PNC Bank (27,500 users) • DLP and Encryption TJX (5,500+ users) • PCI Compliance and Encryption – all SaaS Mastercard (8,000 users) • EncryptionProofpoint, Inc. Proprietary and Confidential ©2011 53
  51. 51. Recent Customer Momentum: Archiving Genworth Financial (10,000 users) • Compliance-driven archiving Glaxo Smith-Kline (58,000 users, 100 terabytes) • Microsoft’s largest Hosted Exchange customer Christus Health (30,000 users) • All products, SaaS Home Depot (10,000 users) Royal Mail Group (30,000 users) Weatherford (29,000 users) AON (28,000 users) • Started with 30TB importProofpoint, Inc. Proprietary and Confidential ©2011 54
  52. 52. Proofpoint SaaS & Hybrid Customers Financial Retail Services Health Care Education International Entertainment Manufacturing Technology Public SectorProofpoint, Inc. Proprietary and Confidential ©2011 55
  53. 53. AppendixProofpoint, Inc. Proprietary and Confidential ©2011 56
  54. 54. Proofpoint Mobile Encryption Finally…. Easy, seamless decryption on mobile devices! • Decrypt Assist enables any recipient to decrypt email without apps to install • Overlays temporary mobile pull technology on push infrastructure Easy encryption for Blackberry users • Plug-in enables Blackberry users to encrypt messages from device Proofpoint Encryption Proofpoint Connect Appliance / Private Cloud Infrastructure Proofpoint Encryption Public Cloud InfrastructureProofpoint, Inc. Proprietary and Confidential ©2011 57
  55. 55. Proofpoint Mobile Archive Extends Proofpoint Archive to mobile users • Infinite inbox in your pocket! Provides seamless email search from iPhone • Across multi-year archive (per retention policy) • Quick deployment Proofpoint Connect Proofpoint Archive SaaS Proofpoint Archive Infrastructure ApplianceProofpoint, Inc. Proprietary and Confidential ©2011 58
  56. 56. Proofpoint Mobile Dashboard Instant access to vital security information • Security updates, such as global spam effectiveness • Customer’s cluster / deployment stats Easy management of support portal • Access to Customer Tracking System (CTS) tickets) Designed for admins and IT personnelProofpoint, Inc. Proprietary and Confidential ©2011 59

×