January 28, 2015 7:32 AM ET

Software

Company Overview of Proofpoint, Inc.

Company Overview

Proofpoint, Inc. provides threat protection, regulatory compliance, archiving and governance, and secure communication solutions worldwide. The company’s integrated suite of on-demand security-as-a-service solutions enable large and mid-sized organizations to defend, protect, archive, and govern their sensitive data. Its security-as-a-service platform includes Proofpoint Enterprise Protection, a communications and collaboration security suite designed to protect customers' mission-critical messaging infrastructure from outside threats, including spam, phishing, unpredictable email volumes, malware, and other forms of objectionable or dangerous content before they reach the enterprise; and Pr...

892 Ross Drive

Sunnyvale, CA 94089

United States

Founded in 2002

680 Employees

Phone:

408-517-4710

Fax:

408-517-4711

Key Executives for Proofpoint, Inc.

Chief Executive Officer and Director
Age: 52
Total Annual Compensation: $441.3K
Chief Financial Officer and Principal Accounting Officer
Age: 50
Total Annual Compensation: $336.3K
Executive Vice President of Worldwide Sales
Age: 48
Total Annual Compensation: $238.3K
Compensation as of Fiscal Year 2013.

Proofpoint, Inc. Key Developments

Proofpoint, Inc. Announces Several Enhancements to the Proofpoint Portfolio

Proofpoint, Inc. announced the release of several enhancements to the Proofpoint portfolio of security solutions for blocking email-borne attacks, detecting new advanced threats, automating incident response, and reducing the impact of potential breaches. Built based on insight from cybersecurity professionals, the Proofpoint Enterprise Protection Suite, Proofpoint Targeted Attack Protection, Proofpoint Threat Response and Proofpoint Content Control solutions feature updates that address shortcomings of traditional security solutions. Advanced threats are increasingly bypassing legacy defenses and overwhelming incident response teams. Email is the top route for attackers --and it continues to be a critical business service. The Proofpoint security suite solutions detect and manage advanced email-borne threats, provide security for sensitive data, and accelerate the identification and containment of new threats. Top enhancements include: boldStopping more advanced threats: Delivered through the cloud-based Proofpoint Enterprise Protection Suite 8.0, organizations of all sizes have access to inbound and outbound email security. This suite accurately classifies and blocks threats, while leveraging phishing detection, anti-spam and antivirus technologies. Critical new capabilities include the addition of business continuity functionality to ensure uninterrupted secure email access in the event of a disaster or security breach. boldDetecting advanced threats faster with actionable intelligence:Proofpoint Targeted Attack Protection detects phishing and web compromise attacks and provides organizations with actionable intelligence to quickly respond. Backed by continuous big data analysis of billions of data points, Proofpoint provides detailed information into campaign type, targeted users and potentially infected systems. Armed with this information, organizations can identify and manage new threats before they lead to data breaches and destructive compromises. boldAutomating incident response, accelerating threat remediation: Proofpoint Threat Response provides users with an open, extensible platform that automates incident response and the incident management lifecycle. Improving security alert response time from hours to seconds, ProofpointThreat Response delivers consistent information to users and streamlines collaboration and workflow. Alerts are automatically integrated across multiple security solutions such as those from Proofpoint, FireEye, Palo Alto Networks and Splunk. This solution enables users to investigate, verify, prioritize and contain today's advanced threats. boldReducing the impact of data breaches caused by advanced threats: The easy-to-deploy, user-friendly Proofpoint Content Control 2.0 solution delivers enhanced visibility and control over sensitive content. Through contextual data intelligence, privacy and security teams can effectively identify and manage information with PCI, HIPAA and FINRA regulated content and other high value information. Violations can be quarantined, copied or deleted to reduce the attack surface and potential impact of a data breach.

Proofpoint, Inc. Releases Enterprise Protection Suite 8.0

Proofpoint, Inc. announced the release of the new Proofpoint Enterprise Protection Suite 8.0, featuring advancements in data protection, reliability and single sign-on capabilities. The company's email security technology processes and models hundreds of millions of email messages per day to ensure organizations have the cloud-based email security threat classification and management solution. Proofpoint Enterprise Protection Suite 8.0 delivers inbound and outbound email security through an innovative cloud-based platform. By accurately classifying and blocking threats, leveraging phishing detection, anti-spam and antivirus technologies, Proofpoint answers security needs. New Proofpoint Enterprise Protection advancements include: Email continuity to ensure transparent, uninterrupted access: Proofpoint email continuity functionality ensures that if an organization's primary mail server fails or experiences an outage, users can still send and receive messages via a Proofpoint-hosted Webmail portal, as well as access previously received messages; Secure messaging with S/MIME, protecting sensitive data in motion: Proofpoint encryption customers have access to robust messaging with secure multi-purpose internet mail extensions (S/MIME), adding an important layer to existing security infrastructure. Both gateway-to-gateway and gateway-to-user encryption is supported; Single sign-on with SAML, streamlining user access and amplifying security: Enhanced single sign-on makes it easy for security administrators to use their corporate credentials to connect to Proofpoint services within their existing authentication infrastructure. This Proofpoint functionality is supported through security assertion markup language (SAML) 2.0 for both the admin console as well as end user services such as EU Web and Secure Share; and Full-featured, commercial-grade Sendmail MTA: Proofpoint Enterprise Protection Suite is now fully integrated, at an API and UI level, with the commercial-grade Sendmail message transfer agent (MTA), providing organizations with superior performance, control and security. Featuring advanced policy routing, the Sendmail integration enables security teams to fine-tune email routing to ensure mission-critical email data and service delivery. Proofpoint Enterprise Protection Suite meets the needs of every enterprise deployment strategy -- cloud-based, hybrid on-demand and on-premises installations.

Proofpoint, Inc. Announces Enhancements to Proofpoint Threat Response

Proofpoint, Inc. announced significant enhancements to Proofpoint Threat Response to accelerate the automatic identification and remediation of security threats -- dropping security alert response time from hours to seconds. For the first time, organizations worldwide have access to incident management lifecycle technology that can automatically integrate alerts across multiple security solutions such as Proofpoint, FireEye, Palo Alto Networks and Splunk to investigate, verify, prioritize and contain today's advanced threats. Proofpoint Threat Response upgrades address several dangerous trends threatening organizations. According to a recent SANS Institute report, more than 90% of incidents took over an hour to contain after discovery. With thousands of alerts to decipher, the result is an overloaded incident response team in constant crisis. Many teams are still using a manual incident response process, which is prone to human error and highly variable, making it difficult to justify increased security tools and staff. Proofpoint Threat Response first platform to automate the incident management lifecycle while delivering consistent information to users and streamlining collaboration and workflow. Three areas of enhancements include: boldIOC confidence scores: Threat Response's indicators of compromise (IOC) confidence scores let security teams know instantly whether or not a user is infected based on data collected from endpoints and detection sandbox reports. boldEnhanced event data and automatic visualization: Threat Response enhanced event data provides users with consistent information and automatically prioritizes security incidents that require action. Users have access to attacker details, including threat type, sandbox analysis results, reputation data and visibility into attacker targets and information by group, department, location and more. boldAdvanced reporting: Threat Response advanced reporting delivers a performance snapshot that details the time it takes IT security teams to review, assign and close cases. This insight allows management teams to streamline workflow and accelerate decision-making.

Similar Private Companies By Industry

Company Name Region
Telos.com, Inc United States
Feith Systems and Software, Inc. United States
SHAFI Inc. United States
Laser App Software Inc. United States
KDebug, LLC United States

Recent Private Companies Transactions

Type
Date
Target
Merger/Acquisition
October 23, 2014
Nexgate Corporation
Merger/Acquisition
May 20, 2014
NetCitadel, Inc.
 

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup

Most Searched Private Companies

Company Name Geographic Region
NYC2012, Inc. United States
Lawyers Committee for Civil Rights Under Law United States
Bertelsmann AG Europe
Rush University United States
Greater Houston Partnership United States

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact Proofpoint, Inc., please visit www.proofpoint.com. Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at bwwebmaster@businessweek.com.