PFPT On Other Exchanges
Symbol
Exchange
Stuttgart
text size: T | T
Back to Snapshot
Company Description

Contact Info

892 Ross Drive

Sunnyvale, CA 94089

United States

Phone: 408-517-4710

Fax: 408-517-4711

reat information and Indicators of Compromise correlation, aggregating across Proofpoint and other third-party security products, to confirm and contain system compromises. Proofpoint Information Protection The company’s data loss prevention, encryption and compliance solution defends against leaks of confidential information, and helps ensure compliance with common U.S., international and industry-specific data protection regulations, including the Health Care Insurance Portability and Accountability Act of 1996 (HIPAA), the Gramm-Leach-Bliley Act, Canada's Personal Information Protection and Electronic Documents Act, as well as acts, such as CA SB 24, MA 201 CMR 17.00, ITAR, NERC-CIP, CFTC red flag rules, Basel II, EuroSOX (Directive 84/253/EEC), European Union Data Privacy Directive, and the Payment Card Industry Data Security Standard (PCI-DSS). Advanced Data Loss Prevention: The company’s advanced data loss prevention solution identifies regulated private content, corporate assets and confidential information before it leaves the organization via email, Web-based applications, or its Secure Share solution. Pre-packaged smart identifiers and dictionaries automatically and detect a range of regulated content, such as social security numbers, health records, credit card numbers, and driver's license numbers. In addition to regulated content, the company’s machine learning technology can identify confidential, organization-specific content and assets. Once identified and classified, sensitive data can be blocked, encrypted and transmitted or re-routed internally based on content and identity-aware policies. Flexible Remediation and Supervision: Content, identity and destination-aware policies enable remediation of potential data breaches or regulatory violations. Remediation options include stopping the transfer completely, automatically forcing data-encryption, or routing to a compliance supervisor or the end-user for disposition. The solution also provides reporting on potential violations and remediation using the company’s analytics capabilities. Policy-Based Encryption: Automatically encrypts regulated and other sensitive data before it leaves an organization's security perimeter without requiring cumbersome end-user key management. This enables authorized external recipients, whether or not they are the company’s customers, to decrypt and view content from most devices. Secure File Transfer: Provides secure, large file transfer capabilities that enables end-users to send large files while eliminating the impact of large attachments on an email infrastructure. Secure Share: Cloud-based security-focused solution designed to enable enterprise users to exchange large files with ease while staying compliant with enterprise data policies. Data Discover: Automated discovery and remediation solution that identifies sensitive content across the enterprise and enables corrective action; reduces risk of data breaches and compliance violations. Proofpoint Enterprise Archive Proofpoint Enterprise Archive is designed to ensure enforcement of data governance, data retention and supervision policies and mandates; litigation support through discovery; and active legal-hold management. Proofpoint Enterprise Archive can store, govern and discover a range of data, including email, instant message conversations, social media interactions, and other files throughout the enterprise. Secure Cloud Storage: With the company’s proprietary double blind encryption technology and the associated data storage architecture, all email messages, files and other content are encrypted with keys controlled by the customer before the data enters the Proofpoint Enterprise Archive. This ensures that even its employees and law-enforcement agencies cannot access a readable form of the customer data without authorized access by the customer to the encryption keys stored behind the customer's firewall. Search Performance: By employing parallel, big data search techniques, the company is able to deliver search performance measured in seconds, even when searching various terabytes of archived data. Traditional on-premise s

 

The information and data displayed in this profile are created and managed by Capital IQ, a Standard & Poor's company. Bloomberg.com does not create or control the content.

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup

PFPT Competitors

Market data is delayed at least 15 minutes.

Company Last Change
No competitor information is available for PFPT.
View Industry Companies
 

Industry Analysis

PFPT

Industry Average

Valuation PFPT Industry Range
Price/Earnings NM Not Meaningful
Price/Sales 10.1x
Price/Book 62.4x
Price/Cash Flow NM Not Meaningful
TEV/Sales 7.6x
 | 

Sponsored Financial Commentaries

Sponsored Links

Request Profile Update

Only a company representative may request an update for the company profile. Documentation will be required.

To contact PROOFPOINT INC, please visit www.proofpoint.com. Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at bwwebmaster@businessweek.com.