Log in
E-mail
Password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Settings
Settings
Dynamic quotes 
OFFON

PROOFPOINT, INC.

(PFPT)
  Report
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector news

Proofpoint : Announcing Proofpoint Information and Cloud Security Platform – Enabling DLP and SASE Use Cases

06/17/2021 | 02:48pm EDT

As the world continues to embrace work from anywhere and the adoption of cloud applications accelerates, people have become the new perimeter. To protect that perimeter from threats, data loss and compliance risk, your organization needs visibility into risky behavior by remote workers, such as:

  • Downloading sensitive data from IT-approved applications
  • Storing enterprise data on personal cloud storage
  • Using unapproved cloud applications, such as chat and conference apps
  • Browsing malicious or inappropriate content

Addressing these challenges requires in-line access controls and real-time data loss prevention (DLP) from the start. That's why we've rearchitected Proofpoint CASB Proxy and introduced Proofpoint Web Security-a cloud-native secure web gateway-at Proofpoint Protect 2021.

We built these proxy-based cloud security solutions on the cloud-native but mature Proofpoint Zero Trust Network Access (ZTNA) infrastructure. These solutions, combined with the Proofpoint Cloud App Security Broker (CASB), remote browser isolation, and Proofpoint ZTNA solutions, provide organizations a new Secure Access Service Edge (SASE) security architecture that can ensure access control with threat and data protection for users accessing internet sites, cloud services and private applications.

Proofpoint CASB Proxy for real-time controls for approved and tolerated cloud apps

You need a forward proxy to govern access to cloud apps from corporate devices and prevent sensitive data loss in the cloud. As files are uploaded and downloaded in the cloud, CASB Proxy monitors for sensitive data and enforces DLP policies. It also identifies and classifies regulated data, such as personal health information (PHI), personally identifiable information (PII) and payment card industry (PCI) data, as well as intellectual property and confidential documents (for example, source code or design, legal and engineering documents).

Together with Proofpoint SaaS Isolation, CASB Proxy provides granular access controls such as read-only access and real-time DLP for both approved and tolerated apps. SaaS Isolation secures users' access to cloud apps and data by isolating browser sessions in a secure container.

Using our proxy's contextual and people-centric policies, you can apply real-time data controls over cloud activity-and help prevent data loss and compliance violations. With the help of a lightweight endpoint agent, we forward user traffic to our cloud-native solution to block risky apps and provide access and data controls for approved and tolerated applications. CASB Proxy is an add-on to our CASB solution-an integral part of the Proofpoint Information and Cloud Security Platform.

When you start your cloud security journey, you can first deploy our CASB in API mode to gain in-depth visibility to cloud risks such as cloud account compromise, excessive file-sharing, and malicious or risky third-party OAuth (open authorization) apps. You can also use our cloud applications catalog and traffic auditing capabilities to assess shadow IT risks.

With a better understanding of people, application and data risks, you can enhance your CASB solution with real-time controls, including adaptive access and data controls for unmanaged devices and forward proxy and isolation-based controls for managed devices. And when you need to expand access controls, threat protection and DLP beyond cloud applications to all internet traffic, you can upgrade to Proofpoint Web Security.

Web security with the industry's best threat intelligence

As organizations continue to reimagine security for their hybrid workforce, they also need to reimagine their security stack. That includes the tools they need to secure internet traffic.

The old approach of having a web gateway-type of appliance in centralized data centers doesn't work in a world where users connect from everywhere and access company data located in various locations. A cloud-based security approach is critical to ensure users stay safe while browsing the web-and that attackers don't comprise an organization's critical data and assets.

Proofpoint Web Security provides controls and isolation when end users are accessing the web. Our solution is built on a global, highly elastic cloud framework that allows ultimate scalability for organizations regardless of their size or location. Web Security inspects all internet traffic, including encrypted traffic, to deliver access control to all users seamlessly. It provides acceptable use control to specific sites and visibility and control of web app usage to help with the issue of shadow IT.

To ensure the highest level of security for users as they're browsing the internet, Proofpoint Web Security integrates with our industry-leading threat intelligence-making it easier for an organization to block the most sophisticated, web-borne security threats.

Figure 1

Proofpoint Web Security goes beyond traditional web gateway functionality or just blocking or allowing access to sites. It has seamless integration with Proofpoint Browser Isolation. This integration allows organizations to send users to an isolated browser session when visiting certain categories of sites, such as unknown or personal sites (for example, email or medical).

While in isolation, the user can access the site. But if there are any threats on the site's pages, they're not allowed to leave isolation and impact the user. This integration helps dramatically lower the organization's attack surface. It also provides a better user experience and preserves the privacy of your people during personal browsing. Web Security and Browser Isolation are part of the Proofpoint Information and Cloud Security Platform.

A powerful platform with a unified console to 'rule them all'

Figure 2

The Proofpoint Information and Cloud Security Platform brings together Proofpoint Enterprise DLP, Proofpoint Insider Threat Management, CASB, ZTNA, Browser Isolation and Web Security. This powerful, cloud-native single platform aligns to the industry vision of SASE architecture, where organizations can apply secure access and threat protection as people access applications and data, no matter their location or device type.

Figure 3

Our platform delivers a unique people-centric approach to access governance for the internet, cloud services and private applications, and DLP across email, cloud apps, the web and endpoints. It combines:

  • A comprehensive suite of information protection and cloud security solutions
  • A unified administration and response console
  • Intelligent risk modeling
  • World-class threat, content and behavior detection
  • People-centric visibility and controls

Proofpoint Cloud Security unifies people-centric access controls and threat protection for users of internet, cloud and private applications within a global cloud-native platform. To enable adaptive and people-centric secure access across the enterprise, we combine:

  • Granular controls such as risk-based authentication, read-only access and micro-segmented application access
  • Rich, cross-vector threat intelligence on user risk
  • Advanced threat protection

With coverage across all DLP channels and a common data classification framework, Proofpoint Information Protection combines content, behavior and threat-based telemetry with sophisticated analytics. Security teams worldwide rely on Proofpoint to address the full spectrum of data loss scenarios across malicious, negligent and compromised users. Its unified alerts also help users better prioritize warnings, respond faster and achieve a shorter time to value.

Our unified admin and response console simplifies day-to-day security operations and accelerates response by combining advanced tools:

Policy management:
  • Manage all cloud and data access policies in a single console
  • Create sophisticated rules across multiple channels using a common data classification framework and advanced threat intelligence and detection
Incident and investigative workflow:
  • Collect threat, DLP and user-behavior alerts into a unified alert manager to get a holistic risk profile for the user
  • Investigate user behavior to determine intent and severity of risk
  • Manage alert status cross-functionally from discovery to resolution
Threat hunting and explorations:
  • Proactive hunting for new threats such as cloud account compromise, large data transfer to personal cloud storage, unsanctioned application use, and more
  • Build watch lists that organize and prioritize users by risk profile (executives, Very Attacked People™ (VAPs), privileged users, human resources staff, contractors, and others)
  • Powerful filter and search functionality to customize out-of-the-box explorations
Reporting and analytics:
  • Intuitive timeline-based views of user and data activity across multiple channels
  • Based on user intent, share reports of risky activities with business partners
  • Correlate multichannel activities and alerts with data from other security tools through seamless integration with security information and event management (SIEM), security, orchestration, automation and response (SOAR), and ticketing systems
Administration and data privacy controls:
  • Manage alerts and investigations cross-functionally with role-based access controls
  • Address data privacy concerns with granular, attribute-based access controls

Our platform is global, with the ability to store data locally to help you meet data compliance requirements.

Discover more

Learn more about the information and cloud security solutions from Proofpoint:

Disclaimer

Proofpoint Inc. published this content on 17 June 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 17 June 2021 18:47:01 UTC.


ę Publicnow 2021
All news about PROOFPOINT, INC.
07/23PROOFPOINT : Stockholders Approve Acquisition by Thoma Bravo (Form 8-K)
PU
07/23PROOFPOINT INC : Other Events, Financial Statements and Exhibits (form 8-K)
AQ
07/23PROOFPOINT : Shareholders Approve Buyout by Thoma Bravo
MT
07/23Proofpoint Stockholders Approve Acquisition by Thoma Bravo
GL
07/23THE SECRET TO YOUR (SUPERVISION) SUC : Rule Refinement
PU
07/22PROOFPOINT RANKED AS A LEADER IN FRO : Security Awareness Training Market, 2021
PU
07/21SYNNEX : to Distribute Proofpoint's Security, Compliance Software
MT
07/20PROOFPOINT : The Modern Approach to Endpoint Content Scanning
PU
07/19PROOFPOINT : New Threat Actor Uses Spanish Language Lures to Distribute Seldom O..
PU
07/16PROOFPOINT : Ransomware on the Rise — Key Trends and Tips You Need to Know
PU
More news
Financials (USD)
Sales 2021 1 212 M - -
Net income 2021 -169 M - -
Net cash 2021 269 M - -
P/E ratio 2021 -60,0x
Yield 2021 -
Capitalization 10 056 M 10 056 M -
EV / Sales 2021 8,08x
EV / Sales 2022 6,76x
Nbr of Employees 3 658
Free-Float 95,9%
Chart PROOFPOINT, INC.
Duration : Period :
Proofpoint, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends PROOFPOINT, INC.
Short TermMid-TermLong Term
TrendsBullishBullishBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus OUTPERFORM
Number of Analysts 16
Last Close Price 174,50 $
Average target price 171,64 $
Spread / Average Target -1,64%
EPS Revisions
Managers and Directors
Gary Leigh Steele Chairman & Chief Executive Officer
Paul R. Auvil Chief Financial & Accounting Officer
Marcel DePaolis Chief Technical Officer
Lyn Campbell SVP-Global Operations & Information Technology
Robert Darren Lee EVP, GM-Compliance & Digital Risk Business Unit
Sector and Competitors
1st jan.Capi. (M$)
PROOFPOINT, INC.27.92%9 991
ACCENTURE PLC21.99%186 855
TATA CONSULTANCY SERVICES LTD.12.23%168 660
INTERNATIONAL BUSINESS MACHINES CORPORATION12.28%131 205
INFOSYS LIMITED26.65%90 140
AUTOMATIC DATA PROCESSING, INC.16.96%83 980