Proofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security LeadershipProofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security Leadership
Enhancements include cloud-based email continuity, S/MIME encryption, SAML single sign-on and Sendmail MTA
January 28, 2015
SUNNYVALE, Calif., – January 26, 2015 – Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation security and compliance company, today announced the release of the new Proofpoint Enterprise Protection Suite 8.0, featuring advancements in data protection, reliability and single sign-on capabilities. Proofpoint’s email security technology processes and models hundreds of millions of email messages per day to ensure organizations have the industry's leading cloud-based email security threat classification and management solution.
“As recent high-profile breaches have demonstrated, email remains the number one threat vector for advanced attacks against mid and large enterprises,” said David Knight, executive vice president and general manager of Information Security Products for Proofpoint. “Our new Proofpoint Enterprise Protection Suite 8.0 enhancements provide critical email security against the most sophisticated attacks.”
Proofpoint Enterprise Protection Suite 8.0 delivers industry-leading inbound and outbound email security through an innovative cloud-based platform. By accurately classifying and blocking threats, leveraging phishing detection, anti-spam and antivirus technologies, Proofpoint answers today’s security needs. New Proofpoint Enterprise Protection advancements include:
- Email continuity to ensure transparent, uninterrupted access: Proofpoint email continuity functionality ensures that if an organization’s primary mail server fails or experiences an outage, users can still send and receive messages via a Proofpoint-hosted Webmail portal, as well as access previously received messages.
- Secure messaging with S/MIME, protecting sensitive data in motion: Proofpoint encryption customers have access to robust messaging with secure multi-purpose internet mail extensions (S/MIME), adding an important layer to existing security infrastructure. Both gateway-to-gateway and gateway-to-user encryption is supported.
- Single sign-on with SAML, streamlining user access and amplifying security: Enhanced single sign-on makes it easy for security administrators to use their corporate credentials to connect to Proofpoint services within their existing authentication infrastructure. This Proofpoint functionality is supported through security assertion markup language (SAML) 2.0 for both the admin console as well as end user services such as EU Web and Secure Share.
- Full-featured, commercial-grade Sendmail MTA: Proofpoint Enterprise Protection Suite is now fully integrated, at an API and UI level, with the commercial-grade Sendmail message transfer agent (MTA), providing organizations with superior performance, control and security. Featuring advanced policy routing, the Sendmail integration enables security teams to fine-tune email routing to ensure mission-critical email data and service delivery.
Proofpoint Enterprise Protection Suite meets the needs of every enterprise deployment strategy—cloud-based, hybrid on-demand and on-premises installations. For more information on Proofpoint Enterprise Protection, please visit www.proofpoint.com/products/protection/.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint and Proofpoint Enterprise Protection Suite are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and/or other countries. All other trademarks contained herein are the property of their respective owners.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks