Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/28/2012
09:48 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Proofpoint Extends Data Protection And Information Governance Solutions to Address Cloud-Based File Sharing, Collaboration And Social Media

Proofpoint also announced a new integration with Box to offer enhanced security, compliance and control over documents shared via Box

Click here for more articles.

SAN FRANCISCO, CA, Feb 28, 2012 (MARKETWIRE via COMTEX) -- from RSA Conference 2012, Booth 850 - Proofpoint, Inc. ( http://www.proofpoint.com ), a pioneering security-as-a-service provider, today announced a variety of enhancements to the Proofpoint Enterprise(TM) suite, designed to address the data security, compliance and information governance needs of enterprises that seek to reduce risks while also benefiting from cloud-based file sharing, collaboration and social media platforms. Proofpoint announced a new integration with Box ( http://www.box.com ) to offer enhanced security, compliance and control over documents shared via Box. The new capabilities will be demonstrated this week at RSA Conference 2012 exposition booth #850.

"At Box, we're committed to providing a secure enterprise collaboration experience," said Chris Yeh, vice president of platform at Box. "Our integration with Proofpoint delivers an advanced layer of governance capabilities that ensures businesses can successfully share and access their most trusted information."

The Box integration is part of Proofpoint's ongoing strategy of extending advanced data protection capabilities beyond the enterprise firewall to help organizations monitor and control the flow of information across all major data stores and communication channels.

"Box is one of the first cloud-based file sharing and collaboration vendors to step up to the plate when it comes to protecting enterprise customers' data and providing the controls demanded by today's regulatory environment," said David Knight, executive vice president of product management and marketing at Proofpoint.

The newest addition to Proofpoint's integrated suite of on-demand data protection solutions, Proofpoint Enterprise Governance is an enterprise information governance solution that gives organizations the ability to monitor and control the flow of information across all major data stores and communication channels, including end-user laptops and desktops, enterprise email systems, file sharing systems, and collaboration solutions (such as Microsoft SharePoint and IBM Lotus Domino). The new integration with Box allows Proofpoint Enterprise Governance to monitor shared folders in Box and detect, track and manage document versions that reside in Box.

Writing in the February 13, 2012 report, Cloud Archiving Markets Consolidate as Vendors Announce Acquisitions, Sheila Childs, research vice president for storage technologies and strategies at Gartner, Inc. said, "Organizations are increasingly becoming interested in applying broader information governance policies to a set of data that goes well beyond email, including file system content (in the data center and external to it), collaborative content, IMs and social content."

Proofpoint Enterprise Privacy provides data loss prevention, regulatory compliance and encryption capabilities, providing an easy and cost-effective way for organizations to prevent leaks and loss of sensitive data across both email and the web -- including all of today's popular social media platforms (such as Facebook, Twitter and LinkedIn) and web-based email.

Proofpoint Enterprise Privacy can filter both email traffic and web communications -- applying the same advanced detection capabilities and enforcing the same policies to guard against data loss and compliance violations across all of today's popular communications channels.

Via integration with the Box platform, Proofpoint Enterprise Privacy can now apply data loss prevention (DLP) and compliance policies to files that reside in Box, enabling a variety of new capabilities. For example, when a user attempts to upload a file to their enterprise's Box deployment, Proofpoint Enterprise Privacy intercepts, scans and enforces policy, utilizing a web proxy server which supports ICAP.

Box integration features -- including governing synch-folders and enforcing DLP policies -- are available today.

Pricing and Availability Proofpoint Enterprise Governance and Proofpoint Enterprise Privacy are available now. The solutions are priced on a per user, per year basis with subscription costs depending upon the size of deployment. Contact Proofpoint for a detailed quote.

About Box Founded in 2005, Box provides cloud content management for 8 million users and companies ranging from small businesses to Fortune 500 companies. Box's dynamic, flexible content management and collaboration solution empowers users to access and share content online, and gives IT professionals unprecedented visibility into how content moves within their organizations and beyond. Content on Box can be shared internally and externally, accessed through iPad, iPhone and Android applications, and extended to partner applications such as Google Apps, NetSuite and Salesforce. Headquartered in Palo Alto, CA, Box is a privately held company and is backed by venture capital firms Draper Fisher Jurvetson, ScaleVP and U.S. Venture Partners.

About Proofpoint, Inc. Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com .

Proofpoint, Proofpoint Enterprise Governance, Proofpoint Enterprise Privacy and Digital Thread are trademarks or registered trademarks of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...