Tech Day Details

Title: Proofpoint
Date: Tuesday September 30th, 2014
Registration Time: 08:30AM
Start Time: 08:45AM
End Time: 12:45PM
Location: Capitol Park Welcome Center
Topic: Enterprise Protection and Privacy
Audience: IT
Presenter: Proofpoint
Description: 8:30 – 8:45 am - coffee and donuts/pastries to be served
8:45 - 9:00 am > Proofpoint overview
9:00- 9:30 am > Enterprise Protection overview: Gartner’s #1 secure email gateway:
Protect your business from email-based threats, including phishing, malware, spam, and other forms of objectionable or dangerous content at the gateway. Proofpoint Enterprise Protection delivers best-in-class inbound and outbound email security and management in one cost effective,easy-to-use solution.
9:30-10:00 am > Targeted Attack Protection: email is the #1 threat vector. Protect your organization from advanced persistent threats/phishing attacks, protecting all devices, including mobile, on or off of your network:Using Big Data analysis techniques and a Cloud Architecture, Proofpoint Targeted Attack Protection identifies email messages containing malicious URLs or malicious email attachments not blocked by traditional gateway solutions. Targeted Attack Protection represents the industry’s first comprehensive solution for combating new and emerging threats using a full lifecycle approach.
10:00 am-10:15 am > Proofpoint Enterprise Privacy: The Proofpoint Enterprise Privacy suite protects sensitive and private information, defends against leaks of confidential information, and ensures compliance with common international,
industry and U.S. (Federal and State) data protection regulations, including HIPAA and GLBA,as well as PCI standards. Smart identifiers and managed dictionaries are combined with proximity and correlation analysis for increased accuracy. An enhanced mobile experience,ease of registration for recipients, and transparent policy-based encryption increases adoption.
10:15 am – 10:30 am > Proofpoint Threat Response: Proofpoint Threat Response provides automated threat response to close the gap between targeted and advanced persistent threat detection and containment, enabling the security operations team to verify, prioritize, and contain detected threats in real-time. By collecting
and analyzing security event context and turning it into rapid response, the platform prevents data loss and protects against future infections of other users.
10:30 am – 11:30 am > Proofpoint Enterprise Archive: secure archiving platform for email, text and social content, including an industry-leading 20 second eDiscovery SLA, guaranteed:Built with an architecture explicitly designed to leverage the benefits of grid storage in the cloud, Proofpoint Enterprise Archive can be utilized for search with sustainably fast and reliable performance uniquely backed by a Search Performance Guarantee – a 20 second eDiscovery SLA. Proofpoint Enterprise Archive is a next generation archiving solution that addresses three key
challenges—legal discovery, regulatory compliance, and end user email access—without the headaches of managing archiving in-house. Capture all social conversational content in Chatter, Yammer, LinkedIn, Twitter, and Facebook by converting user content to email form in real-time – even if a user deletes that content – ensuring you remain compliant with your regulatory obligations requirements set forth by
the SEC, FINRA, HIPAA and other regulatory entities. Your content is fully integrated into the archiving solution that you already have in place, thereby eliminating the need to manage multiple e-discovery tools for electronic communication compliance.
11/11:30 am timeframe > LUNCH to be delivered
11:30 am – 12:00 pm > Proofpoint Enterprise Governance: Today, data continues to grow at a staggering rate, with some analysts projecting as high as 44 times as much in the next 10 years. Proofpoint Enterprise Governance enables organizations to track, classify, monitor, and control information across the enterprise—regardless of where it is located. Like a GPS system for documents, documents are tracked as they move throughout your infrastructure without requiring additional systems investment,
complex data migration, or any change in the way that users collaborate.



12:00-12:15 pm > Q & A.

 

Archives