Proofpoint: Next-generation email security arrives

Powered by SC Magazine
 

Proofpoint releases next-generation security platform for Australians.

Messaging and data security vendor, Proofpoint has released its next generation messaging security technology claiming it is the first of its kind for Australia.

Based on a new integrated architecture, Proofpoint 5 offers policy management and data loss prevention technologies all on a unified platform making it a first for Australia, according to Gerry Tucker, director of APAC at Proofpoint.

“It is the industry’s first single-appliance solution for defending against inbound spam and viruses, preventing leaks of confidential and private data, encrypting sensitive information and analysing messaging infrastructures,” said Tucker.

Previously Proofpoint used multiple appliances and multiple servers to complete the range of tasks but a unified platform ensures that the security policy is same across the board for the organisation, said Tucker.

Furthermore, a single-platform allows the organisation to have a consistent set of reports that helps with compliance and auditing issues, he added.

Proofpoint 5 can be deployed as a hardware appliance, virtual appliance or software—with administration features, and protects against messaging threats.

Additionally, it can process 10,000 simultaneous connections and process more than 400,000 messages per hour with both inbound and outbound protection enabled.

Modules are all individually architected minimising the risk of failure across the entire platform. For example if problems occur with one area of the platform it will not affect the other modules, said Tucker.



Proofpoint: Next-generation email security arrives
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 765

Vote