Story image

Gartner names Proofpoint Leader in enterprise information archiving

07 Dec 2018

Cybersecurity and compliance company Proofpoint has been positioned by Gartner in the Leaders quadrant of the 2018 Magic Quadrant for enterprise information archiving for the seventh consecutive year. The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute. “We believe our Leader position in the Gartner Magic Quadrant for Enterprise Information Archiving for the seventh consecutive year reflects our ability to reduce reputational risk across all electronically stored information sources that matter, including email, collaboration platforms, social media, voice, and text,” says Proofpoint compliance and digital risk senior vice president and general manager Darren Lee. “From our view, we are committed to eliminating the burden of managing archiving in-house, streamlining compliance, automating eDiscovery, and giving our customers control of their data.” As organisations increasingly migrate their data to the cloud, legacy on-premises solutions do not provide the secure environment necessary to manage the growth of unstructured data.  Proofpoint Enterprise Archive simplifies compliance, manages data growth, and reduces the cost of e-discovery with streamlined legal, discovery, regulatory compliance, machine learning capabilities, and end-user data access. Proofpoint works across a broad collection of electronically stored information (ESI) sources and enables IT teams to efficiently manage and access their data. As regulations and requirements differ greatly across regions and verticals, Proofpoint’s global presence also enables organisations to meet data sovereignty requirements and benefit from a customer base across regulated industries such as financial services, public sector, and healthcare. Proofpoint Enterprise Archive establishes and enforces policies and review processes for specific regulations and geographies to reduce the risk of costly fines, adverse inferences, and damaged reputations. In September, Proofpoint availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end-user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences. Proofpoint CLEAR was the first joint solution announcement following its acquisition of Wombat Security. Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users are able report a suspicious message with a single click using an embedded PhishAlarm email reporting button. CLEAR’s security automation and orchestration capabilities also minimised alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.