27
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

  • View
    218

  • Download
    2

Embed Size (px)

Citation preview

Page 1: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

1Proofpoint, Inc. Proprietary and Confidential ©2010

Email Security in the Cloud Computing EraEmail Security in the Cloud Computing Era

Stephen HuiStephen Hui

Page 2: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

2Proofpoint, Inc. Proprietary and Confidential ©2010

Proofpoint:Cloud-Enabled Email SolutionsProofpoint:Cloud-Enabled Email Solutions

4,000+ Customers

Leading email security, compliance & archiving solutions for complex organizations

Enterprise-class protection forlowest email risk & cost-of-ownership

Fastest GrowingMessaging Security

Leaders Quadrant, Most Visionary

Best Buy

40M+ Mailboxes

2.5B+ Messages Archived

Page 3: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

3Proofpoint, Inc. Proprietary and Confidential ©2010

Robust Partner Ecosystem

Value AddedResellers/Distributors

Appliance OEM

SaaS SecurityResellers

ArchivingOEMs

StrategicPartnerships

Partnerships maximize value to customers

Page 4: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

4Proofpoint, Inc. Proprietary and Confidential ©2010

Enterprises Deploy Cloud Services -Especially for “Sensitive” DataEnterprises Deploy Cloud Services -Especially for “Sensitive” Data

CRMPayroll, HR

Email

Page 5: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

5Proofpoint, Inc. Proprietary and Confidential ©2010

Gartner: User SurveyGartner: User Survey

Gartner: "User Survey Analysis: Software as a Service, Enterprise Application Markets, Worldwide, 2010"

“More than 95 percent of organizations expect to maintain or grow their use of software as a service (SaaS)…”

“Asia/Pacific indicated a stronger interest in procuring solutions via a SaaS model… and showed greater confidence that their organizations will increase investments in products offered as SaaS…”

“…e-mail, financial management (accounting), sales force automation and customer service, and expense management are the most popular…”

Page 6: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

6Proofpoint, Inc. Proprietary and Confidential ©2010

SaaS DriversSaaS Drivers

Gartner: “Who Really Cares About the Cloud?“ August 24, 2010

Cost Reduction

Deployment Flexibility

Speed to Implement

Capex Spending Pressure

Changing Business Conditions

Operational Efficiency

Driver Focus

Page 7: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

7Proofpoint, Inc. Proprietary and Confidential ©2010

SaaS InhibitorsSaaS Inhibitors

Gartner: “Who Really Cares About the Cloud?“ August 24, 2010

Security

Unclear Potential for Customization

Unproven ROI

Physical and Information Assets

Specific to Business Process

Quantifiable Investment Return

Inhibitor Focus

Page 8: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

8Proofpoint, Inc. Proprietary and Confidential ©2010

Gartner: Magic Quadrant for Secure Email Gateways, 2010Gartner: Magic Quadrant for Secure Email Gateways, 2010

“…offerings that put all filtering in the "cloud” … are increasingly popular ...”

“Hosted solutions can drastically reduce the costs of e-mail encryption...”

“Integrated encryption …that can easily secure sensitive content for any recipient is a mandatory requirement for compliance.”

Page 9: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

9Proofpoint, Inc. Proprietary and Confidential ©2010

Placeholder: more before/after detailsincident

Osterman Research: Likelihood to Move Email to SaaS Services

Page 10: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

10Proofpoint, Inc. Proprietary and Confidential ©2010

The Email World Has ChangedThe Email World Has Changed

InboundSecurity

DLP/Encryption

eDiscovery/ Archiving

DeploymentModel Flux Budgets

Spam VolumesFocused AttacksSpam Sophistication

Privacy RequirementsGovernment RegulationsPCI, HIPAA, FERPAFrequent Data BreachesLeaks of Confidential Information

FRCP RulesFreedom of InformationIncreased, Complex & Costly LitigationComplianceBloated Mail ServerRecords retention

Shift from On-Premises to CloudTCO and security driving deployment choiceMarketplace confusion regarding options

Page 11: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

11Proofpoint, Inc. Proprietary and Confidential ©2010

Email Today:More than Just the Mail ServerEmail Today:More than Just the Mail Server

Mail Servers

Page 12: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

12Proofpoint, Inc. Proprietary and Confidential ©2010

Email Today:Soaring Costs and ComplexityEmail Today:Soaring Costs and Complexity

Routing MTAs

Mail Servers

Mobility (BES)

Mail ServerAnti-Virus

DisasterRecovery

eDiscoveryArchiving Compliance

Anti-spam Anti-virusContentFiltering

Data LossPrevention Encryption

Page 13: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

13Proofpoint, Inc. Proprietary and Confidential ©2010

Email Today:Soaring Costs and ComplexityEmail Today:Soaring Costs and Complexity

Routing MTAs

Mail Servers

Mobility (BES)

Mail ServerAnti-Virus

DisasterRecovery

eDiscoveryArchiving

Anti-spam Anti-virusContentFiltering

Data LossPrevention Encryption

Compliance

Mail Servers $50- $100

Routing MTAs $0 - $20

Anti-spam $10 - $20

Anti-virus $2 - $4

Content Filtering $0 - $30

Data Loss Prevention $10 - $20

Encryption $10 - $15

Mobility (BES) $5 - $10

Mail Server Anti-Virus $0 - $5

Disaster Recovery $0 - $25

Archiving $0 - $80

Compliance $0 - $30

eDiscovery $0 - $20

TOTAL $87 - $359

Page 14: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

14Proofpoint, Inc. Proprietary and Confidential ©2010

Mail Servers $50- $100

Routing MTAs $0 - $20

Anti-spam $10 - $20

Anti-virus $2 - $4

Content Filtering $0 - $30

Data Loss Prevention $10 - $20

Encryption $10 - $15

Mobility (BES) $5 - $10

Mail Server Anti-Virus $0 - $ 5

Disaster Recovery $0 - $25

Archiving $0 - $80

Compliance $0 - $30

eDiscovery $0 - $20

TOTAL $87 - $359

Simplify: Cloud-Based Email SuiteSimplify: Cloud-Based Email Suite

Routing MTAs

Mail Servers

Mail Server Anti-Virus

Disaster Recovery

eDiscovery

Archiving

Anti-spam

Anti-virus

Content Filtering

Data Loss Prevention

Encryption

Compliance

Email ThreatProtection

Data Loss PreventionEmail and

CollaborationSecureCommunication

Archiving andeDiscovery

Mobility (BES)

Simple

Lowest TCO• 30-50% savings typical

Compatible

Support for regulated industries

All capabilities available

Benefits

Page 15: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

15Proofpoint, Inc. Proprietary and Confidential ©2010

Data LossPrevention

Ensure externalrequirements and

internal policiesare met

SecureCommunicationEncrypt emailsand send largeattachments securely

Archiving andeDiscovery

Enable search,eDiscovery, storage

management andcompliance

Email andCollaborationComplete platform for business email, collaboration and calendaring

Enterprise-Class, Cloud-EnabledEmail SuiteEnterprise-Class, Cloud-EnabledEmail Suite

Email Threat Protection

Data LossPreventionEmail and

Collaboration

SecureCommunication

Archiving andeDiscovery

Email ThreatProtectionProtect the infrastructurefrom outside threats

Page 16: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

16Proofpoint, Inc. Proprietary and Confidential ©2010

Case Studies:Business Solutions

Page 17: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

17Proofpoint, Inc. Proprietary and Confidential ©2010

Honda of AmericaHonda of America

Background• U.S. offices managing sensitive design documents in a highly

competitive industry

Business Challenge• Needed to protect unique CADD drawings from inadvertent leaks via

email

Results• Proofpoint cloud-enabled, on-premises appliances provided data leak

protection as well as inbound email security• Automated, frequent updates keep up with new exploits without high

administrative overhead

Page 18: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

18Proofpoint, Inc. Proprietary and Confidential ©2010

BridgestoneBridgestone

Background• Discrete manufacturing company, with offices worldwide• 13,000 employees in U.S.

Business Challenge• Effective protection from in-bound threats• Lower TCO• Expand managed coverage to field offices without on-site management

overhead

Results• Continued with on-premises deployment of Proofpoint Enterprise Protection

for US employees• Expanded coverage to Latin America offices via SaaS• Plans to eventually convert entire company deployment to SaaS

Page 19: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

19Proofpoint, Inc. Proprietary and Confidential ©2010

WachoviaWachovia

Background• Diversified financial services company

• 120,000 employees

Business Challenge• Unpredictable mail volumes

• Appliance management

• Cost of solution

ResultsDeployed Proofpoint Enterprise ProtectionCloud computingCapacity on demand with significant reduction in costConsolidation

Page 20: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

20Proofpoint, Inc. Proprietary and Confidential ©2010

PricewaterhouseCoopersPricewaterhouseCoopers

Background• Large international organization• A federation of largely autonomous partnerships• 165,000 users across 100+ countries, 4 major data centers

Business Challenge• Reduce administration overhead• Improve spam effectiveness• Encryption• Respect regional data privacy issues

ResultsCloud computing for lowest TCO1st layer of cloud computing

· Growth· Massive volume spikes

2nd layer of on premises appliances· Each region provided localized country control· Respect privacy controls

Page 21: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

21Proofpoint, Inc. Proprietary and Confidential ©2010

TJXTJX

Background• Large retailer (T.J. Maxx. Marshalls, HoneGoods, Bob’s Stores) with

stores and offices in multiple countries• Poor IT security and business policies

Business Challenge• Paid a record $41M fine to VISA for credit card data breach• Needed a secure means to transmit credit card information, meet PCI-

DSS compliance requirements

Results• Proofpoint Smart Identifiers, proximity matching, compliance remediation

simplified policy management and provided superior security• SaaS platform provided easier deployment, better TCO

Page 22: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

22Proofpoint, Inc. Proprietary and Confidential ©2010

A. P. Moller Maersk GroupA. P. Moller Maersk Group

Company Background• Leading global liner shipping company with 117,000 employees,

operating in 130 countries

• 40,000 mailboxes

Business Challenge• Need to automatically enforce email retention policy

Results

Selected Proofpoint Email ArchivingLitigation readinessAbility to easily respond to eDiscovery requests

``

Page 23: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

23Proofpoint, Inc. Proprietary and Confidential ©2010

Different SaaS Deployment ModelsDifferent SaaS Deployment Models

Appliance SaaS

Add appliances to process increasing spam load

More HW management

More variable costs

Good TCO

Every function in the cloudFree IT for more core activitiesOffload many hard costsBest TCO

Hybrid

Cloud sheds most load Scale on demandBalance need for on premise control and capacity growthBetter TCO

Page 24: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

24Proofpoint, Inc. Proprietary and Confidential ©2010

Different SaaS Deployment ModelsDifferent SaaS Deployment Models

Appliance SaaS Hybrid

Page 26: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

26Proofpoint, Inc. Proprietary and Confidential ©2010

Proofpoint:Cloud-Enabled Email SolutionsProofpoint:Cloud-Enabled Email Solutions

4,000+ Customers

Leading email security, compliance & archiving solutions for complex organizations

Enterprise-class protection forlowest email risk & cost-of-ownership

Fastest GrowingMessaging Security

Leaders Quadrant, Most Visionary

Best Buy

40M+ Mailboxes

2.5B+ Messages Archived

Page 27: 1 Proofpoint, Inc. Proprietary and Confidential ©2010 Email Security in the Cloud Computing Era Stephen Hui

Questions?Questions?