Proofpoint Products for Education Industry
KEY BENEFITS OF PROOFPOINT PROTECTION PRODUCTS FOR EDUCATION
Protection on All Devices, Everywhere
Protect faculty, staff, and student records and research from email and social-media borne cyber threats. Educational institutions face unique challenges in protecting faculty, staff, and students from email and social-media borne cyberthreats. Users range from researchers to professors to medical staff to students, each with diverse usage patterns and access needs. This diversity increases the opportunities for malicious actors to compromise users. Proofpoint security solutions for universities keep malware, spam, and targeted attacks such as phishing out of your users’ mailboxes and social media accounts, and transparently protect users no matter where they access those accounts – from within or outside the institution’s walls, on desktop, laptop, or mobile devices.
As evaluated by Gartner, Proofpoint provides the best threat protection available today against external malicious threats. Our security solutions for universities' communications channels keep malware, spam, viruses, and targeted attacks such as phishing out of users' mailboxes and social media accounts.
Proofpoint Protection Key Benefits:
Proofpoint MLX Deep Content Analysis
Keep safe with accurate threat classification of phish, spam, malware, and other forms of objectionable or dangerous content.
Targeted Attack Protection
Continue to monitor and protect against URLs embedded in emails, which may “go bad” at any time.
Multilayered Virus Protection
Benefit from signature-based, anti-virus, and behavior-based zero-hour protection.
Dynamic Reputation Service
Leverage Global IP and URL reputation.
Granular, Flexible Policy Management
Experience total control and flexibility regarding your email security preferences, policies, enabled services, end user controls, alerts and reporting.
Tools for Response
Have readily available tools on hand, in case you need to react to a direct attack.
Comprehensive, Advanced Threat Protection
Protect your students, professors, and staff against all forms of cyberattacks, including modern targeted attacks such as spear phishing and credential attacks as well as traditional threats such as spam and viruses. Stop advanced threats that are capable of evading even the most sophisticated signature- and reputation-based defenses before they can give attackers and cybercriminals a foothold in your network.
Proofpoint provides the industry’s leading Secure Email Gateway to block known threats – and Proofpoint Targeted Attack Protection™ is designed to identify suspicious email messages containing malicious URLs or malicious email attachments before their payloads can be delivered. Proofpoint provides an integrated defense against advanced email-borne threats that complements your existing Proofpoint cloud- based or on-premise email gateways
Powerful, transparent email encryption
Provide email encryption that’s transparent to end users, but backed by a strong policy engine that ensures all sensitive data is protected before it leaves the organization. Proofpoint Encryption also makes sure that all encrypted messages are branded to your university's requirements.
Recipients of Proofpoint encrypted emails follow a few simple steps to authenticate and access their messages. No pre-registration or exchange of encryption keys is required to use Proofpoint Encryption; ad-hoc email encryption is fully supported.
Automatic Data Loss PreventionDownload ‘Data Breaches’ Report
Ensure sensitive information -- from research results to health records -- is protected from unauthorized or accidental transmission.
Proofpoint’s solution can detect sensitive data within a file—even if the file format has been changed. For example, with Proofpoint solutions you can detect a simple paragraph from a Microsoft Word document that had been copied into the body of an email, distributed file, or social media post. Proofpoint can then route the offending communication to IT, HR, or elsewhere appropriately.
KEY BENEFITS OF PROOFPOINT COMPLIANCE PRODUCTS FOR EDUCATION
Automated, Transparent Policy Enforcement
Ensure that both inbound and outbound email and social media communications adhere to external regulations and internal policy transparently, without dependence on user action. Proofpoint provides multilayered filtering to accurately detect sensitive information within an email or attachment, such as credit card numbers, customer loyalty numbers, and employee records.
Once detected, Proofpoint’s solution can be configured to warn the user about acceptable use policies, and the user can self-remediate these violations – or administrative or compliance officers can be notified appropriately..
Seamless, policy-driven encryption
Proofpoint can automatically detect and and encrypt communications containing regulated or restricted information of students, professors, and administrators, as well as providingadministrators with access to real time reports and message tracing functionality to monitor the outbound mail stream for a compromised desktop, laptop, or account and givingcompliance officers access to data loss incidents through an easy-to-use interface that provides custom reporting.
KEY BENEFITS OF PROOFPOINT DISCOVERY PRODUCTS FOR EDUCATION
Compliance and legal discovery in a single-platform archiving solution
Employ Proofpoint’s single-platform archiving solution with features that help educational institutions address challenges around email storage management, eDiscovery, and regulatory compliance.
Proofpoint Archive Key Benefits:
Industry-leading Security and Privacy
Encrypt all email messages, files and other content with keys you control through our patented DoubleBlindTM technology. This ensures that no one can access a readable form of your data without your authorized access to the encryption keys stored behind your firewall.
Always Available Storage
Innovative, cloud-based storage infrastructure is comprised of geographically distributed data centers, which ensures that information is available in the event of service disruption to either location.
Search Performance Backed by SLA
Ensure that information is always accessible, whether to address eDiscovery, regulatory inquiry, or Freedom of Information Act (FOIA) request – with self-service accessibility to email, instant messages, social media, and the contents of more than 400 types of attachments—with results presented in seconds
State-of-the-art social media archiving
Proofpoint’s policy-based controls can capture social content so that it can be managed as any other critical information asset would be.
Capture all social conversational content in real-time—even if a user deletes that content. This ensures that you remain compliant with specific state regulatory obligations.
Proofpoint Social Platform for Archiving Key Benefits:
Use channel-specific modules that leverage existing APIs to capture content directly from the source.
Capture social content (along with associated links or attachments) for all or a subset of users to address specific requirements for specific users who must be monitored and supervised for regulatory compliance. Subsequent posts can also be captured to maintain communication threads.
Use APIs to capture data from original social media sources allows content to be captured regardless of where users post (e.g., web browser, iPhone, iPad, Blackberry, Android, etc.).
Advanced Compliance Capabilities
Automate and streamline critical compliance tasks. These include mapping to user-specific journaling destinations, conditionally capturing content for users, indicating record followers, and custom email tags.
Securely store all social content in your existing information archive, thereby adhering to your corporate electronic communications retention policy.
Single Pane of Glass with Enterprise Archive
Search, discover, supervise, and report on social content alongside email and IM content.
Support for Existing Archives
Deliver social content to your existing archive, enabling you to leverage existing supervisory tools without complex archive migration. Seamlessly integrate social media content into solutions, including Symantec Enterprise Vault, EMC, Bloomberg Archiver, HP/Autonomy, Smarsh, Global Relay, and others.