Proofpoint Enterprise applications are delivered on a cloud infrastructure and can be deployed as secure, cloud-only solutions, or as hybrid solutions that combine SaaS with optional physical or virtual points-of-presence installed behind the enterprise firewall (for customers who prefer to deploy certain functions inside their security perimeter).
Regardless of the deployment scenario, this cloud-based email architecture enables Proofpoint to leverage the benefits of the cloud—bringing customers superior, cost-effective cloud solutions for email security and compliance—while maintaining the flexibility to optimize deployments for each customers' unique requirements. And the modularity of Proofpoint's cloud email services and solutions enables our existing customers to implement additional modules in a simple and efficient manner.
Cloud Infrastructure Components
Proofpoint's cloud-based email services provide core security and compliance capabilities to be shared across the various applications. Proofpoint cloud email services run a number of shared email services, including threat detection, encryption, and content classification. Each of these email services is consumed by and shared across the application layer.
As a result, the Proofpoint cloud platform is able to use economies of scale to deliver lower TCO to the customer. Furthermore, because the cloud email services contain no business-specific data, they are reusable and enable the rapid development of new security and compliance applications.
Proofpoint's cloud leverages two types of shared email services:
These capabilities provide core building blocks for Proofpoint's Application Services:
- Big Data: Proofpoint uses both proprietary and open source "big data" technologies to provide a way to store, scale and process vast volumes of data. Technologies include Hadoop, Cassandra, MapReduce, and Hive. Big Data techniques enable analysis and insight based on the real-time processing of massive amounts of data. The result is better data protection, higher performance and superior scalability for your organization. Learn more about our use of big data technologies »
- Machine Learning: In 2003, Proofpoint pioneered the application of machine learning for security by introducing Proofpoint MLX™ technology for protecting organizations from spam, phishing and other message-borne threats. Machine learning is a discipline that gives computers the ability to learn without being programmed, using advanced statistical models that model normal behavior of an organization's email. Proofpoint uses both unsupervised and supervised machine learning algorithms to ensure that the most dangerous threats—even those never seen before—are rapidly detected and stopped.
- Identity and Access Management: Proofpoint leverages various directory services, authentication methods, and other technologies for data protection and threat management.
- Secure Storage: Proofpoint encrypts all data stored in its data centers. Secure email storage services are provided to any application that requires data at rest functionality. With Proofpoint, your email data is always isolated, safe and secure.
Proofpoint's application services leverage the foundational technologies listed above to provide a diverse set of services for our products. These shared email services include:
- Email Content Inspection: Deep email content inspection techniques are used to scan and parse text and structure across multiple languages. This capability is used to identify email threats, even if the email threat is sent from a trusted IP. Furthermore, those same techniques can detect sensitive data leaks, including leaks found inside compressed files and attachments.
- Email Reputation: Proofpoint maintains a real-time database of the world's IP addresses and the corresponding positive and negative reputation of those IPs. Proofpoint also tracks real-time email reputation data for message attachments and potentially malicious URLs.
- Email Encryption and Key Management: Core email encryption services are provided for in-motion and at-rest applications, as well as key management infrastructure. Proofpoint's underlying email encryption infrastructure provides world-class security and availability, ensuring that keys and data are separated for maximum security.
- Workflow: Proofpoint provides a unique email- and web-based workflow system to enable seamless remediation across the enterprise. End users, compliance officers, and security professionals make use of Proofpoint's workflow capabilities across Proofpoint's various applications.
- Analytics and Search: Advanced analytic tools leverage the network for automated monitoring and rapid assessment of emerging threats.