Analyst Reports

Gartner Magic Quadrant for Secure Email Gateways, 2013
Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2013 Magic Quadrant for Secure Email Gateways report. Read the full report, compliments of Proofpoint.
» Read this Magic Quadrant report!

The Forrester Wave: Email Content Security, Q4 2012
Forrester names Proofpoint as a top vendor in its November 2012, 47-criteria evaluation of email content security vendors. In this evaluation, Proofpoint was top ranked in categories including data leak prevention, product strategy, and performance and operations. Read the full report, compliments of Proofpoint.
» Read this Forrester Wave report!

Frost & Sullivan: 2012 Email Content Security Product Excellence Award
Proofpoint has been awarded the 2012 Product Differentiation Excellence Award for Email Content Security. Frost & Sullivan evaluated all on-premises software/appliance, virtual, and cloud-based email security providers. Read the complete report to learn why Frost & Sullivan honored Proofpoint for excellence in advancing state-of-the-art protection from targeted attacks and meeting market needs with its cloud-based data protection suite.
» Read this analyst report!

Forrester: Five Steps To Build an Effective Threat Intelligence Capability
In this January 2013 report from analyst firm Forrester, security analyst Rick Holland draws on the principles of military intelligence to suggest a five-step process to build and leverage threat intelligence capabilities.
» Read this analyst report!

Making Office 365 More Secure and Compliant
While Microsoft's robust and scalable solution will satisfy the security, compliance and governance requirements of many organizations, there are some organizations that will need compliance and security capabilities not available with Office 365. Learn more in this free Osterman Research report.
» Read this analyst report!

Gartner Magic Quadrant for Secure Email Gateways, 2013
Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2013 Magic Quadrant for Secure Email Gateways report. Read the full report, compliments of Proofpoint.
» Read this Magic Quadrant report!

Why Securing Communications and Content is a Critical Best Practice
Email Encryption White Paper by Osterman Research
This white paper discusses the reasons that enterprises should secure their communications and content through the use of robust encryption tools and outlines a six-step process for implementing enterprise encryption capabilities.
» Read this analyst report!

Understand the State Of Data Security and Privacy: 2012 To 2013
This September 2012 data-driven Forrester research report outlines budgeting and spending, policies and tools in use, technology adoption plans, and other key data protection and breach trends in North American and European organizations for 2012 to 2013. Learn about the most common sources of data breaches, effects suffered by data breach victims and security-as-a-service adoption trends for 2012 and 2013.
» Read this analyst report!

The Forrester Wave: Email Content Security, Q4 2012
Forrester names Proofpoint as a top vendor in its November 2012, 47-criteria evaluation of email content security vendors. In this evaluation, Proofpoint was top ranked in categories including data leak prevention, product strategy, and performance and operations. Read the full report, compliments of Proofpoint.
» Read this Forrester Wave report!

How Encrypting Content in Transit and at Rest Reduces Liabilities and Costs
Read this 2011 Osterman Research white paper on email encryption and other encryption technologies. Learn how encryption reduces risks and costs and why Osterman writes that encryption investments, "pay for themselves."
» Download the Analyst Report!

Making Office 365 More Secure and Compliant
While Microsoft's robust and scalable solution will satisfy the security, compliance and governance requirements of many organizations, there are some organizations that will need compliance and security capabilities not available with Office 365. Learn more in this free Osterman Research report.
» Read this analyst report!

The Critical Need for Encrypted Email and Secure File Transfer Solutions
This Osterman Research report explains key issues around email encryption, new regulations that require sensitive content to be encrypted and suggestions for moving forward with encryption and secure file transfer.
» Download the Analyst Report!

The Need for a Better Way to Send File Attachments
Osterman Research report explains why email file attachments are no longer the preferred method to send files. Learn about new approaches to securely transmit large or confidential files, including Proofpoint Secure File Transfer.
» Download the Analyst Report!

Why Social Media Archiving Should be a Top Priority for Your Organization
The use of social media in the work place is growing rapidly – for example, an Osterman Research survey conducted in November 2010 found that the typical employee spent just 11 minutes per workday using social media for work-related purposes, but that number increased near five-fold to 51 minutes per day by July 2013.
» Download the White Paper!

Gartner Magic Quadrant for Enterprise Information Archiving, 2013
Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2013 Magic Quadrant for Enterprise Information Archiving report. Read the full report, compliments of Proofpoint.
» Read this Magic Quadrant report!

Info-Tech Research Group Vendor Landscape for Email Archiving, 2012
Info-Tech positions Proofpoint as a “Champion” in email archiving, also awarding Proofpoint an Innovation Award for its “game changing” DoubleBlind Encryption technology. This report compares 11 popular email archiving solutions and offers valuable advice for selecting the right email archiving solution for your organization.
» Read this report!

What Are Your Obligations to Retain Email and Other Electronic Content?
This email archiving whitepaper discusses industry and government requirements for retaining email and other electronic content. It explores the content retention challenges faced by those both regulated and non-regulated organizations and offers practical advice for organizations that seek to address archiving challenges.
» Download the Analyst Report!

Making Office 365 More Secure and Compliant
While Microsoft's robust and scalable solution will satisfy the security, compliance and governance requirements of many organizations, there are some organizations that will need compliance and security capabilities not available with Office 365. Learn more in this free Osterman Research report.
» Read this analyst report!

Email Archiving: Realizing the Cost Savings and Other Benefits from SaaS
This Osterman Research report discusses the dramatic cost savings that companies can realize by adopting a SaaS model for email archiving versus an on-premises approach. SaaS reduces the total cost of ownership for archiving and provides numerous other benefits.
» Download the Analyst Report!

Why You Need to Consider Cloud-Based Security in 2012
Learn how cloud-based security solutions can better protect your organization's data and endpoints, while greatly reducing costs. This 2012 Osterman Research report recommends that enterprises seriously consider cloud security capabilities as a replacement for, or supplement to, on-premises security defenses.
» Download the Analyst Report!

Using SaaS to Reduce the Costs of Email Security
This paper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
» Download the Analyst Report!

Talk Now
Try it Now
Live Demo

Webinar
Webinar Threats Gone Wild:
Turning security events from noise into insights and action
Register Now
2014 Targeted Attacks Study
Watch Now How to Detect, Predict and Eliminate Advanced Targeted Threats.
Download Now
Technology Brief
Information Governance: Taming the Data Wild West The UBM Techweb Technology Brief, Information Governance: Taming the Data Wild West
Download Now »
©2014 Proofpoint, Inc.