Big Data Platform
Technologies to store, scale and process vast volumes of data
Big Data Techniques
Underlying all of Proofpoint's solutions is our Big Data Platform, which uses both proprietary and open source "Big Data" technologies to store, scale and process vast volumes of data. Proofpoint has pioneered the use of web-scale technologies including Hadoop, Cassandra, MapReduce, and Hive in the delivery of enterprise security and data protection solutions. Big Data techniques enable Proofpoint to rapidly analyze and gain insight from massive amounts of data. The result is better data protection, higher performance and superior scalability for your organization. Proofpoint leverages these Big Data technologies and analysis techniques across its entire solution suite, indexing petabytes of information in real-time to discover threats, to detect data leaks and to enable end-users to quickly and efficiently access information distributed across their organizations.
Superior Protection Against Advanced Targeted ThreatsDownload Gartner ReportDefending against Advanced Threats
Using a combination of proprietary technologies for Big Data analytics, machine learning and deep content inspection, Proofpoint accurately detects and stop targeted "spear phishing" and other sophisticated attacks. By processing and modeling billions of requests per day, our technology can recognize anomalies in traffic flow to detect targeted attacks, distinguish between valid messages and "phishing" messages, and detect targeted "zero-hour" attacks in real time and quarantine them appropriately.
High Performance Search
By employing parallel, Big Data search techniques, Proofpoint delivers search performance measured in seconds, even when searching hundreds of terabytes of archived data. Traditional on-premises solutions can take hours or even days to return search results from a complex query.
Accurate Real Time Reputation
Proofpoint leverages machine learning and Big Data analytics to analyze and correlate billions of requests per day to create a dynamic reputation profile of hundreds of millions of IP addresses, domains, web links and other Internet content. This database of reputation profiles is used to help identify and block malicious attacks.