Source |
ProofPoint |
Identifiant |
8603944 |
Date de publication |
2024-10-30 14:01:17 (vue: 2024-10-30 23:07:05) |
Titre |
Comment la protection de l'information ProofPoint offre une valeur aux clients How Proofpoint Information Protection Provides Value for Customers |
Texte |
Recently, I read the Gartner® research report, Demystifying Microsoft\'s Data Security Capabilities and Licensing. Many of the report\'s findings aligned with what dozens of customers have shared with me over the past several years.
I have seen many organizations turn to Proofpoint Information Protection solutions after encountering challenges with other vendors\' offerings. Today, more than half of Fortune 100 companies trust Proofpoint to power their data loss prevention (DLP) programs.
This isn\'t by chance. When comparing Proofpoint DLP with other solutions, our offering stands out as the clear choice. In this blog post, I\'ll highlight the key reasons why I believe Proofpoint excels.
Realizing customer value
In my opinion, a key indicator of the value that Proofpoint brings is shown in the 2024 Gartner® Peer Insights™ Voice of the Customer for Data Loss Prevention. Proofpoint was the only vendor recognized with a Customers\' Choice distinction. This recognizes vendors who meet or exceed market averages for Overall Experience and User Interest and Adoption.
One of the reasons I believe why Proofpoint was recognized with this distinction is the way that we\'ve streamlined management and lowered costs. This can be seen when comparing our solution to Microsoft Purview. Because Proofpoint Managed Services runs Purview for some of our customers, our team was able to analyze how much time and effort it takes to operate and maintain it. According to Proofpoint analysis, organizations using Microsoft Purview experience:
A 33% detection rate of data loss incidents
50% more alerts to manage
2.5 times longer time to triage incidents
These inefficiencies directly translate into higher operational costs because organizations often must hire more staff to deal with increased alerts and the number of incidents to triage.
In contrast, Proofpoint uses a human-centric approach that provides deep insight into user intent, data and application access patterns. It provides capabilities that detect all manner of data loss incidents because its rules are both content- and context-based. This allows for protecting data and alerting on behaviors that are not possible with traditional, content-centric systems and assures far lower risks of false negatives and false positives.
For instance, Proofpoint will issue an alert if a user downloads a file from a sensitive data repository, encrypts it and transfers the file to a USB. In contrast, systems that employ a traditional approach rely on reading the content of data. This isn\'t reliable because of a variety of reasons, such as poorly written rules or encrypted data in transit.
Our intuitive interface and single, unified dashboard speed up investigations. This not only lowers management costs, but it also means that your data is better protected.
Proofpoint is not just technically superior. It also has significant cost advantages. Our team\'s analysis also compared the costs of operating and maintaining our DLP solution to Purview\'s. Organizations that make the switch to Proofpoint can expect:
A 50% reduction in total cost of ownership
An average payback period of just 4.5 months based on breach avoidance and workforce efficiency
If you combine our detection capabilities and streamlined management with our cost benefits, then the value of our comprehensive solution becomes clear.
Proofpoint reduces risk
Proofpoint Information Protection takes a human-centric approach to security. We integrate user behavior and content telemetry across all DLP channels, including email, cloud apps, endpoints and the web. This context-rich data provides security analysts with what they need to quickly and accurately assess incidents-and prevent data loss before it happens.
Generative AI (GenAI) is a good example of why this is so important. You can\'t enforce acceptable use policies for GenAI tools if you don\'t understand your content |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
andrew 100 2024 2024 2024 ability able about acceptable access according accuracy accurately achieve across action adaptive administrative adoption advantages advise affiliates after against alert alerting alerts aligned all allows also altogether analysis analysts analyze and/or any application apply applying approach apps are asked assess assures average averages avoidance bales based because becomes before begin behavior behaviors believe benchmarking benefits better blog both brand breach brings built burden but can capabilities catapulted catastrophic centric certified challenges challenging chance channels chatbot chatgpt choice classification classifiers clear cloud combine companies company compared comparing completeness complexity comprehensive consist consists console consolidates construed content context contrast contributors control corporate cost costly costs create critical customer customers damage dashboard dashboards data day deal deep define deliver demystifying depicted deployments deploys design designation detect detection detectors develop did different directly disclaims distinction dlp does doesn doing don down downloads dozens drives easy effective efficiency efficiency effort email employ employees enables encountering encrypted encrypts end endorse endpoint endpoints enforce ensures error evaluate even event example exceed excels exceptions expect: experience experience: experiences expertise experts expose expressed face facing fact failed false far february file financial findings fitness fortune framework from fully gaps gartner gartner® gemini genai generative get good google goss half happens has have help herein higher highest highlight highly hire how however human identify immediate implement implied important inc incident incidents incidents incidents includes including increased increases indicator individual industry inefficiencies inefficient information insider insight insights insights™ instance integrate integrated intent interacting interest interface internationally intuitive investigations involves irm isn issue itm its journey just justify key large leads learn lengthy licensing like likely limitations listed longer loss losses lower lowered lowers maintain maintaining make makes manage manage managed management manner manual many mark market matches mature maturity max may means meet merchantability methodology microsoft might missed months more much multiple must native navigate need negatives nor not number offering offerings offers often once one one only operate operating operational operations opinion opinions organization organizations other out outcomes over overall own ownership parses particular partners past paste pastes patterns payback peer peers people period permission platform plus policies policy poorly positives possible post power prevent prevented prevention processes product program programs progress prompt prone proofpoint proprietary protected protecting protection proven provide provides publications purpose purview putting quick quickly rate ratings read reading real realizing reasons recently recognized recognizes reduces reduction registered reliable rely report reporting repository represent require requires research reserved resources respect result rich right rights risk risk risks roi rules runs said save saw security see seem seen select sensitive separate september service services several shared shortage should shown siem significant simpler single six skilled skills slows solution solutions some something span speed spent staff stands stark statements strategies streamlined submitting success successful such superior switch switching system systems take takes task team technically technology telemetry than then these those threat throughout time times today tool tools total trademark traditional transfers transforms transit translate triage trust trying turn typed understand unified unmatched upload usb use used user users uses using valuable va |
Tags |
Tool
Threat
Cloud
|
Stories |
ChatGPT
|
Move |
|