
Proofpoint, Inc. is an American enterprise cybersecurity company based in
Sunnyvale, California
Sunnyvale () is a city located in the Santa Clara Valley in northwest Santa Clara County in the U.S. state of California.
Sunnyvale lies along the historic El Camino Real and Highway 101 and is bordered by portions of San Jose to the no ...
that provides
software as a service
Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software.
SaaS is co ...
and products for
email security, identity threat defense,
data loss prevention
Data loss prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while ''in use'' (endpoint actions), ''in motion'' (network traffic), and ' ...
,
electronic discovery
Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often r ...
, and
email archiving.
In 2021, Proofpoint was acquired by private equity firm
Thoma Bravo
Thoma Bravo, LP, is an American private equity and growth capital firm with offices in San Francisco, Chicago and Miami. It is known for being particularly active in acquiring software companies and has over $114 billion in assets under managem ...
for $12.3 billion.
History
Company
The company was founded in July 2002 by
Eric Hahn
Eric Hahn (born March 19, 1960) is an American serial entrepreneur and computer software programmer who founded an early e-mail-based groupware company called Collabra Software in 1992. Netscape acquired Collabra in 1995, and in 1997 Hahn became ...
, formerly the CTO of
Netscape Communications
Netscape Communications Corporation (originally Mosaic Communications Corporation) was an American independent computer services company with headquarters in Mountain View, California and then Dulles, Virginia. Its Netscape web browser was on ...
. It launched July 21, 2003, after raising a $7 million
Series A funding
A series A round (also known as series A financing or series A investment) is the name typically given to a company's first significant round of venture capital financing. The name refers to the class of preferred stock sold to investors in exchan ...
round, releasing its first product, and lining up six customers as references, and was backed by venture investors
Benchmark Capital
Benchmark is a venture capital firm based in San Francisco that provides seed money to startups.
History
The firm's most successful investment was a 1997 investment of $6.7 million in eBay for 22.1% of the company. In 2011, it invested $12 mill ...
and
Stanford University.
An additional $9 million in Series B funding led by New York-based
RRE Ventures
RRE Ventures is an American Venture Capital firm based in New York City. The firm primarily invests in seed, series A and series B rounds and focuses on companies operating in the software, internet, communications, aerospace, robotics, 3D printi ...
was announced in October, 2003.
Proofpoint became a publicly traded company in April 2012. At the time of its
initial public offering
An initial public offering (IPO) or stock launch is a public offering in which shares of a company are sold to institutional investors and usually also to retail (individual) investors. An IPO is typically underwritten by one or more investme ...
(IPO), the company's shares traded at $13 apiece; investors purchased more than 6.3 million shares through the IPO, raising more than $80 million.
On April 26, 2021, Proofpoint announced that it had agreed to be acquired by the private equity firm
Thoma Bravo
Thoma Bravo, LP, is an American private equity and growth capital firm with offices in San Francisco, Chicago and Miami. It is known for being particularly active in acquiring software companies and has over $114 billion in assets under managem ...
.
Product history
The company's first product was the Proofpoint Protection Server (PPS) for medium and large businesses. It incorporated what was described as "MLX Technology", proprietary
machine learning
Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence.
Machine ...
algorithms applied to the problem of accurately identifying
spam email
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming).
The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoida ...
using 10,000 different attributes to differentiate between spam and valid email. The company joined dozens of other anti-spam software providers
in a business opportunity fueled by an exponential increase in
spam volume that was threatening worker productivity, making spam a top business priority. According to the 2004 National Technology Readinesed the number of spam detection attributes to more than 50,000.
In 2004, strict new
HIPAA
The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
regulations governing financial disclosures and the privacy of health care data prompted Proofpoint to begin developing new products that would automatically identify and intercept outbound email containing sensitive information.
In March 2004, Proofpoint introduced its first hardware appliance, the P-Series Message Protection Appliance (later renamed Proofpoint Messaging Security Gateway), using a hardened Linux kernel and Proofpoint's Protection Server 2.0 software. It was tested by Infoworld and found to stop 94% of spam.
Another product introduction in November 2004 included Protection Server 3.0, with Email Firewall and MLX-based Dynamic Reputation Analysis, and the Content Security Suite, plug-in modules designed for scanning outbound messages and their attachments to assist in compliance with data protection regulations such as
Sarbanes–Oxley,
HIPAA
The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
, and
Gramm–Leach–Bliley. In combination, this was known as the Proofpoint Messaging Security Gateway Appliance. It was reviewed by ChannelWeb, which observed that it used a "combination of technologies:
policy-based management Policy-based managementM.S. Sloman, "Policy Driven Management for Distributed Systems," Journal of Network and Systems Management, Vol. 2, No. 4, pp. 333-360, Plenoum Press, December 1994. is a technology that can simplify the complex task of managi ...
, a spam-filtering engine and adaptive learning technology."
Proofpoint introduced a new product, the Network Content Sentry, as an add-on appliance to the Content Security Suite in August 2005.
["Proofpoint, Voltage Team on E-Mail Encryption"](_blank)
eweek.com, August 1, 2005. Designed to monitor online messaging other than email, the appliance monitors Web mail, message boards, blogs and FTP-based communications. Proofpoint also introduced policy-based
email encryption Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may also include authentication.
Email is prone to the disclosure of information. Most emails a ...
features, using identity-based encryption technology licensed from Voltage Security.
Virtual appliance development
In a step towards simpler operational requirements, the Proofpoint Messaging Security Gateway Virtual Edition was released in April 2007. The product runs as a
virtual appliance
A virtual appliance is a pre-configured virtual machine image, ready to run on a hypervisor; virtual appliances are a subset of the broader class of software appliances. Installation of a software appliance on a virtual machine and packaging that ...
on a host running VMware's virtual server software. Moving a dedicated hardware appliance to a virtual server eliminates problems associated with proprietary hardware and reduces upgrade costs, though it does require knowledge of VMware's
virtual server architecture.
Proofpoint Messaging Security Gateway V5.0 was released in June 2007, and was based on a new, integrated architecture, combining all its capabilities into a single platform. It could be run either as a dedicated appliance, virtual appliance, or software suite.
ICSA Labs, an independent division of
Verizon Business
Verizon Business (formerly known as Verizon Enterprise Solutions) is a division of Verizon Communications based in Basking Ridge, New Jersey that provides services and products for Verizon's business and government clients around the world.
I ...
, announced in April 2007, that it had certified six anti-spam products under their new testing program, one of which was the Proofpoint Messaging Security Gateway. The goal of ICSA Labs' anti-spam product testing and certification is to evaluate product effectiveness in detecting and removing spam. The guidelines also address how well the products recognize e-mail messages from legitimate sources.
Software as a service
Moving into the
software-as-a-service
Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software.
SaaS is cons ...
business, Proofpoint introduced Proofpoint on Demand, a hosted version of its email security and data loss prevention offerings. In May, 2008, the company's hosted offerings were expanded with the introduction of Proofpoint on Demand—Standard Edition. The product is targeted at small-to-medium size businesses that need email security but do not run their own servers or have on-site IT personnel.
Products
Proofpoint products are designed to solve three business problems: advanced
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
threats, regulatory
compliance
Compliance can mean:
Healthcare
* Compliance (medicine), a patient's (or doctor's) adherence to a recommended course of treatment
* Compliance (physiology), the tendency of a hollow organ to resist recoil toward its original dimensions (this is a ...
, and brand-impostor fraud (which it calls "digital risk"). These products work across
email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
,
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
,
mobile device
A mobile device (or handheld computer) is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical ...
s, and the
cloud
In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may ...
.
Email security
Proofpoint offers software or
SaaS
Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software.
SaaS is co ...
aimed at different facets of email security. Its flagship product the Proofpoint Messaging Security Gateway. The Messaging Security Gateway is a web-based application that offers spam protection; based on both user defined rules as well as dynamically updated definitions, anti-virus scanning, and configurable email firewall rules.
Additionally, in June 2008, Proofpoint acquired
Fortiva, Inc., a provider of on-demand
email archiving software for legal discovery, regulatory compliance and email storage management.
Fortiva used Exchange journaling to automatically archive all internal and external communications so that end users can search all archived messages, including attachments, directly from a search folder in Outlook.
Cybersecurity
Proofpoint's security portfolio includes products that stop both traditional
cyberattack
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
s (delivered via malicious attachments and URLs) and socially engineered attacks—such as
business email compromise
Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unre ...
(BEC) and credential phishing—that do not use
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
. It uses a blend of sandbox analysis, reputational analysis, automated threat data, human threat intelligence and attributes such as sender/recipient relationship, headers, and content, and more to detect potential threats. Automated
encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
, data-loss prevention and forensics-gathering tools are designed to speed incident response and mitigate the damage and costs of any threats that do get through. The portfolio also includes protection from social-media account takeovers, harmful
mobile app
A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on ...
s, and rogue
Wi-Fi networks.
Regulatory compliance
Proofpoint's compliance products are designed to reduce the manual labor involved in identifying potentially sensitive data, managing and supervising it in compliance with government and industry rules, and producing it quickly in
e-discovery
Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often refe ...
legal requests.
Digital risk
Proofpoint's digital risk products are aimed at companies seeking to stop
cybercriminals from impersonating their brand to harm customers, partners, and the brand's reputation. Its email digital risk portfolio includes authentication technology to prevent email domain spoofing. On social media, it stops scams in which fraudsters create fake customer-service accounts to find people seeking help over social media and trick them into handing over account credentials or visiting a malicious website. And in mobile, it finds counterfeit apps distributed through mobile app stores.
In the 2016
Forrester Wave for Digital Risk Monitoring, Q3 2016 the Proofpoint digital risk /
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
product was included in an evaluation of the nine top vendors in this emerging market. These monitor "digital" (i.e.
social
Social organisms, including human(s), live collectively in interacting populations. This interaction is considered social whether they are aware of it or not, and whether the exchange is voluntary or not.
Etymology
The word "social" derives from ...
,
mobile
Mobile may refer to:
Places
* Mobile, Alabama, a U.S. port city
* Mobile County, Alabama
* Mobile, Arizona, a small town near Phoenix, U.S.
* Mobile, Newfoundland and Labrador
Arts, entertainment, and media Music Groups and labels
* Mobile ...
,
web
Web most often refers to:
* Spider web, a silken structure created by the animal
* World Wide Web or the Web, an Internet-based hypertext system
Web, WEB, or the Web may also refer to:
Computing
* WEB, a literate programming system created b ...
, and
dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
) channels to detect, prevent, malicious or unwanted content from undermining organizational efforts to build brand across all major social media platforms.
On October 23, 2014 Proofpoint acquired Nexgate, Inc., a social media and security compliance vendor. On November 4, 2015 Proofpoint acquired Socialware Inc., a compliance workflow & content capture and review technology company.
Acquisitions
References
External links
* {{Official website
2002 establishments in California
2012 initial public offerings
Anti-spam
Companies based in Sunnyvale, California
Companies formerly listed on the Nasdaq
Computer archives
Computer security software companies
Networking companies of the United States
Software companies based in the San Francisco Bay Area
Software companies established in 2002
Software companies of the United States
Spam filtering