BSI Cybersecurity and Information Resilience (UK) Ltd

Proofpoint Threat Protection Suite & Continuity

Proofpoint Email Protection stops malware and non-malware threats and granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats never-before-seen attacks that use malicious attachments and URLs. Business continuity keeps email flowing, even when your email fails such as Office 365.

Features

  • Owns all security technology in solution
  • Smart Search: Comprehensive message tracing across mail agents in seconds.
  • URLs Sandboxing time of click, time of delivery (predictive analysis).
  • Sandboxing of URLs found inside attachments.
  • Attachment Sandboxing
  • Attachments delivered as-is (unaltered state)
  • Dedicated threat research team keeping up with changing threat landscape
  • Dynamic Imposter email classifier rules adjust as attackers change tactics
  • Business Continuity ensuring email flow during outage.

Benefits

  • Protects people from malicious attachments in email
  • Protects people from malicious URL's in attachments and email
  • Respond to threats faster
  • Protects people from impersonation attacks
  • Continue to send/receive email during outages, e.g Office 365 outage
  • Threat analysis through TAP Dashboard
  • Community based intelligence contains more than 800 billion data points
  • Deployment On-Prem or Cloud

Pricing

£30.60 to £46.88 per user per year

Service documents

Framework

G-Cloud 11

Service ID

8 0 9 2 4 3 2 2 1 3 1 7 9 3 4

Contact

BSI Cybersecurity and Information Resilience (UK) Ltd

Neil Ryan

+353 (1) 210 1711

gcloud@bsigroup.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Extension to messaging platform services – eg On Premise Exchange, Office 365, Google Apps
Cloud deployment model
Hybrid cloud
Service constraints
SLA's for the services are available here: https://www.proofpoint.com/sites/default/files/general_terms_hosted_services_sla_-_mar_2016.pdf
System requirements
None - Proofpoint is providing a hosted (SaaS) service.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Dependant on Service Level Purchased
Support Portal - All Levels
Telephone Support Business Hours
Telephone Support 365x24x7
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Self-Service, Platinum, Premium & Global

Self-Service: primary access via portal, phone support limited to business hours P1 issues, 2 authorised support contacts

Platinum: access via portal and phone, phone support for all priorities during business hours plus P1 issues 24x7, 4 authorised support contacts

Premium: access via portal and phone, phone support for all priorities during business hours plus P1 issues 24x7, 6 authorised support contacts, assigned Technical Account Manager 

Global: available to Platinum and Premium only. phone access for all cases, all priorities 24x7x365, 12 authorised support contacts
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Installation and training / knowledge share available with dedicated engineer
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data extraction tools driven by customer.
End-of-contract process
Services cease to function.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
No
API
Yes
What users can and can't do using the API
Utilisation of a reporting dashboard - eg Palo Alto
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
All Proofpoint SaaS systems are actively monitored with local agents collecting hundreds of metrics specific to hardware, networking, and OS. All metrics are measured against a baseline compiled from historical data. Acceptable thresholds are defined based on a combination of optimal performance targets and historical baselines.

Analytics

Service usage metrics
Yes
Metrics types
Granular Reporting of message flow, deep analysis into threats
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Proofpoint

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
AES 256 is used to encrypt data at rest in the Proofpoint services.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data extraction tools driven by customer.
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
https://www.Proofpoint.com/sites/default/files/general_terms_hosted_services_sla_-_mar_2016.pdf
Approach to resilience
The Email Protection service runs in active/active mode between a pair of geographically-diverse data centers. Under normal operation, approximately 50% of customer email is filtered in each data center. In the event of the loss of one data center, 100% of customer email is filtered in the unaffected data center.
Outage reporting
Service outages are reported via email and on the customer support portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Identity federation with existing provider (for example Google apps)
Username or password
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
16/06/2016
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
None
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • CSA STAR Self Assessment Registry
  • TRUSTe Data Provacy Assessment
  • Privacy Shield Framework

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Proofpoint has a documented information security program that broadly aligns with NIST 800-53 and ISO 27001, and is evaluated annualy by a third-party in the form of a SOC 2 Type II audit report.
Information security policies and processes
Proofpoint has a documented information security program that broadly aligns with NIST 800-53 and ISO 27001, and is evaluated annualy by a third-party in the form of a SOC 2 Type II audit report.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Proofpoint has an established change management program that covers processes, procedures, technical implementations, security controls, infrastructure, and more. All changes are documented in a Change Ticket and reviewed and approved by the Change Review Board prior to implementation in the Proofpoint production environment.
Vulnerability management type
Undisclosed
Vulnerability management approach
Proofpoint has a documented Patch Management Policy that includes procedures for remediation, testing and promotion to the Proofpoint production environment. Vulnerabilities are prioritized based on applicability and criticality.
Protective monitoring type
Undisclosed
Protective monitoring approach
Proofpoint has implemented a security monitoring infrastructure that includes network-based IDS, quarterly external vulnerability scanning and annual penetration testing. IDS and security audit logs are directed to Splunk for aggregation and alerting to a 24x7 SOC. Continuous monitoring includes monthly and quarterly evidence collection and review to ensure that security controls remain effective and in place between annual SOC 2 audits.
Incident management type
Undisclosed
Incident management approach
Proofpoint has a documented Incident Response Plan that includes procedures for the detection, investigation, remediation and communication of security incidents.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£30.60 to £46.88 per user per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full service offering as a Proof of Concept for 2 weeks as standard at customers request
Link to free trial
Provided by a Proofpoint Engineer once requirements are confirmed.

Service documents

Return to top ↑