Proofpoint CASB
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,
Features
- URLs Sandboxing time of click, time of delivery (predictive analysis)
- Sandboxing of URLs found inside attachments
- Attachment Sandboxing
- Owns all security technology in solution
- Attachments delivered as-is (unaltered state)
- Granular threat forensics (name, indicators of compromise, exploit environment)
- Smart Search: Comprehensive message tracing across mail agents in seconds
- Dedicated threat research team keeping up with changing threat landscape
- Dynamic Imposter email classifier rules adjust as attackers change tactics
Benefits
- Protects people from malicious attachments in email
- Protects people from malicious URL's in attachments and email
- Respond to threats faster
- Protects people from impersonation attacks
- Deployment On-Prem or Cloud
- Threat analysis through TAP Dashboard
- Community based intelligence contains more than 800 billion data-points
Pricing
£16.28 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 0 3 5 0 7 4 8 1 7 2 2 7 0 5
Contact
Softcat Limited
Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Community cloud
- Service constraints
- See Service Level Agreement
- System requirements
-
- None in API mode
- In PROXY(SAML) mode requires SAML compliant application
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
24x7x365, service response is immediate with ticket reference. Answers to questions might vary depending on the question/s however this is measured and managed under specific service response guidelines and audited yearly by both industry and customers.
Proofpoint's support program is available here: https://www.proofpoint.com/license
Our SLA response times for open trouble tickets are based on our support services program document, which is located here: https://www.proofpoint.com/sites/default/files/pfpt-en-support-services-program-171212.pdf - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Via support portal, in a browser
- Web chat accessibility testing
- https://www.proofpoint.com/us/support/technical-support-offerings
- Onsite support
- No
- Support levels
- See support documentation published: https://www.proofpoint.com/license
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- End to end configuration provided as part of the service
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- .doc, .xlsx, and. .ppt
- End-of-contract data extraction
- No customer data is stored by Proofpoint CASB. Configuration and user enablement data can be off-loaded / deleted by request at the end of the customer agreement.
- End-of-contract process
- Customer service ends, API links and/or SAML Proxy gateway is cancelled and open. Customer configuration data is deleted or stored for a year pending customer requirements.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Full functionality via API
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Yes principally this is enabled via rules and configurations
Via rule sets, dictionaries/detectors/smart ID's, network configuration, VAP/VIP/user/group/location/user agent/IP reputation, alerting & notifications, and more
Scaling
- Independence of resources
- We load balance the services and scale based on demand 50%+
Analytics
- Service usage metrics
- Yes
- Metrics types
- File/Folder events, Login events, Root level activity (GSuite), Site events /Sharepoint, Application events
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Proofpoint
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
AES 256
Access to the Proofpoint production environment, where services are hosted, is granted based on role and occurs via a 2FA encrypted VPN. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data extraction tools driven by customer.
- Data export formats
- Other
- Other data export formats
- N/A
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Proofpoint has documented information security program consisting of policies, procedures and standards that aligns with the requirements of NIST 800-53 and ISO 27001. The program is owned by the Proofpoint Global Information Security group, and includes a continuous monitoring program consisting of monthly and quarterly evidence collection and review, and an annual SOC 2 Type II audit of the program.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our SLA response times for open trouble tickets are based on our support services program document, which is located here: https://www.proofpoint.com/sites/default/files/pfpt-en-support-services-program-171212.pdf
- Approach to resilience
- The Proofpoint CASB ("PCASB") system is a cloud-native distributed platform. All data infrastructure components and runtime services are distributed and replicated across multiple fault domains, with automatic failover in case of outage. Data infrastructure components have replication and automatic failover built in, which means partial outages are remediated automatically. Runtime services are fronted by AWS ELB and auto-scaling groups, which automatically spins up new instances in case of instance failures. In case of total disaster, all data is backed up or archived to AWS S3 (encrypted, zero-trust access by default) and can be restored in another datacenter. All the underlying data stores used by PCASB are distributed, support native replication, and have automatic failover. All runtime services are deployed with multiple instances and self-healing/scaling capabilities. Web endpoints are exposed though Amazon’s ELB service, which provides HA guarantees. Internally, PCASB relies on an asynchronous message passing architecture, which limits the effects of local runtime failures and provides resiliency and continuity.
- Outage reporting
- The Proofpoint CASB ("PCASB") system is a cloud-native distributed platform. All data infrastructure components and runtime services are distributed and replicated across multiple fault domains, with automatic failover in case of outage. Data infrastructure components have replication and automatic failover built in, which means partial outages are remediated automatically. Runtime services are fronted by AWS ELB and auto-scaling groups, which automatically spins up new instances in case of instance failures. In case of total disaster, all data is backed up or archived to AWS S3 (encrypted, zero-trust access by default) and can be restored in another datacenter. All the underlying data stores used by PCASB are distributed, support native replication, and have automatic failover. All runtime services are deployed with multiple instances and self-healing/scaling capabilities. Web endpoints are exposed though Amazon’s ELB service, which provides HA guarantees. Internally, PCASB relies on an asynchronous message passing architecture, which limits the effects of local runtime failures and provides resiliency and continuity.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- All access to the Proofpoint production environment, where services are hosted, is via a 2FA encrypted VPN and granted based on role.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Less than 1 month
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 Type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The Proofpoint security program is led by the Proofpoint CSO. The program is based on identifying and mitigating risk to our personnel, the organization and the customer.
- Information security policies and processes
- Proofpoint's information security program is aligned with the requirements of NIST 800-53 and ISO 27001. However, we are not certified to the ISO 27001 standard.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Proofpoint has a documented change management policy that includes requirements around documented change tickets and review and approval by the Change Review Board.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Proofpoint performs internal and external vulnerability scanning and remediates applicable findings in line with the Proofpoint patch management policy.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Proofpoint has distributed monitoring in place for availability, performance, capacity and security. Alerts are directed to a 24x7 NOC or SOC for review, remediation and/or escalation.
- Incident management type
- Undisclosed
- Incident management approach
- Proofpoint has a documented Incident Response Plan that includes procedures to detect, investigate, remediate and communicate security incidents. A trained IRT team is responsible for the maintenance of the program.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.
We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.
We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.
At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.
In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.Tackling economic inequality
As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.
We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.
We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.
We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.
For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.
We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.
Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.Equal opportunity
Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.
Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.
Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.
Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.
Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.Wellbeing
At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.
Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.
Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.
Pricing
- Price
- £16.28 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full service offering as a Proof of Concept for 2 weeks as standard at customers request.