Skip to main content

Help us improve the Digital Marketplace - send your feedback

Softcat Limited

Proofpoint CASB

Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,

Features

  • URLs Sandboxing time of click, time of delivery (predictive analysis)
  • Sandboxing of URLs found inside attachments
  • Attachment Sandboxing
  • Owns all security technology in solution
  • Attachments delivered as-is (unaltered state)
  • Granular threat forensics (name, indicators of compromise, exploit environment)
  • Smart Search: Comprehensive message tracing across mail agents in seconds
  • Dedicated threat research team keeping up with changing threat landscape
  • Dynamic Imposter email classifier rules adjust as attackers change tactics

Benefits

  • Protects people from malicious attachments in email
  • Protects people from malicious URL's in attachments and email
  • Respond to threats faster
  • Protects people from impersonation attacks
  • Deployment On-Prem or Cloud
  • Threat analysis through TAP Dashboard
  • Community based intelligence contains more than 800 billion data-points

Pricing

£16.28 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 0 3 5 0 7 4 8 1 7 2 2 7 0 5

Contact

Softcat Limited Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com

Service scope

Software add-on or extension
No
Cloud deployment model
Community cloud
Service constraints
See Service Level Agreement
System requirements
  • None in API mode
  • In PROXY(SAML) mode requires SAML compliant application

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7x365, service response is immediate with ticket reference. Answers to questions might vary depending on the question/s however this is measured and managed under specific service response guidelines and audited yearly by both industry and customers.
Proofpoint's support program is available here: https://www.proofpoint.com/license

Our SLA response times for open trouble tickets are based on our support services program document, which is located here: https://www.proofpoint.com/sites/default/files/pfpt-en-support-services-program-171212.pdf
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via support portal, in a browser
Web chat accessibility testing
https://www.proofpoint.com/us/support/technical-support-offerings
Onsite support
No
Support levels
See support documentation published: https://www.proofpoint.com/license
Support available to third parties
Yes

Onboarding and offboarding

Getting started
End to end configuration provided as part of the service
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
.doc, .xlsx, and. .ppt
End-of-contract data extraction
No customer data is stored by Proofpoint CASB. Configuration and user enablement data can be off-loaded / deleted by request at the end of the customer agreement.
End-of-contract process
Customer service ends, API links and/or SAML Proxy gateway is cancelled and open. Customer configuration data is deleted or stored for a year pending customer requirements.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Full functionality via API
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Yes principally this is enabled via rules and configurations

Via rule sets, dictionaries/detectors/smart ID's, network configuration, VAP/VIP/user/group/location/user agent/IP reputation, alerting & notifications, and more

Scaling

Independence of resources
We load balance the services and scale based on demand 50%+

Analytics

Service usage metrics
Yes
Metrics types
File/Folder events, Login events, Root level activity (GSuite), Site events /Sharepoint, Application events
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Proofpoint

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
AES 256
Access to the Proofpoint production environment, where services are hosted, is granted based on role and occurs via a 2FA encrypted VPN.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data extraction tools driven by customer.
Data export formats
Other
Other data export formats
N/A
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
Proofpoint has documented information security program consisting of policies, procedures and standards that aligns with the requirements of NIST 800-53 and ISO 27001. The program is owned by the Proofpoint Global Information Security group, and includes a continuous monitoring program consisting of monthly and quarterly evidence collection and review, and an annual SOC 2 Type II audit of the program.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our SLA response times for open trouble tickets are based on our support services program document, which is located here: https://www.proofpoint.com/sites/default/files/pfpt-en-support-services-program-171212.pdf
Approach to resilience
The Proofpoint CASB ("PCASB") system is a cloud-native distributed platform. All data infrastructure components and runtime services are distributed and replicated across multiple fault domains, with automatic failover in case of outage. Data infrastructure components have replication and automatic failover built in, which means partial outages are remediated automatically. Runtime services are fronted by AWS ELB and auto-scaling groups, which automatically spins up new instances in case of instance failures. In case of total disaster, all data is backed up or archived to AWS S3 (encrypted, zero-trust access by default) and can be restored in another datacenter. All the underlying data stores used by PCASB are distributed, support native replication, and have automatic failover. All runtime services are deployed with multiple instances and self-healing/scaling capabilities. Web endpoints are exposed though Amazon’s ELB service, which provides HA guarantees. Internally, PCASB relies on an asynchronous message passing architecture, which limits the effects of local runtime failures and provides resiliency and continuity.
Outage reporting
The Proofpoint CASB ("PCASB") system is a cloud-native distributed platform. All data infrastructure components and runtime services are distributed and replicated across multiple fault domains, with automatic failover in case of outage. Data infrastructure components have replication and automatic failover built in, which means partial outages are remediated automatically. Runtime services are fronted by AWS ELB and auto-scaling groups, which automatically spins up new instances in case of instance failures. In case of total disaster, all data is backed up or archived to AWS S3 (encrypted, zero-trust access by default) and can be restored in another datacenter. All the underlying data stores used by PCASB are distributed, support native replication, and have automatic failover. All runtime services are deployed with multiple instances and self-healing/scaling capabilities. Web endpoints are exposed though Amazon’s ELB service, which provides HA guarantees. Internally, PCASB relies on an asynchronous message passing architecture, which limits the effects of local runtime failures and provides resiliency and continuity.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
All access to the Proofpoint production environment, where services are hosted, is via a 2FA encrypted VPN and granted based on role.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2 Type II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
The Proofpoint security program is led by the Proofpoint CSO. The program is based on identifying and mitigating risk to our personnel, the organization and the customer.
Information security policies and processes
Proofpoint's information security program is aligned with the requirements of NIST 800-53 and ISO 27001. However, we are not certified to the ISO 27001 standard.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Proofpoint has a documented change management policy that includes requirements around documented change tickets and review and approval by the Change Review Board.
Vulnerability management type
Undisclosed
Vulnerability management approach
Proofpoint performs internal and external vulnerability scanning and remediates applicable findings in line with the Proofpoint patch management policy.
Protective monitoring type
Undisclosed
Protective monitoring approach
Proofpoint has distributed monitoring in place for availability, performance, capacity and security. Alerts are directed to a 24x7 NOC or SOC for review, remediation and/or escalation.
Incident management type
Undisclosed
Incident management approach
Proofpoint has a documented Incident Response Plan that includes procedures to detect, investigate, remediate and communicate security incidents. A trained IRT team is responsible for the maintenance of the program.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.

We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.

We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.

At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.

In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.

Tackling economic inequality

As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.

We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.

We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.

We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.

For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.

We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.

Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.

Equal opportunity

Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.

Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.

Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.

Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.

Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.

Wellbeing

At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.

Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.

Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.

Pricing

Price
£16.28 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full service offering as a Proof of Concept for 2 weeks as standard at customers request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.