PROOFPOINT in Big Data Security Solutions

USP : Mitigate insider threats, reduce the impact of breaches, and comply with regulations. Accurately discover, monitor, and protect sensitive data on file shares, data stores, and SharePoint sites.

BUYERS
VENDORS
EXPERTS
2.7
ANALYSTS
 

PROOFPOINT detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
3.0
3.8
3.7
Breadth and Depth of Product Offerings
3.55
4.30
3.95
Product Features and Functionality
3.30
4.00
3.60
Focus on Product Innovation
2.50
2.55
3.40
Product Differentiation and Impact on Customer Value
3.90
5.00
5.00
Product Differentiation and Impact on Customer Value
1.35
3.50
3.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

PROOFPOINT has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Europe

    24 Participants

  • Niche Quadrant

    All-Asia-Pacific

    23 Participants

  • Niche Quadrant

    All-North America

    25 Participants

STRENGTHS
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Managed Security Services
  • Product Maturity / Services Offered
    Support and Maintenance
  • Product Maturity / Technology
    Intrusion Detection System/Intrusion Prevention System (Ids/Ips)
  • Product Maturity / Technology
    Product Variants
  • Product Maturity / Technology
    Security Information And Event Management (Siem)
  • Product Maturity / Technology
    Unified Threat Management (Utm)
  • Product Maturity / Software Offered
    Access Control
  • Product Maturity / Software Offered
    Backup and Recovery
  • Product Maturity / Software Offered
    Security Intelligence
  • Product Maturity / Software Offered
    Technology
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Direct Presence - Europe
  • Company Maturity / Geographic Footprint
    Direct Presence - North America
  • Company Maturity / Geographic Footprint
    Indirect Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Indirect Presence - Europe
  • Company Maturity / Geographic Footprint
    Indirect Presence - North America
  • Company Maturity / Geographic Footprint
    Sales Office - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Sales Office - Europe
WEAKNESSES
  • Product Maturity / Services Offered
    Education and Training
  • Product Maturity / Technology
    Other Technology Offered
  • Product Maturity / Software Offered
    Big Data Governance
  • Product Maturity / Software Offered
    Others (Big Data Customization and Discovery, and Audit and Reporting)
  • Company Maturity / Geographic Footprint
    Direct Presence - Latin America
  • Company Maturity / Geographic Footprint
    Direct Presence - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Indirect Presence - Latin America
  • Company Maturity / Geographic Footprint
    Indirect Presence - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Sales Office - Latin America
  • Company Maturity / Geographic Footprint
    Sales Office - Middle East and Africa
  • Company Maturity / Partner Ecosystem
    Consultants
  • Company Maturity / Partner Ecosystem
    Managed Service Providers
  • Company Maturity / Partner Ecosystem
    OEMs
  • Company Maturity / Partner Ecosystem
    Other Partner Ecosystem
  • Company Maturity / Partner Ecosystem
    Value Added Resellers (VAR)
  • Company Maturity / Industry Verticals
    Energy and Utilities
  • Company Maturity / Industry Verticals
    Government and Public Sector
  • Company Maturity / Industry Verticals
    IT and Telecom
  • Company Maturity / Industry Verticals
    Manufacturing
  • Company Maturity / Industry Verticals
    Media and Entertainment
See More

Have you EVER used PROOFPOINT Products?

Share your experience with potential buyers.

TOP FEATURES
  • Technology / Intrusion Detection System/Intrusion Prevention..
    Ips)
  • Technology
    Product Variants
  • Technology
    Security Information And Event Management (S..
  • Services Offered
    Support and Maintenance
  • Software Offered
    Backup and Recovery
  • Software Offered
    Access Control
  • Technology
    Unified Threat Management (Utm)
  • Software Offered
    Technology
  • Services Offered
    Consulting Services
  • Software Offered
    Security Intelligence

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS