Cloudmark Labs483918876

Programmation informatique

41 boulevard des Capucines 75002 Paris

Indice de confiance

Laissez un avis

Chiffre d'affaires 2018

2,2 M€

Gérant

Gary

Steele

Effectif 2018

11

Ancienneté

14 ans

Indicateurs

À propos

Proofpoint is a next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks.Source : Facebook

We provide the most effective security & compliance solutions to respond to cyber attacks in every channel including email, web, the cloud, and social media.Source : Twitter

Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.Source : Youtube

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.Source : Site web

La création et le développement technologique d'outils de gestion de Plateformes de messagerie électronique sur la base de la technologie propriété de la société Bizanga ltd. Le négoce et la vente des solutions ainsi développées en ce compris des logiciels, équipements et matériels nécessaires ainsi que toutes activités connexes et complémentairesSource : BODACC

Cloudmark Labs a actuellement pour Gérant Gary Steele. Ses locaux se situent à Paris. Son indice de confiance est de 95 sur 100. En 2009, l'entreprise Cloudmark Labs avait 7 500 euros de capital. Elle a été créée en 2005. Elle détient le numéro de TVA est le suivant : FR29483918876. Le SIREN de l'entreprise Cloudmark Labs est : 483918876. Il y avait 11 salariés qui travaillaient pour cette dernière au cours de l'année 2018. Cette dernière appartient au secteur de la programmation informatique, le code NAF lié est 6201Z. Cette société est relativement présente sur différents réseaux sociaux notamment Facebook puis Twitter. Vous pouvez retrouver la page Facebook de cette entreprise sous le nom de proofpoint et sur Twitter sous le nom de proofpoint. Une société plutôt active sur les réseaux, elle possède 25003 followers sur son compte Twitter puis 4105 likes sur sa page Facebook.

Fiche d'identité

  1. Type Société à responsabilité limitée (SARL)
  2. Date de création 01/09/2005
  3. Effectif 11 (2018)
  4. Capital social 7 500€ (2009)
  5. Chiffre d'affaires 2,2 M€ (2018)
  6. TVA intercommunautaire FR29483918876
  7. Numéro de SIREN 483918876
  8. Code NAF Programmation informatique (6201Z)
  9. Statut SIRENE Active
  10. Statut RCS Immatriculée (20/12/2005)

Contacts

Site web

Site internet de Cloudmark Labs

Réseaux sociaux

Téléphone

Email

{[{emailItem.email}]}

****@*******rk.com

Obtenez des millions de téléphones et emails nominatifs.

En savoir plus

Il s’agit de votre entreprise ?

Mettez en valeur votre activité en complétant les informations de cette page et invitez vos partenaires à vous évaluer pour construire votre e-réputation.

Revendiquez votre page gratuitement !

Avis Cloudmark Labs (0)

Que pensez-vous de Cloudmark Labs ?

Actuellement aucun avis publié, soyez le premier !

Laisser un avis

Dirigeants Cloudmark Labs (7)

Âge moyen des dirigeants

57 ANS

Durée moyenne de mandat

2 ANs 3 MOIS

Parité

0%100%
  • Gary Steele

    Gérant

    2018 - Présent

    En poste
  • Paul Auvil Iii

    Gérant

    2018 - Présent

    En poste
  • Gva Audit

    Commissaire aux comptes titulaire

    2017 - Présent

    En poste
  • George Riedel

    Gérant

    jusqu'en 2017

    Ancien
  • Marina Hardof

    Gérant

    jusqu'en 2018

    Ancien
  • Jason Donahue

    Gérant

    jusqu'en 2018

    Ancien
  • Muriel Nouchy

    Commissaire aux comptes suppléant

    2017 - 2020

    Ancien

Chiffre d'affaires, bilans Cloudmark Labs (3)

Durée de l'exercice comptable : 12 mois

Chiffre d'affaires

2,2 M€

-44,5 %

Résultat net

124,3 k€

-25 %

Capacité d'autofinancement

140 k€

-23,9 %

Vous voulez le détail des comptes ?

Inscivez-vous et téléchargez le bilan et le compte de résultat des comptes sociaux déposés en 2018 par Cloudmark Labs

Télécharger les comptes

Chiffres clés

Chiffre d'affaires

2,2 M€

-44,5 %

Le volume des ventes au titre du dernier exercice a fortement chuté.

Résultat net

124,3 k€

-25 %

Capacité d'autofinancement

140 k€

-23,9 %

La CAF est positive par rapport au volume d'activité de l'exercice, la trésorerie générée par l'exploitation est faible.

Taille du bilan

1,2 M€

%

Fonds propres

956,1 k€

14,9 %

L'entreprise est très bien capitalisée par rapport à son niveau d'activité.

Trésorerie nette

196,5 k€

81,8 %

78,9% du fonds de roulement sert à financer le besoin en fonds de roulement. L'entreprise dispose d'une liquidité bien suffisante par rapport aux besoins générés par le cycle d'exploitation.

Ratios financiers

Rendement des fonds propres

15,1 %

-40 %

L'entreprise affiche des fonds propres et un résultat courant positifs.

Equilibre financier

688,7 %

Autonomie financière

81,1 %

11,6 %

La structure financière est excellente en termes de capitalisation.

Liquidité générale

5,3

5,2 %

Délai moyen clients

jour

Les clients de cette entreprise la règlent en moyenne à 0 jours, ce qui permet à l'entreprise de ne pas avoir de créances clients à recouvrer et optimise sa trésorerie.

Délai moyen fournisseurs

11 jours

0

Cette entreprise règle en moyenne ses fournisseurs à 11 jours, ce qui montre que l'entreprise règle ses clients dans un délai très court et peut impacter sa trésorerie.

Score financier

PRO

Accédez au score financier

Vérifiez et anticipez le risque de défaillance de vos clients, fournisseurs et partenaires.

En savoir plus

Liens capitalistiques

PRO

Accédez aux liens capitalistiques

Découvrez la structure du groupe auquel appartient cette entreprise : tête de groupe, actionnaire majoritaire et filiales.

En savoir plus

Contentieux Cloudmark Labs (1)

PRO

Accédez aux contentieux

Vérifiez et anticipez le risque juridique lié à vos clients, fournisseurs et partenaires.

En savoir plus

Annonces légales (26)

  • Modification

    26 janv. 2020

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    Commissaire aux comptes suppléant partant : Nouchy, Muriel.

  • Dépôt des comptes

    14 janv. 2020

    L'entreprise a déposé ses comptes annuels et rapports (arrêtés au 31/12/2018).

  • Dépôt des comptes

    3 févr. 2019

    L'entreprise a déposé ses comptes annuels et rapports (arrêtés au 31/12/2017).

  • Modification

    10 avr. 2018

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    Gérant partant : Hardof, Marina ; Gérant partant : Donahue, Jason ; nomination du Gérant : Auvil Iii, Paul Reeves ; nomination du Gérant : Steele, Gary Leigh.

  • Dépôt des comptes

    11 nov. 2017

    L'entreprise a déposé ses comptes annuels et rapports (arrêtés au 31/12/2016).

  • Modification

    23 août 2017

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    Gérant partant : Riedel, George Andrew.

  • Modification

    23 août 2017

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    Gérant partant : Riedel, George Andrew.

  • Modification

    20 janv. 2017

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    Gérant partant : Lemarie, Olivier.

  • Dépôt des comptes

    7 sept. 2016

    L'entreprise a déposé ses comptes annuels et rapports (arrêtés au 31/12/2015).

  • Modification

    27 nov. 2015

    CLOUDMARK LABS a apporté une modification à ses dirigeants ou son administration, qui se compose désormais comme telle :
    modification du Gérant Lemarie, Olivier, nomination du Gérant : Hardof, Marina.

  • Vous voulez voir toutes les annonces légales ?

    Créez un compte pour accéder à l'ensemble des données sur cette entreprise.

Adresse Cloudmark Labs (1)

  • Siret : 48391887600051 (siège social)

    Actif

    41 boulevard des Capucines 75002 Paris

    Programmation informatique (6201Z)

    30 juin 2010

    10 à 19

    Siret : 48391887600044

    Fermé

    16 passage Jouffroy 75009 Paris

    Édition de logiciels système et de réseau (5829A)

    2 févr. 2009

    30 juin 2010

  • Siret : 48391887600036

    Fermé

    32 rue de Londres 75009 Paris

    Édition de logiciels système et de réseau (5829A)

    12 oct. 2006

    2 févr. 2009

    Siret : 48391887600028

    Fermé

    38 rue de Berri (Chez Sdm) 75008 Paris

    5 déc. 2005

    12 oct. 2006

  • Siret : 48391887600010

    Fermé

    204 boulevard Bineau 92200 Neuilly-sur-Seine

    1 sept. 2005

    5 déc. 2005

Trafic du site web

Accédez aux statistiques du site web

Évaluez l'empreinte digitale de cette entreprise et son évolution grâce aux statistiques sur son trafic mensuel, ses sources du trafic, le temps passé par les internautes, etc.

En savoir plus

Réseaux sociaux Cloudmark Labs (3)

Vidéos Cloudmark Labs (50)

  • What is Malware?

    2 nov. 2018

    Malware, also known as malicious software, is a term used to describe malicious programs installed on end-user systems and servers, commonly known as a computer virus. They are designed to disrupt, disable, or take control of a computer system using clever techniques to trick users. The most common types of malware are: • Ransomware - locks a system until the victim pays a ransom to unlock it • Credential stealers - acquire usernames and passwords for accounts • Banking Trojans - target banking information, such as usernames and passwords • Keyloggers - record keystrokes to get passwords and account numbers • Rootkits - allow attackers to get control of systems Malware attacks are activated by tricking people into opening an infected file or clicking unsafe links, which not only put computers at risks, but also entire networks within organizations. That’s why stopping malware attacks starts with people. Learn more about malware, how to protect yourself from it, and how Proofpoint can help stop threats quickly and accurately: https://www.proofpoint.com/us/threat-reference/malware. Learn about Proofpoint’s Targeted Attack Protection https://www.proofpoint.com/us/products/ransomware-and-targeted-attack-protection Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Configure Imposter Email Display Name Repository – Proofpoint PPS Tutorial

    30 juil. 2018

    A repository of email display names allows organizations to protect users who are most likely to be targeted by an imposter attack. Watch as this video tutorial guides you through the step-by-step process of how to configure a repository of display names. Find out how to navigate the dashboard, learn about Stateful Compositing Scoring Service (CSS), how to identify users and display names, available report summaries, and more. Protect your most vulnerable people against cyber-attacks with the Proofpoint repository of email display names. Learn more about Proofpoint Email Fraud Protection https://www.proofpoint.com/us/solutions/email-fraud Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Changing the Game with People-Centric Cybersecurity

    28 janv. 2019

    The cloud has spawned a universe of connected devices. Digital transformation is changing the way we work and play. AI, deep learning and automation are opening new frontiers in cybersecurity and innovation. But at Proofpoint, we’re getting behind something truly radical: people. That’s because your people are your greatest asset—and biggest cybersecurity risk. Learn about our game-changing approach to cybersecurity protection. It’s a people-centric strategy, coupled with breakthrough innovation. Because no matter how technology is changing your organization, protection starts with people. Learn more about cybersecurity at https://www.proofpoint.com Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Protection starts with people

    1 oct. 2018

    They’re not always highly visible, but they’re highly vulnerable. And they’re not always who you would expect. Not everyone is a VIP. But anyone can be a VAP—a very attacked person. That’s because today’s cybersecurity attacks target people, not technology. Proofpoint helps you identify the VAPs in your environment with cybersecurity insight that spans all the channels your people use. See who is being attacked, how they’re being attacked and what you need to do to keep them protected. Our people-centric cybersecurity solutions help you prevent, defend against and respond to attacks that target your people. Keep your staff safe with Proofpoint. Because in today’s threat landscape, protection starts with people. To Learn more about Proofpoint, visit https://www.proofpoint.com/ or subscribe to Proofpoint's YouTube channel. Connect with Proofpoint on Twitter: https://twitter.com/proofpoint or Facebook: https://www.facebook.com/proofpoint.

  • Proofpoint Email Protection Suite – Product Demo

    11 déc. 2018

    Email is a primary source of cyber-attacks for many organizations, and it starts with people. Find out how Proofpoint’s multi-layered email security helps prevent, defend, and respond to email attacks quickly and effectively within an organization. Observe as Eric Shwake, Proofpoint Group Product Marketing Manager, walks through the Email Protection server for an inside look at the wide-range of offerings available, such as email firewall, spam detection, email encryption, and more. Proofpoint’s primary goal is to give security teams the insight needed to help them understand how attacks impact their organization and equip them with the tools necessary to act on them. Necessary tools include ones to remedy the threats, prevent them from spreading, and stop them from happening in the first place. Proofpoint takes a people-centric approach to security prevention, defense, and response. Learn more about Proofpoint Email Protection solutions https://www.proofpoint.com/us/product-family/email-protection Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint Email Encryption: Push, Pull, and Secure Reader Inbox

    26 juil. 2018

    This demo shows different ways of accessing secure messages using Proofpoint Email Encryption. Learn more: https://www.proofpoint.com/us/products/email-encryption

  • Proofpoint Email Fraud Defense Demo

    2 mai 2018

    Ryan Terry demonstrates Proofpoint Email Fraud Defense, which gives you the visibility, tools, and services to authorize legitimate email and block fraudulent messages before they reach the inbox. Learn more: https://www.proofpoint.com/us/products/email-fraud-defense

  • Product Demo for Proofpoint Essentials

    22 janv. 2019

    Get a free demo online and learn about Proofpoint Essentials, a cybersecurity and compliance solution designed for small and medium sized businesses. SME’s are being attacked by the same threats as large enterprises. Proofpoint Essentials protects people against both malware-based and malware-free attacks by leveraging an enterprise class protection engine and stopping these threats before they reach the end user. The Proofpoint Essentials dashboard gives administrators the intelligence and tools needed to make proper cybersecurity decisions. You can see an overview of what you are being targeted by, frequency of attacks, and messages being blocked from spam to malicious content. You can create inbound and outbound mail filters, identify specific information, and automatically encrypt any outgoing message based on filters you create. Proofpoint Essentials is a comprehensive platform that offers SME’s the enterprise class security and compliance they need, while being easy to manage to fit the need of IT and security professionals. Discover Proofpoint Essentials 6 and learn more at https://www.proofpoint.com/us/products/essentials. Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Threat Intelligence by Targeted Attack Protection - Product Demo

    11 déc. 2018

    Preventing email attacks from getting into your organization is crucial, but understanding them is just as important. Protect your people, your data, and your brand with Proofpoint Threat Intelligence provided by Targeted Attack Protection. The cyber threat intelligence tool is meant to provide your security team a clear picture and context of where threats originated, who is behind them, when they’ve attacked, what methods they used, and what they're after. Watch as Eric Shwake, Proofpoint Group Product Marketing Manager, walks us through the TAP dashboard and provides a detailed explanation of the available functions. Learn about the attack description dashboard, which provides detailed information about the attack and how it happened. Find out how understanding who your VAPs (Very Attacked People) are can provide your security teams the insight needed to take preventative measures and protect your most vulnerable people. Proofpoint’s primary goal is to give security teams the visibility and necessary tools to remedy threats, prevent them from spreading, and stop them from happening in the first place. Learn more about Proofpoint Threat Intelligence https://www.proofpoint.com/us/products/et-intelligence Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint Tutorial - Outbound/Inbound Email Process

    15 mai 2018

    This Proofpoint how-to video tutorial shows you how to simulate the lifecycle of an email.

  • Black Hat 2018 Demo: Phishing Simulation and Security Awareness

    22 août 2018

    Brett Shaw demonstrates Proofpoint Phishing and Security Awareness training platform which provides unique and effective anti-phishing filtering. Our web-based interface delivers simulated phishing emails and create teachable moments—right when your people click. These emails help employees understand how to spot an advanced attack and prevent future breaches. Learn more at https://www.proofpoint.com/us/products/phishing-simulation-security-awareness

  • What is Email Fraud?

    11 oct. 2018

    Email is essential for business communication, but the rise in email fraud is costing companies billions. So what is email fraud? Email fraud, also known as business email compromise (BEC), relies on social engineering to trick users into doing something attackers want. Unlike most email attacks email fraud is successful because emails look legitimate, they don’t include links or attachments, and don’t arrive in high enough volumes to raise red flags. While detecting email fraud can be difficult, there are hints that you can look out for, such as emails that demand secrecy, personal information, or money. Protecting against email fraud should be a team effort and can be done so by implementing fiscal controls, email authentication, advanced security tools, and more. If you’ve been targeted, be sure to report email fraud to the Internet Crime Complaint Center or your country’s law enforcement. Learn about Proofpoint’s Email Fraud Protection, https://www.proofpoint.com/us/solutions/email-fraud Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint Turorial - Logs and Reports (Syslogs)

    15 mai 2018

    This Proofpoint how-to video tutorial shows you how to describe logs and reports, configure local logs, and configure the sending of logs to a centralized Syslog host.

  • Proofpoint TAP Malicious URL Defense Configuration – Tutorial

    17 juil. 2018

    Protect your people, your organization, and network resources with an additional layer of security. Defend against malicious URLs within emails and block users from accessing malicious websites. Watch as this tutorial guides you through the basics of Proofpoint URL Defense. Additionally, you will learn how to use the Email Protection dashboard to configure URL Defense policy route features, URL rewrite options, and more. Learn more about Proofpoint URL Defense https://www.proofpoint.com/us/resources/data-sheets/essentials-url-defense & Cybersecurity Solutions https://www.proofpoint.com/us/products/essentials Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • What is Phishing?

    23 oct. 2018

    Phishing attacks costs companies millions every year, and even the most tech-savvy individuals have fallen prey to these scams, since phishing exploits human nature rather than technology. But what is phishing? Phishing attacks are scams that attempt to trick the recipient into providing confidential information to an attacker. Typically posing as a legitimate institution or trusted coworker, cyber attackers prey on human emotion and create a sense of urgency or fear to lure individuals into providing sensitive data. It is an effective and often successful practice, so how do you prevent phishing? With many types of phishing attacks in existence, employee awareness and training is key. However, since user behavior can be unpredictable, a cybersecurity detection solution is critical. Learn more about phishing and how you can build a defense against phishing: https://www.proofpoint.com/us/threat-reference/phishing. Learn about Proofpoint’s Phishing simulation and security awareness trainings, https://www.proofpoint.com/us/products/phishing-simulation-security-awareness Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Targeted Attack Protection Dashboard – PPS Tutorial

    17 juil. 2018

    Majority of targeted attacks start with email and these threats are continuously evolving. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with actionable data right at your fingertips. Watch as this video navigates through the targeted attack protection dashboard within Proofpoint Protection Server (PPS). This detailed tutorial will walk you through the dashboard and show you how to access necessary data to you act on alerts and find detailed forensic information in real-time. The dashboard will also provide information about the types of email threats received, how they are categorized, whether they are individual or part of a campaign, when activities were observed, intended user information and much more. Detect, analyze and block threats before they reach your inbox with Proofpoint Targeted Attack Protection. Learn more at https://www.proofpoint.com/us/products/ransomware-and-targeted-attack-protection Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Black Hat 2018 Demo: Targeted Attack Protection (TAP) and Threat Response Auto-Pull (TRAP)

    22 août 2018

    Eric Schwake gives a hands-on demo of Proofpoint Targeted Attack Protection (TAP) dashboard, which provides visibility of advanced email threats delivered through malicious attachments and URLs—including zero-day threats, polymorphic malware, weaponized documents, and phishing attacks. Eric also demonstrates Proofpoint Threat Response Auto-Pull (TRAP) dashboard, which shows hot to automatically move malicious and selected messages to quarantine after delivery while providing reports on attempted quarantine attempts. Learn more about Targeted Attack Protection: https://www.proofpoint.com/us/products/ransomware-and-targeted-attack-protection Threat Response Auto-Pull: https://www.proofpoint.com/us/resources/data-sheets/threat-response-auto-pull

  • Is the Cloud Secure?

    5 oct. 2018

    Cloud applications are great for collaboration and efficiency. But how secure is the cloud? Anyone who has access to your email or other cloud accounts can exploit others who trust it. This can lead to wire fraud, data breeches, and more. In this cybersecurity 101 video, learn about cloud safety and how to avoid common techniques attackers use to gain access to your accounts. Techniques include gathering your credentials in a data breech, tricking you to providing your account login details through a credential phishing attack, creating seemingly helpful addons that compromise your apps, etc. Cybersecurity attackers are targeting people, not infrastructures. Desirable targets include privileged users, service accounts that access valuable information, and finance departments. Learn how to build a safe and effective cloud protection solution. Visit https://www.proofpoint.com/us/corporate-blog/post/cloud-safe. Learn about Proofpoint’s Cloud App Security Broker, https://www.proofpoint.com/us/products/cloud-app-security-broker, to secure your cloud applications. Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Discover Proofpoint Essentials - Small Business Cyber Security

    22 janv. 2019

    Today cyber-attacks are not just going after infrastructure, rather, threats are utilizing email and relying on users’ interaction. That is why Proofpoint focuses on a people centric approach to cybersecurity. Often attackers focus on smaller businesses as they assume SMEs have a lower level of security and it will take less effort. That is why small and medium sized businesses need an effective cybersecurity solution that protects against advanced threats, but enables them to focus on daily function. Proofpoint uses the same technology that protects fortune 500 companies within Essentials. Features include advanced sandboxing, email classification, outbound security continuity, monitoring social accounts, and more.Discover Proofpoint Essentials 6 and learn more at https://www.proofpoint.com/us/products/essentials. Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint TAP Malicious Email Attachment Defense Configuration – Tutorial

    17 juil. 2018

    More than 90% of targeted attacks start with email, including threats delivered through malicious attachments. Email attachments are successful in penetrating security holes for several reasons, one of them being the difficulty in blocking attachments. Find out how Proofpoint Attachment Defense hashes and scans for malware contained in malicious attachments, such as Word, Excel, PowerPoint, and more. Watch as this video tutorial guides you through the basics of Proofpoint Attachment Defense and how it works using a seven-step process. You will learn how to navigate the Email Protection dashboard to configure Email Attachment Defense. Learn about the different setting capabilities, policy route changes, and predefined rule variations available to suit your organization’s needs. Protect your people and your organization against email threats delivered through malicious attachments – Proofpoint TAP is especially effective at identifying hard-to-catch threats that other solutions miss. Learn more about Proofpoint Targeted Attack Protection https://www.proofpoint.com/us/products/ransomware-and-targeted-attack-protection & malicious attachments https://www.proofpoint.com/us/threat-reference/malicious-email-attachments Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint Tutorial - Customizing Your Email Digest

    15 mai 2018

    This Proofpoint how-to video tutorial shows you how to schedule an end user digest and change the SMTP “From” address.

  • Proofpoint Tutorial - SMTP Process

    15 mai 2018

    This Proofpoint how-to video tutorial shows you how to describe the Simple Mail Transfer Protocol process for sending and receiving email.

  • Proofpoint Cloud App Security Broker Demo

    14 août 2018

    Itir Clarke demonstrates Proofpoint Cloud App Security Broker (PCASB) which helps you secure applications such as Microsoft Office 365, Google’s G Suite, Box, and more. Its unique risk-aware, people-centered approach gives you visibility and control over your cloud apps, so you can deploy cloud services with confidence. Powerful analytics help you grant the right levels of access to users and third-party add-on apps based on the risk factors that matter to you. Learn more: https://www.proofpoint.com/us/products/cloud-app-security-broker

  • Proofpoint Targeted Attack Protection Attack Index - Product Demo

    7 juin 2019

    Your security teams need to know who your most attacked people are in order to protect them against the threats that target them. The Proofpoint Attack Index helps identify these targeted people. It also surfaces targeted or interesting ransomware threats from the noise of threat activity that you see every day. This index is a weighted composite score of all threats sent to an individual in your organization. It scores threats on a scale of 0-1000 based on four factors: Threat actor sophistication Spread and focus of attack targeting Type of attack Overall attack volume Watch as Mark Guntrip, Group Product Marketing Director, walks us through the TAP Attack Index dashboard and provides a detailed explanation of the available functions. With the Attack Index, you can understand the risks your users face. You can then prioritize the most effective way to resolve threats. You also receive reporting and metrics to assess both individual and overall user risk. Proofpoint’s primary goal is to give security teams the visibility and necessary tools to remedy threats, prevent them from spreading, and stop them from happening in the first place. Learn more about Proofpoint Threat Intelligence https://www.proofpoint.com/us/products/et-intelligence Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Protecting Kelsey-Seybold Clinic Against Cyber Threats with Proofpoint

    6 févr. 2019

    Martin Littmann, the chief technology officer and chief information security officer shares how Kelsey-Seybold Clinic protects confidential information at 20 different sites across Houston, Texas. The clinic serves about a million patients with 1.2 million visits a year. The group is responsible for keeping doctors working, patients connected, and critical systems running reliably and securely. That’s why cybersecurity is core to everything the Kelsey-Seybold Clinic does. Healthcare providers face many of the same cyber threats as other large businesses. Cyber criminals know that hospitals have a trove of personally identifiable information—names, addresses, credit card numbers and Social Security numbers, and more. That’s why Kelsey-Seybold Clinic uses Proofpoint to protect patient and financial information. Watch the video as Kelsey-Seybold Clinic takes you through their cybersecurity protection initiatives. To learn more about Kelsey-Seybold Clinic visit https://www.proofpoint.com/us/resources/kelsey-seybold-case-study or https://www.proofpoint.com Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint - Blocket Protects Customers and Builds Trust with Proofpoint Email Fraud Defense

    16 mai 2018

    Blocket is the largest classified marketplace in Sweden, with millions of visitors on their website each week. As one of the most popular companies in Sweden, Blocket has a goal of building strong trust with their customers. Blocket utilizes Proofpoint’s Email Fraud Defense through our partner CSC Global to stop criminal actors targeting customers by certifying legitimate email and stopping impostor messages. Learn more: https://www.proofpoint.com/us/products/email-fraud-defense

  • Proofpoint - Interesting Threats: AZORult

    6 déc. 2018

    AZORult is a malware that is both a stealer and a downloader. Already a robust malware, the day after an update to the malware, a malicious campaign was launched utilizing some of the new features. AZORult not only has the ability to steal your saved passwords, cookies, cryptocurrency wallets and Skype messages, but can also drop a secondary payload as was seen in this recent campaign. After victims were exposed to AZORult, Hermes ransomware would be installed. This Interesting Threat comes to us from our Proofpoint Threat Insight blog "New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign". Visit https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside Join us each week as we discuss some of the most interesting threats making the rounds. Visit https://www.proofpoint.com/us/resources/webinars/cyber-threat-of-the-week to watch the latest threat video.

  • Proofpoint Enterprise Archive Demo - Data Archiving Solutions

    22 avr. 2019

    Proofpoint Enterprise Archive provides a secure and searchable central repository of a wide range of content types without the headaches of managing an in-house email archive. It is a cloud-based data archiving solution that will simplify your legal discovery, regulatory compliance and end-user data access. Watch this video and hear from Martin Tuip, Senior Product Marketing Manager for Information Archiving at Proofpoint, explain the features and benefits of the archiving solution. Learn about quickly accessing information in the archive, streamlining data compliance securely, eDiscovery and Analytics and more. Proofpoint Enterprise Archive helps you be prepared for legal discovery and regulatory events that require you to collect, search, and retrieve that data in a short period of time when necessary. Learn more about Proofpoint Enterprise Archive https://www.proofpoint.com/us/products/enterprise-information-archiving Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Proofpoint Tutorial - Bulk Mail Overview

    15 mai 2018

    This Proofpoint how-to video tutorial shows you how to enable and edit the bulk email rule in PPS.

  • Black Hat 2018 Demo: Email Fraud Defense (EFD)

    22 août 2018

    Ryan Terry gives a hands-on demo of Proofpoint Email Fraud Defense, which gives you the visibility, tools, and services to authorize legitimate email and block fraudulent messages before they reach the inbox. Implement DMARC safely without blocking legitimate email. Learn more: https://www.proofpoint.com/us/products/email-fraud-defense

  • What is Social Engineering?

    14 août 2019

    Social engineering refers to a wide array of tactics that can be used to trick you into opening a malicious email attachment, clicking on an unsafe URL, or sending money or valuable information to an attacker. It’s the art and science of manipulation. Attackers use any information they can grab from your social networks and basic human nature against you. By playing off deep-rooted impulses—such as fear, desire, and empathy—the attacker hijacks your normal thought process to make you act on their behalf. Social engineering against your organization can lead to credential phishing, wire fraud and more. It often is combined with other techniques, such as email domain spoofing, where fraudsters send emails from a trusted domain. Learn more about social engineering and how to recognize and avoid common social engineering techniques and keep your people, areas, and assets secure at https://www.proofpoint.com. Learn about Proofpoint’s Targeted Attack Protection https://www.proofpoint.com/us/products/ransomware-and-targeted-attack-protection Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • The Proofpoint Internship Experience

    5 déc. 2018

    Proofpoint is a customer focused and driven-to-win organization with leading edge products and many opportunities for interns to make an impact! We believe in hiring the best the brightest and cultivating a culture of collaboration and appreciation. Our interns are highly valued, and we strive to ensure all are provided with a meaningful work experience, as well as projects that are relevant to our interns’ interests. As we continue to grow and expand globally, we understand that hiring the right people and treating them well is key to our success! We are a multi-national company with locations in over 10 countries, with each location contributing to Proofpoint’s amazing culture! Check out our open intern roles at https://www.proofpoint.com/us/careers-intern-job-search

  • Proofpoint UX team reveals the process behind a product refresh

    19 nov. 2018

    Whether it’s stopping attacks that target users or our passion for customer service, protection has always started with people at Proofpoint. People are also the inspiration behind one of the most sweeping UI/UX redesigns in our company’s history. Our UX/UI design team is in the middle of a top-to-bottom refresh of our product line. It’s designed to give users more visibility, control, and insight to help them keep their people and data secure. The new designs will center on users’ needs and workflow, says Josephine Choi, senior manager of user experience design for our email security products. The design team worked closely with users to see how they work and pinpoint design changes that could help them do their jobs. Learn more at https://www.proofpoint.com/us/corporate-blog/post/designing-people-proofpoints-ux-team-reveals-process-behind-product-refresh

  • Protecting Michigan State University from Cyber Threats with Proofpoint

    14 août 2019

    As one of the top higher education providers in the world, Michigan State University (MSU) is like its own city. The school operates 26 healthcare centers. It has its own power plant, water treatment, police, and fire departments. Two major sports venues and a golf course share the 5,200-acre campus with a performing arts center. An underground subatomic-particle accelerator supports advanced physics research. All of this also makes MSU an appealing target for cyber attackers. The school must manage and protect everything from intellectual property and research to credit card data. Keeping its 50,000 students, 5,700 faculty and staff, and 7,200 support workers safe is a complex, ever-changing challenge. Students want easy digital collaboration. They need access to digital resources. And they demand privacy. Learn how MSU stops advanced threats, preserves students’ privacy and safeguards critical data with a people-centric approach. Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Blocket Uses Proofpoint Email Fraud Defense to Identify and Block Fraudulent Email

    19 juin 2018

    Blocket, the largest online classified marketplace in Sweden, was looking for a solution to protect their brand and their customers from email fraud. They chose to partner with CSC and Proofpoint. Using Proofpoint Email Fraud Defense, Blocket found an integrated solution from a single vendor to stop multiple forms of email fraud. Learn more: https://www.proofpoint.com/us/products/email-fraud-defense

  • Black Hat 2018: People-Centric Concerns in Cybersecurity

    22 août 2018

    Proofpoint's Richard Gillies discusses cybersecurity concerns and solutions for the people-centric perspective - security awareness training, credential phishing, and how Proofpoint solutions can help against increasing cybersecurity threats. Learn more at https://www.proofpoint.com

  • Proofpoint Targeted Attack Protection Email Isolation Product Demo

    15 août 2019

    Paul Wang demonstrates Proofpoint Targeted Attack Protection Email Isolation which protects you and your employees across personal webmail and browsing activities across the broader web. Learn more: https://www.proofpoint.com/us/products/targeted-attack-protection-personal-webmail-defense Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Blocket Proactively Protects its Customers from Email Fraud and Phishing Attacks

    19 juin 2018

    Blocket is the largest online classified marketplace in Sweden, with millions of visitors on their website each week. Blocket has a goal to build strong trust with their customers, who interact with their brand online. Focusing on email communications, Blocket partnered with CSC and Proofpoint to certify legitimate email and block suspicious messages being sent to their employees and customers. Learn more: https://www.proofpoint.com/us/products/email-fraud-defense

  • Proofpoint - Interesting Threats: Marap

    6 déc. 2018

    Marap, param backwards, is part of a group of recently discovered downloader malwares. Marap is targeting financial institutions and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code. It is possible that this malware is currently doing reconnaissance to determine if there is data the threat actor wants. This Interesting Threat comes to us from our Proofpoint Threat Insight blog "New modular downloaders fingerprint systems, prepare for more - Part 1: Marap". Visit https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap Join us each week as we discuss some of the most interesting threats making the rounds. Visit https://www.proofpoint.com/us/resources/webinars/cyber-threat-of-the-week to watch the latest threat video.

  • Proofpoint Targeted Attack Protection Browser Isolation Product Demo

    15 août 2019

    Paul Wang demonstrates Proofpoint Targeted Attack Protection Isolation Personal Browsing Defense which allows your users to browse the web and access their personal email while preventing malicious content from impacting your corporate devices. Learn more: https://www.proofpoint.com/us/products/targeted-attack-protection-isolation-personal-browsing-defense Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint

  • Blocket skyddar sina kunder mot bedragare med hjälp av Proofpoint Email Fraud Defense

    19 juin 2018

    Blocket är Sveriges största digitala Köp- och Säljmarknad med miljontals besökare varje vecka. Som ett av de mest populära företagen i Sverige är ett starkt förtroende hos kunderna en självklarhet och även en konkurrensfördel. Blocket använder sig av Proofpoints lösningar för att stoppa bedragare och skydda sina kunder mot email-bedrägeri. Lär dig om av Blockets erfarenheter här: https://www.proofpoint.com/us/products/email-fraud-defense

  • Hur Blocket proaktivt skyddar sina kunder mot emailbedrägerier och phishingattacker

    19 juin 2018

    Blocket är Sveriges största digitala Köp- och Säljmarknad med miljontals besökare varje vecka. Som ett av de mest populära företagen i Sverige är ett starkt förtroende hos kunderna en självklarhet och även en konkurrensfördel. Blocket inledde ett samarbete med CSC och använder sig av Proofpoint Email Fraud Defense för att stoppa bedragare och skydda sina kunder mot email-bedrägeri. Lär dig av Blockets erfarenheter här: https://www.proofpoint.com/us/products/email-fraud-defense

  • Proofpoint - Interesting Threats: Hurricane Michael Exploits

    6 déc. 2018

    Hurricane Michael Exploits are a group of phishing campaign schemes that utilized the Hurricane Michael disaster as a way to exploit victims and people that would like to help. Typically threat actors go after credit card numbers that are given to them through fraudulent donation sites and emails but the Hurricane Michael Exploits are different. This Interesting Threat comes to us from our Proofpoint Threat Insight blog "Hurricane Michael phishing schemes leverage Azure blob storage to rake in credentials". Visit https://www.proofpoint.com/us/threat-insight/post/hurricane-michael-phishing-schemes-leverage-azure-blob-storage-rake-credentials Join us each week as we discuss some of the most interesting threats making the rounds. Visit https://www.proofpoint.com/us/resources/webinars/cyber-threat-of-the-week to watch the latest threat video.

  • Proofpoint IST2018 シアタープレゼン by テクマトリックス 「メールゲートウェイもSaaSの時代!」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。プルーフポイント製品の導入を手掛けるテクマトリックスによる導入と運用のポイント解説です。

  • Blocket använder Proofpoint Email Fraud Defense för att blockera bedrägeriförsök via email

    19 juin 2018

    Blocket letade efter en lösning för att skydda sina kunder och sitt varumärke mot bedrägerier via email. De valde att samarbeta med CSC och Proofpoint. Genom att använda sig av Proofpoint Email Fraud Defense kunde Blocket skydda sig och sina kunder mot flera olika typer av emailbedrägerier. Dra nytta av Blockets erfarenheter här: https://www.proofpoint.com/us/products/email-fraud-defense

  • Proofpoint IST2018 シアタープレゼン by テクマトリックス「 Palo Alto Networks連携 標的型攻撃対策」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。パロアルトネットワークス社のセキュリティ製品とプルーフポイントの連携による標的型攻撃対策に関して解説しています。

  • Proofpoint IST2018 シアタープレゼン「ビジネスメール版振り込め詐欺BEC最新の手口と対策」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。社外の取引先等になりすまして振込をさせる、ビジネスメール版振り込め詐欺の仕組みと対策を解説します。

  • Proofpoint IST2018 シアタープレゼン「人が脆弱性?!最新脅威動向」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。ビジネスメール詐欺(BEC)をはじめ、最新脅威動向をご紹介しています。

  • Proofpoint IST2018 シアタープレゼン「万全ですか?O365のメールセキュリティ対策 」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。メールセキュリティに特に力を入れてきたプルーフポイントとOffice365のセキュリティ機能を比較検討します。

  • Proofpoint IST2018 シアタープレゼン「なりすましを防ぐ。ブランドを守る。EFDはじめました。DMARC Email Fraud Defenseで敵を知る!!」

    19 nov. 2018

    2018年5月9日~11日に開催された情報セキュリティExpo2018。ミニシアターでのプレゼンの様子です。最近急増しているなりすましによるメール詐欺。その仕組みと対策を解説します。

Entreprises - Paris - Paris 2 (75002) - Développement informatique

Allez plus loin avec B-Reputation

Découvrez comment nos données peuvent répondre à vos besoins.

Veille stratégique

  • Fiches entreprises complètes
  • Alertes
  • Tableaux de bord
En savoir plus

Prospection

  • Fichiers de prospection sur mesure
  • 100 critères de segmentation
  • Adresses, mails et téléphones
En savoir plus

Enrichissement

  • Traitement de fichiers ou API
  • Siretisation et dédoublonnage
  • Information complète et indicateurs propriétaires
En savoir plus

Solution d'avis client

  • Collecte et vérification
  • Tableaux de bord d'analyse
  • Diffusion web et réseaux sociaux
En savoir plus