<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Proofpoint: Secure Share

proofpoint secure share feature

An organization’s digital transformation process requires a safe and secure environment for sharing data, and Proofpoint provides a solution for the exchange of large files using their Secure Share tool.

Proofpoint Secure Share is a cloud-based that enables users not only to exchange files but also to perform exchange of files by a set of corporate policies. Secure Share works within your organization’s e-mail platform and other IT infrastructure, which adds a further layer of security while relieving the burden on your IT systems.

 

How Proofpoint Secure Share Works

Proofpoint Secure Share works by allowing users to exchange large files that you cannot usually send via traditional corporate e-mail platforms. The tool works within an Internet browser or in Microsoft Outlook environment while enabling you to exchange files larger than allowed by the Microsoft Exchange server. Secure Share allows your employees to create accounts for sharing files for third-party users, which in turn keeps these accounts outside of your primary business systems.

The solution supports the following Internet browsers and Outlook plug-ins:

Browsers:

  • Internet Explorer
  • Firefox
  • Chrome
  • Safari

E-mail clients:

  • Outlook 2007 with SP2
  • Outlook 2010, 32-bit and 64-bit
  • Outlook 2013, 32-bit and 64-bit

A Secure Share administrator sets the size of the files allowed for exchange between users while the size varies by platform.

  • Firefox and Chrome: up to 5 GB
  • IE 9, 10, and 11: up to 3 GB
  • IE 8: up to 1 GB
  • Outlook Plug-in: up to 2 GB

 

Main Features of Proofpoint Secure Share

Secure Share features anti-virus scanning capabilities as well as end-user authentication to secure the safe exchange of files. The solution has data-loss prevention capabilities as well.

The solution enables the exchange of large files through web portals of Outlook in the same way you exchange daily business correspondence over e-mail. Moreover, your employees can create one-time or multi-use storage places to exchange files with both internal and external users. Your system administrator defines how these temporary shared spaces are created, how data is retained in such shared storage space, and when a shared space expires.

The system is designed in a way to provide secure data exchange and access to data even if there is a corporate VPN in place but also works within a corporate VPN environment.

This tool shares the same administrative interface in use by the Proofpoint Email Protection platform, which in turn enables IT administrators to oversee how policies are being followed and detect eventual policy violations within a unified interface across e-mail, web, and large-file exchange use cases.

Proofpoint Secure Share also encrypts your files during upload, download, and at rest while you can track every attempt to access one or multiple files.

 

Conclusion

All in all, Secure Share is a holistic solution for the exchange of large files in the context of commonly used corporate e-mail solutions such as Outlook as well as custom-build and ready-to-use web portals.

The solution’s policy-driven approach enables you to customize it to your specific needs while getting authentication, encryption, virus detection, and data management capabilities.

 

email security phishing

Topics from this Article

Proofpoint, Email Security, VPN

Datashield
Datashield
Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

Top 5 Most Popular Cybersecurity Certifications

The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

Datashield Announces Partnership with Bishop Fox

Two cybersecurity powerhouses partner to provide defensive and offensive security services to boost enterprise companies’ security posture. Scottsdale, Ariz.— Datashield, a Scottsdale-based cybersecurity company, recently inked its partnership with offensive security services firm Bishop Fox. Both companies are based in Arizona and provide outsourced cybersecurity services to top Fortune 500 companies.