Proofpoint is sharpening its focus on the South African market through the appointment of Obscure Technologies as its main distributor in South Africa with effect from March 2021.
Centurion-based Obscure Technologies is a firm of cybersecurity experts specialising in brokering best-of-breed security solutions in the local market. Having served as a distributor of Proofpoint solutions for the past year, Obscure Technologies has invested in strengthening its team’s skill set and certifications across the Proofpoint portfolio, and has appointed a new, dedicated business unit manager to serve as an extension of the Proofpoint workforce in the local region.
Rynier Schoeman, the new Proofpoint business unit manager, says Obscure Technologies has grown to a significant cybersecurity powerhouse on the strength of its high-level skills and focus on only market-leading solutions to address key local challenges.
As a highly experienced cybersecurity specialist, Schoeman believes Proofpoint ably meets the changing needs of local large enterprises. “With email being the main attack vector, and Africa among the regions most under attack in recent years, we see growing demand for enterprise grade, feature rich email security solutions, as well as security awareness and training,” he says. “Proofpoint answers that need and more, and integrates seamlessly with many of the other solutions in our portfolio. As a result, it is a good fit for our cybersecurity portfolio and is seeing growing demand in the South African enterprise market.”
Proofpoint takes a people-centric approach to protection, offering an integrated suite of cloud-based solutions to stop targeted threats, safeguard customers’ data, and make their users more resilient against cyberattacks. More than half of the Fortune 1000 companies rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media and the Web.
With Proofpoint’s security suite, organisations can:
• Stop email and cloud-based threats, including malware, credential phishing and business email compromise (BEC).
• Reduce successful phishing attacks and malware by empowering their people to spot and report unsafe email and by safeguarding their personal digital activity.
• Secure the digital channels by blocking impostor attacks and malicious content that use trusted and lookalike email and web domains, social media, the dark web and more.
• Protect your most sensitive data and comply with ever-evolving regulations – without the headaches and costs of legacy data protection tools.
• Collect, archive, supervise and monitor sensitive data in a compliant and legally defensible manner without the cost and hassle of traditional compliance tools.
© Technews Publishing (Pty) Ltd. | All Rights Reserved.