throbber
Proofpoint-12.31.2014-10K
`
`Page 1 of 124
`
`10-K 1 proofpoint-12312014x10k.htm 10-K
`Table of Contents
`
`UNITED STATES
`SECURITIES AND EXCHANGE COMMISSION
`Washington, D.C. 20549
`__________________________________
`
`(cid:59)
`
`FORM 10-K
`ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE
`ACT OF 1934
`For the Fiscal Year Ended December 31, 2014
`
`OR
`TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES
`EXCHANGE ACT OF 1934
`For the Transition Period from to
`
`(cid:134)
`
`Commission File Number 001-35506
`
`PROOFPOINT, INC.
`
`(Exact name of Registrant as specified in its charter)
`
`Delaware
`(State or other jurisdiction of
`incorporation or organization)
`
`892 Ross Drive
`Sunnyvale, California
`(Address of principal executive offices)
`
`51-0414846
`(I.R.S. employer
`identification no.)
`
`94089
`(Zip Code)
`
`(408) 517-4710
`(Registrant’s telephone number, including area code)
`__________________________________
`Securities registered pursuant to Section 12(b) of the Act:
`
`Title of Each Class
`Common Stock , $0.0001 par value per share
`
`Name of each exchange on which registered
`NASDAQ Global Select Market
`
`Securities registered pursuant to Section 12(g) of the Act:
`
`None
`__________________________________
`Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. YES (cid:59) NO (cid:134)
`Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. YES (cid:134) NO (cid:59)
`Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the
`preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past
`90 days. YES (cid:59) NO (cid:134)
`Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be
`submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant
`was required to submit and post such files). YES (cid:59) NO (cid:134)
`Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be
`contained, to the best of registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment
`to this Form 10-K. (cid:134)
`Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions
`of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act.
`
`Large accelerated filer (cid:59)
`
`Accelerated filer (cid:134)
`
`Non-accelerated filer (cid:134)
`(Do not check if a smaller reporting company)
`Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). YES (cid:133) NO (cid:59)
`The aggregate market value of the voting and non-voting common equity held by non-affiliates of the registrant, based upon the closing price of a share of the
`registrant’s common stock on June 30, 2014 as reported by the NASDAQ Global Select Market on that date, was approximately $1,291,000,000. This calculation does
`not reflect a determination that certain persons are affiliates of the registrant for any other purpose.
`The number of shares outstanding of the registrant’s common stock as of February 13, 2015 was 38,993,942 shares.
` __________________________________
`DOCUMENTS INCORPORATED BY REFERENCE
`
`Smaller reporting company (cid:134)
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 1
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 2 of 124
`
`Portions of the registrant’s Proxy Statement for its 2015 Annual Meeting of Stockholders (the “Proxy Statement”), to be filed with the Securities and Exchange
`Commission, are incorporated by reference into Part III of this Annual Report on Form 10-K where indicated. The Proxy Statement will be filed with the Securities and
`Exchange Commission within 120 days of the registrant's fiscal year ended December 31, 2014.
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 2
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 3 of 124
`
`Table of Contents
`
`PROOFPOINT, INC.
`FORM 10-K
`For the Fiscal Year Ended December 31, 2014
`TABLE OF CONTENTS
`
`PART I.
`Item 1. Business
`Item 1A. Risk Factors
`Item 1B. Unresolved Staff Comments
`Item 2.
`Properties
`Item 3.
`Legal Proceedings
`Item 4. Mine Safety Disclosures
`PART II.
`Item 5. Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities
`Item 6.
`Selected Financial Data
`Item 7. Management's Discussion and Analysis of Financial Condition and Results of Operations
`Item 7A. Quantitative and Qualitative Disclosures About Market Risk
`Item 8.
`Financial Statements and Supplementary Data
`Item 9. Changes in and Disagreements with Accountants on Accounting and Financial Disclosure
`Item 9A. Controls and Procedures
`Item 9B. Other Information
`PART III.
`Item 10. Directors, Executive Officers and Corporate Governance
`Item 11. Executive Compensation
`Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters
`Item 13. Certain Relationships and Related Transactions, and Director Independence
`Item 14. Principal Accountant Fees and Services
`PART IV.
`Item 15. Exhibits and Financial Statement Schedules
`Index to Consolidated Financial Statements
`
`Signatures
`
`Page
`
`3
`16
`33
`33
`33
`33
`
`35
`36
`38
`60
`61
`61
`61
`62
`
`63
`63
`63
`63
`63
`
`64
`65
`102
`
`1
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 3
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 4 of 124
`
`Table of Contents
`
`CAUTIONARY STATEMENT REGARDING FORWARD-LOOKING STATEMENTS
`
`This Annual Report on Form 10-K contains forward-looking statements within the meaning of the Private Securities
`Litigation Reform Act of 1995. All statements contained in this Annual Report on Form 10-K other than statements of historical fact,
`including statements regarding our future results of operations and financial position, our business strategy and plans, and our
`objectives for future operations, are forward-looking statements. The words "believe," "may," "will," "estimate," "continue,"
`"anticipate," "intend," "expect," and similar expressions are intended to identify forward-looking statements. We have based these
`forward-looking statements largely on our current expectations and projections about future events and trends that we believe may
`affect our financial condition, results of operations, business strategy, short-term and long-term business operations and objectives, and
`financial needs. These forward-looking statements are subject to a number of risks, uncertainties and assumptions, including those
`described in Part I, Item 1A, "Risk Factors" in this Annual Report on Form 10-K. Moreover, we operate in a very competitive and
`rapidly changing environment. New risks emerge from time to time. It is not possible for our management to predict all risks, nor can
`we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results
`to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties and
`assumptions, the future events and trends discussed in this Annual Report on Form 10-K may not occur and actual results could differ
`materially and adversely from those anticipated or implied in the forward-looking statements. We undertake no obligation to revise or
`publicly release the results of any revision to these forward-looking statements, except as required by law. Given these risks and
`uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.
`Unless expressly indicated or the context requires otherwise, the terms “Proofpoint,” “Company,” “Registrant,” “we,” “us,”
`and “our” mean Proofpoint, Inc. and its subsidiaries unless the context indicates otherwise.
`
`2
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 4
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 5 of 124
`
`Table of Contents
`
`ITEM 1. BUSINESS
`
`Overview
`
`PART I
`
`Proofpoint is a leading security-as-a-service provider that enables large and mid-sized organizations worldwide to defend,
`protect, archive and govern their most sensitive data. Our security-as-a-service platform is comprised of an integrated suite of on-
`demand data protection solutions, including threat protection, incident response, regulatory compliance, archiving, governance,
`eDiscovery, and secure communication. Our solutions are built on a flexible, cloud-based platform and leverage a number of
`proprietary technologies - including big data analytics, machine learning, deep content inspection, secure storage, advanced
`encryption, intelligent message routing, dynamic malware analysis, threat correlation, and virtual execution environments - to address
`today's rapidly changing threat landscape.
`
`A fundamental shift in the sources of cyber crime, from hackers to organized crime and governments, combined with the
`emergence of international data trafficking and sophisticated advanced persistent threats ("APTs"), polymorphic threats, zero-day
`exploits, and user-transplant "drive-by" downloads, is driving an unprecedented wave of targeted, malicious attacks designed to steal
`valuable information. At the same time, the growth of business-to-business collaboration and the use of social media for mass
`communication, as well as the consumerization of IT and the associated adoption of mobile devices and unmanaged Internet-based
`applications, has proliferated sensitive data and reduced the effectiveness of many existing security products. These factors have
`contributed to an increasing number of severe data breaches and expanding regulatory mandates, all of which have accelerated demand
`for effective data protection and governance solutions.
`
`Our platform addresses this growing challenge by not only protecting data as it flows into and out of the enterprise via on-
`premise and cloud-based email, instant messaging, social media and other web-based applications, but also by keeping track of such
`information as it is modified and distributed throughout the enterprise for compliance and data loss prevention and securely archiving
`these communications for compliance and discovery. We address four important problems for the enterprise:
`
`•
`
`•
`
`•
`
`•
`
`Keeping malicious content out of the extended enterprise;
`
`Preventing the theft or inadvertent loss of sensitive information and, in turn, ensuring compliance with regulatory
`data protection mandates;
`
`Collecting, retaining, governing and discovering sensitive data for compliance and litigation support; and
`
`Securely sharing sensitive data with customers, partners and suppliers.
`
`Our platform and its associated solutions are sold to customers on a subscription basis and can be deployed through our
`unique cloud-based architecture that leverages both our global data centers as well as optional points-of-presence behind our
`customers' firewalls. Our flexible deployment model enables us to deliver superior security and compliance while maintaining the
`favorable economics afforded by cloud computing, creating a competitive advantage for us over legacy on-premise and cloud-only
`offerings.
`
`We were founded in 2002 to provide a unified solution to help enterprises address their growing data security requirements.
`Our first solution was commercially released in 2003 to combat the burgeoning problem of spam and viruses and their impact on
`corporate email systems. To address the evolving threat landscape and the adoption of communication and collaboration systems
`beyond corporate email and networks, we have broadened our solutions to defend against a wide range of threats, protect against
`outbound security risks, and archive and govern corporate information. Today, our solutions are used by approximately 3,300
`customers worldwide, including 45 of the Fortune 100, protecting tens of millions of end-users. We market and sell our solutions
`worldwide both directly through our sales teams and indirectly through a hybrid model where our sales organization actively assists
`our network of distributors and resellers. We also distribute our solutions through strategic partners.
`
`The Proofpoint Solution
`
`Our integrated suite of on-demand security-as-a-service solutions enables large and mid-sized organizations to defend,
`protect, archive and govern their sensitive data. Our comprehensive platform provides threat protection, incident response, regulatory
`compliance, archiving, governance, eDiscovery, and secure communication. These solutions are built on a cloud-based architecture,
`protecting data not only as it flows into and out of the enterprise via on-premise and cloud-based email,
`
`3
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 5
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 6 of 124
`
`Table of Contents
`
`instant messaging, social media and other web-based applications, and also keeps track of this information as it is modified and
`distributed throughout the enterprise for compliance and data loss prevention and securely archiving these communications for
`compliance and discovery. We have pioneered the use of innovative technologies to deliver better ease-of-use, greater protection
`against the latest advanced threats, and lower total cost of ownership than traditional alternatives. The key elements of our solution
`include:
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Superior protection against advanced, targeted threats. We use a combination of proprietary technologies for big
`data analytics, machine learning, deep content inspection, dynamic malware analysis, threat correlation, and virtual
`execution environments to predictively and actively detect and stop targeted "spear phishing" and other sophisticated
`advanced and next-generation threat attacks, including APTs, that employ polymorphic threats, zero-day exploits,
`user-transparent “drive-by” downloads and other penetration tactics. By processing and modeling billions of requests
`per day, we can recognize anomalies in traffic flow to predictively detect targeted attacks, before users are exposed.
`Our deep content inspection technology enables us to identify malicious message attachments and distinguish
`between valid messages and "phishing" messages designed to look authentic and trick the end-user into divulging
`sensitive data or clicking on a malicious web link. Our machine learning technology enables us to detect targeted
`"zero-hour" attacks in real-time, even if they have not been seen previously at other locations, and quarantine them
`appropriately. Our dynamic malware analysis and virtual execution environment technologies enable us to examine
`web site destinations and downloadable files to identify and block potentially hostile code that would otherwise
`compromise end-user computers, even if such web sites are otherwise benign and considered reputable. Our threat
`correlation technologies enable us to rapidly confirm and contain threats, providing rapid automated incident
`response.
`
`Comprehensive, integrated data protection, compliance, and eDiscovery suite. We offer a comprehensive solution
`for data protection and governance through an integrated, security-as-a-service platform that is comprised of five
`main suites: Proofpoint Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive &
`Governance, Proofpoint Nexgate Social Media Security & Compliance, and Proofpoint Essentials. Together, these
`solutions can improve an organization's ability to detect and mitigate inbound and outbound threats and securely
`archive and discover communication across all major communication channels including on-premise and cloud-
`based email, instant messaging, social media and other web-based applications. In addition, our common policy
`framework and reporting systems enable organizations to comply with complex regulatory mandates, implement
`consistent data governance policies and ensure end-to-end incident response across the enterprise.
`
`Designed to empower end-users. Unlike legacy offerings that simply block communication or report audit
`violations, our solutions actively enable secure business-to-business and business-to-consumer communications. Our
`easy-to-use policy-based email encryption service automatically encrypts sensitive emails and delivers them to any
`PC or mobile device. In addition, our secure file-transfer solution makes it easy for end-users to securely share
`various forms of documents and other content that are typically too large to send through traditional e-mail systems.
`All of our solutions provide mobile-optimized capabilities to empower the growing number of people who use
`mobile devices as their primary computing platform.
`
`Security optimized cloud architecture. Our multi-tenant security-as-a-service solution leverages a distributed,
`scalable architecture deployed in our global data centers for deep content inspection, global threat correlation and
`analytics, high-speed search, secure storage, encryption key management, software updates, intelligent message
`routing, and other core functions. Customers can choose to deploy optional physical or virtual points-of-presence
`behind their firewalls for those who prefer to deploy certain functionality inside their security perimeter. This
`architecture enables us to leverage the benefits of the cloud to cost-effectively deliver superior security and
`compliance, while optimizing each deployment for the customer's unique threat environment.
`
`Extensible security-as-a-service platform. The key components of our security-as-a-service platform, including
`services for secure storage, content inspection, reputation, big data analytics, encryption, key management, and
`identity and policy, can be exposed through application programming interfaces, or APIs, to integrate with internally
`developed applications as well as with those developed by third-parties. In addition, these APIs provide a means to
`integrate with the other security and compliance components deployed in our customers' infrastructures.
`
`Our Security-as-a-Service Platform
`
`4
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 6
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 7 of 124
`
`Table of Contents
`
`We provide a multi-tiered security-as-a-service platform consisting of solutions, platform technologies and infrastructure. Our
`platform currently includes five solutions bundled for the convenience of our customers, distributors and resellers: Proofpoint
`Enterprise Protection, Proofpoint Enterprise Privacy, Proofpoint Enterprise Archive & Governance, Proofpoint Nexgate Social Media
`Security & Compliance, and Proofpoint Essentials. Each of these solutions is built as an aspect of our security-as-a-service platform,
`which includes both platform services and enabling technologies. Our platform services provide the key functionality to enable our
`various solutions while our enabling technologies work in conjunction with our platform services to enable the efficient construction,
`scaling and maintenance of our customer-facing solutions.
`
`Our suite is delivered by a cloud infrastructure and can be deployed as a secure cloud-only solution, or as a hybrid solution
`with optional physical or virtual points-of-presence behind our customers' firewalls for those who prefer to deploy certain functionality
`inside their security perimeter. In all deployment scenarios, our cloud-based architecture enables us to leverage the benefits of the
`cloud to cost-effectively deliver superior security and compliance while maintaining the flexibility to optimize deployments for
`customers' unique environments. The modularity of our solutions enables our existing customers to implement additional modules in a
`simple and efficient manner.
`
`Solutions
`
`Proofpoint Enterprise Protection
`
`Proofpoint Enterprise Protection is our communications and collaboration security suite designed to protect customers'
`mission-critical messaging infrastructure from outside threats including spam, phishing, unpredictable email volumes, malware and
`other forms of objectionable or dangerous content before they reach the enterprise. Key capabilities within Proofpoint Enterprise
`Protection include:
`
`•
`
`Threat detection. Uses our Proofpoint MLX machine learning technology and reputation data to examine millions of
`possible attributes in every message, including envelope headers and structure, embedded web links, images,
`attachments and sender reputation, as well as unstructured content in the message body, to block phishing and spear
`phishing attacks, spam and other forms of malicious or objectionable content. This solution also includes
`sophisticated policy and routing controls designed to ensure security and the effective handling of all classifications
`of content.
`
`5
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 7
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 8 of 124
`
`Table of Contents
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Virus protection. Combats email-borne viruses, worms and trojans with a solution that combines efficient message
`handling, comprehensive reporting, and robust policy management with leading third-party antivirus scanning
`engines.
`
`Zero-hour threat detection. Protects enterprises against new phishing attacks, viruses and other forms of malicious
`code during the critical period after new attacks are released and before full information is available to characterize
`the threat.
`
`Smart search. Offers an easy-to-use interface that provides real-time visibility into message flows across an
`organization's messaging infrastructure, using built-in logging and reporting capabilities with advanced message
`tracing, forensics and log analysis capabilities.
`
`Targeted attack protection. Enterprises are protected against advanced persistent threats such as phishing and other
`targeted email attacks by the use of big data analysis, predictive, virtual execution and dynamic malware analysis
`techniques to identify and apply additional security controls against suspicious messages and any associated links to
`the web.
`
`Threat response. Provides threat information and Indicators of Compromise correlation, aggregating across
`Proofpoint and other third-party security products, to confirm and contain system compromises. By taking advantage
`of this automated incident response, enterprises can minimize exfiltration windows and leverage staff for breach
`prevention and mitigation.
`
`Key benefits of Proofpoint Enterprise Protection include:
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Superior protection from advanced threats, spam and viruses. Protects against advanced threats, spam and other
`malicious code such as viruses, worms and spyware.
`
`Comprehensive outbound threat protection. Analyzes all outbound email traffic to block spam, viruses and other
`malicious content from leaving the corporate network, and pinpoint the responsible compromised systems.
`
`Automated Incident Response. Analyzes and correlates incident data to confirm system compromises, then acts to
`contain systems to help minimize and mitigate exposure.
`
`Effective, flexible policy management and administration. Provides a user-friendly, web-based administration
`interface and robust reporting capabilities that make it easy to define, enforce and manage an enterprise's messaging
`policies.
`
`Easy-to-use end-user controls. Gives email users easy, self-service control over their individual email preferences
`within the parameters of corporate-defined messaging policies.
`
`Proofpoint Enterprise Privacy
`
`Our data loss prevention, encryption and compliance solution defends against leaks of confidential information, and helps
`ensure compliance with common U.S., international and industry-specific data protection regulations - including the Health Care
`Insurance Portability and Accountability Act of 1996 ("HIPAA"), the Gramm-Leach-Bliley Act, Canada's Personal Information
`Protection and Electronic Documents Act, as well as acts such as CA SB 24 MA 201 CMR 17.00, ITAR, NERC-CIP, CFTC red flag
`rules, Basel II, EuroSOX (Directive 84/253/EEC), European Union Data Privacy Directive, and the Payment Card Industry Security
`Standards. Key capabilities within Proofpoint Enterprise Privacy include:
`
`•
`
`Advanced data loss prevention. Our advanced data loss prevention solution identifies regulated private content,
`valuable corporate assets and confidential information before it leaves the organization via email, web-based
`applications, or our Secure Share solution. Pre-packaged smart identifiers and dictionaries automatically and
`accurately detect a wide range of regulated content such as social security numbers, health records, credit card
`numbers, and driver's license numbers. In addition to regulated content, our machine learning technology can
`identify confidential, organization-specific content and assets. Once identified and classified, sensitive data can be
`blocked, encrypted and transmitted or re-routed internally based on content and identity-aware policies.
`
`6
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 8
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 9 of 124
`
`Table of Contents
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Flexible remediation and supervision. Content, identity and destination-aware policies enable effective remediation
`of potential data breaches or regulatory violations. Remediation options include stopping the transfer completely,
`automatically forcing data-encryption, or routing to a compliance supervisor or the end-user for disposition.
`Proofpoint Enterprise Privacy provides comprehensive reporting on potential violations and remediation using our
`analytics capabilities.
`
`Policy-based encryption. Automatically encrypts regulated and other sensitive data before it leaves an organization's
`security perimeter without requiring cumbersome end-user key management. This enables authorized external
`recipients, whether or not they are our customers, to quickly and easily decrypt and view content from most devices.
`
`Secure file transfer. Provides secure, large file transfer capabilities that enables end-users to send large files quickly,
`easily, and securely while eliminating the impact of large attachments on an email infrastructure.
`
`Secure share. Cloud-based security-focused solution designed to enable enterprise users to securely exchange large
`files with ease while staying compliant with enterprise data policies.
`
`Content Control. Automated discovery and remediation solution identifies and enables corrective action on sensitive
`content across enterprise; reduces risk of data breaches and compliance violations.
`
`Key benefits of Proofpoint Enterprise Privacy include:
`
`•
`
`•
`
`•
`
`Regulatory compliance. Enables outbound messages to comply with national and state government and industry-
`specific privacy regulations.
`
`Superior malicious and accidental data loss protection. Protects against the loss of sensitive data, whether from a
`cybercriminal attempting to exfiltrate valuable data from a compromised system, or from an employee accidentally
`distributing a file to the wrong party through email, webmail, social media, file sharing, or other Internet-based
`mechanisms for publishing content.
`
`Easy-to-use secure communication. Allows corporate end-users to easily share sensitive data without compromising
`security and privacy, and enables authorized external recipients to transparently decrypt and read the
`communications from any device. Our mobile-optimized interfaces provide an easy experience for the rapidly
`growing number of recipients on smartphones and tablets.
`
`Proofpoint Enterprise Archive & Governance
`
`Proofpoint Enterprise Archive & Governance is designed to ensure accurate enforcement of data governance, data retention
`and supervision policies and mandates; cost-effective litigation support through efficient discovery; and active legal-hold management.
`
`Proofpoint Enterprise Archive can store, govern and discover a wide range of data including email, instant message
`conversations, social media interactions, and other files throughout the enterprise. The key capabilities within Proofpoint Enterprise
`Archive include:
`
`•
`
`•
`
`•
`
`Secure cloud storage. With our proprietary double blind encryption technology and the associated data storage
`architecture, all email messages, files and other content are encrypted with keys controlled by the customer before
`the data enters the Proofpoint Enterprise Archive. This ensures that even our employees and law-enforcement
`agencies cannot access a readable form of the customer data without authorized access by the customer to the
`encryption keys stored behind the customer's firewall.
`
`Search performance. By employing parallel, big data search techniques, we are able to deliver search performance
`measured in seconds, even when searching hundreds of terabytes of archived data. Traditional on-premise solutions
`can take hours or even days to return search results to a complex query.
`
`Flexible policy enforcement. Enables organizations to easily define and automatically enforce data retention and
`destruction policies necessary to comply with regulatory mandates or internal policies that can vary by user, group,
`geography or domain.
`
`7
`
`https://www.sec.gov/Archives/edgar/data/1212458/000121245815000002/proofpoint-1231...
`
`6/21/2016
`
`Patent Owner Finjan, Inc. - Ex. 2036, p. 9
`
`

`

`Proofpoint-12.31.2014-10K
`
`Page 10 of 124
`
`Table of Contents
`
`•
`
`•
`
`Active legal-hold management. Enables administrators or legal professionals to easily designate specific individuals
`or content as subject to legal-hold. Proofpoint Enterprise Archive then provides active management of these holds by
`suspending normal deletion policies and automatically archiving subsequent messages and files related to the
`designated matter.
`
`End-user supervision. Leveraging our flexible workflow capabilities, Proofpoint Enterprise Archive analyzes all
`electronic communications, including email and communications from leading instant messaging and social
`networking sites, for potential violations of regulations, such as those imposed by Financial Industry Regulatory
`Authority ("FINRA") and the SEC in the financial services industry.
`
`Key benefits of Proofpoint Enterprise Archive include:
`
`•
`
`•
`
`•
`
`•
`
`Regulatory compliance. Helps organizations meet regulatory requirements by archiving all messages and content
`according to compliance retention policies and enabling staff to systematically review messages for compliance
`supervision.
`
`Proactive data governance. Allows organizations to create, maintain and consistently enforce a clear corporate data
`retention policy, reducing the risk of data loss and the cost of eDiscovery.
`
`Efficient litigation support. Provides advanced search features that reduce the cost of eDiscovery and allow
`organizations to more effectively manage the litigation hold process.
`
`Reduced storage and management costs. Helps to simplify mailbox and file system management by automatically
`moving storage-intensive attachments and files into cost-effective cloud storage.
`
`Proofpoint Enterprise Governance can track, classify, monitor, and apply governance policies to unstructured information
`across the enterprise. By proactively governing unstructured information "in-place," organizations can effectively manage regulatory
`compliance, increase control over information and mitigate legal and financial risks. The key capabilities within Proofpoint Enterprise
`Governance include:
`
`•
`
`•
`
`•
`
`Document tracking—digital thread. Proofpoint Enterprise Gov

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket