End-to-end framework protects against data loss

End-to-end framework protects against data loss
Advertising

Share post

Proofpoint and certified partners provide their customers with a NIST-oriented end-to-end framework that supports the development, implementation and optimization of data loss prevention (DLP) programs.

Although DLP programs and technologies are becoming increasingly sophisticated, only 38% of organizations believe they have a "mature" DLP program. Organizations with complex needs are looking for more comprehensive solutions that go beyond traditional DLP measures. Until now, the industry has lacked a practical framework that addresses the challenges of implementing a DLP program in a rapidly evolving, multi-channel risk environment.

Advertising

Framework supports NIST specifications

Based on NIST1 standards and operated and managed by Proofpoint and its certified partners, Proofpoint's framework provides organizations with expertise and efficiencies that most organizations cannot achieve, even with highly skilled internal resources. The framework provides a blueprint for how organizations can combine people, processes and technology to analyze user behavior and content across all channels and apply best practices and insights to modernize data security.

The new framework follows Proofpoint's people-centric approach to protecting information and is based on over 20 years of experience developing and operating customized DLP programs for some of the most security-conscious organizations in the world. It also features a CISO Visualization Workshop: an in-depth, guided session for organizations looking to implement a best-in-class DLP program. Proofpoint certified partners can use the framework to help customers identify critical deficiencies and benchmark against industry peers, and establish a strategy and timeline for prioritizing and remediating the deficiencies based on Proofpoint's analysis and recommendations.

Advertising

Some essential components of the framework:

Planning, insights and setting rules:

  • In-depth assessment of the maturity level of a DLP program
  • benchmarking against industry colleagues
  • Recommendations for program design and implementation
  • Insights into behavioral patterns and content as a basis for rules

Prevention and adaptive response:

  • Investigation of new exfiltration and threat tactics with impact assessments
  • Coordination of rules and policies to optimize detection and data security
  • AI-powered SOC capabilities to streamline incident analysis and investigation, incident escalation and response

Metrics and governance reporting:

  • Daily system checks and monitoring
  • Reporting to management and documentation of results

Framework secures company information

"Today, data is at risk due to human behavior," said Rohit Dixit, executive vice president and chief customer officer at Proofpoint. "The rise of the 'workplace without boundaries' has dramatically increased the complexity of deploying a modern, adaptable, risk-based DLP program for most organizations. Proofpoint's unique framework and people-centric approach to protecting information builds on decades of experience and expertise in planning and executing customized DLP programs that protect some of the largest organizations in the world. Now customers can evolve their DLP program with the confidence that their team is supported by experts who know Proofpoint technology better than anyone else."

Proofpoint Information Protection is used by over 46 million users worldwide and is trusted by some of the world's biggest brands. With the new framework, Proofpoint and its certified partners offer a proven method for organizations to consolidate data security across all channels and protect information based on user behavior and intent, content and data lineage.

More at Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

OT environments: Detect and assess threats

Enterprises with limited resources can identify, assess, and make informed decisions about threats in OT environments with a comprehensive endpoint protection solution. ➡ Read more