New AI/ML powered threat protection platform

New AI/ML powered threat protection platform

Share post

Proofpoint is bringing a number of new capabilities to its Aegis Threat Protection, Identity Threat Defense, and Sigma Information Protection platforms. These enable organizations to stop malicious email attacks, detect and prevent identity-based threats, and protect sensitive data from theft, loss, and insider threats.

The new innovations from Proofpoint also complement the range of the newly founded Identity Threat Defense (formerly Illusive) business unit, in order to flexibly complement and protect productivity solutions such as Microsoft 365 in particular.

Aegis Threat Protection Platform

The Proofpoint Aegis Threat Protection Platform is an AI/ML-powered threat protection platform that defends against modern attacks such as Business Email Compromise (BEC), phishing, ransomware, supply chain threats and more. With flexible deployment options via both APIs and an inline architecture, Aegis offers advanced AI-powered cloud-based protection that complements native Microsoft 365 security capabilities.

Proofpoint has combined proprietary behavioral analysis and threat intelligence for features that provide visibility into attacks targeting cybercriminals for account takeovers, both within an organization's environment and via external vendors. Take EvilProxy, for example, which has become the most well-known MFA phishing-as-a-service provider, according to recent threat data from Proofpoint - a form of attack that allows cybercriminals to hijack accounts belonging to employees or trusted suppliers.

New features of the Aegis Threat Protection Platform

Supplier Threat Protection: Trusted supplier relationships are becoming increasingly popular as a gateway for cybercriminals: 69 percent of companies experienced an attack through the supply chain in the last year, and most CISOs view this fact with great concern. With Proofpoint Supplier Threat Protection, available today, organizations can identify compromised supplier accounts so security teams can quickly investigate and respond.

Targeted Attack Prevention Account Takeover (TAP ATO)

According to Proofpoint research, cybercriminals successfully defeat multi-factor authentication in 30 percent of targeted cloud and email account takeovers. Once inside, perpetrators can hide undetected around a company's perimeter and launch sophisticated attacks at will. Proofpoint TAP ATO, which will be available by the end of Q2023 XNUMX, provides visibility into the entire email account takeover attack chain. It accelerates inspection and prevents compromised accounts, malicious mailbox rule changes, third-party application tampering, and data exfiltration in email and cloud environments.

Identity Threat Defense

From ransomware to advanced persistent threats (APT), 90 percent of attacks are based on compromised identities. The complexity of managing Active Directory (AD) has meant that one in six endpoints in an organization is associated with a privileged identity that can be exploited for attacks. These identity risks include unmanaged on-premises administrators with outdated passwords, misconfigured users with unnecessary privileges, cached credentials left exposed on endpoints, and more.

Do you have a moment?

Take a few minutes for our 2023 user survey and help make B2B-CYBER-SECURITY.de better!

You only have to answer 10 questions and you have an immediate chance to win prizes from Kaspersky, ESET and Bitdefender.

Here you go directly to the survey
 

The new features of Identity Threat Defense

Spotlight Risk Analytics: The new advanced risk analytics in the Spotlight dashboard enable users to get an overview of the risk trends and exposure of an organization in different risk categories and risk levels.

Proofpoint Spotlight Cross Domain & Trust Visibility: In organizations with complex infrastructures, the infrastructure for managing digital identities is often like a patchwork quilt. Spotlight Cross Domain & Trust Visibility provides insight into where there is too much trust between different segments of Active Directory.

Sigma Information Protection Platform

Proofpoint's Information Protection Platform is the only information protection platform that brings together content inspection, threat telemetry, and user behavior across all channels in a unified, cloud-native interface.

New feature of the Sigma Information Protection Platform

Privacy by Design Data Loss Prevention: International organizations need to accommodate new and changing local privacy and data sovereignty requirements. That's why Proofpoint now hosts its Sigma Information Protection platform not only in the US, but also in regions like the European Union, Japan and Australia.

More at Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more