New AI/ML powered threat protection platform

New AI/ML powered threat protection platform

Share post

Proofpoint is bringing a number of new capabilities to its Aegis Threat Protection, Identity Threat Defense, and Sigma Information Protection platforms. These enable organizations to stop malicious email attacks, detect and prevent identity-based threats, and protect sensitive data from theft, loss, and insider threats.

The new innovations from Proofpoint also complement the range of the newly founded Identity Threat Defense (formerly Illusive) business unit, in order to flexibly complement and protect productivity solutions such as Microsoft 365 in particular.

Aegis Threat Protection Platform

The Proofpoint Aegis Threat Protection Platform is an AI/ML-powered threat protection platform that defends against modern attacks such as Business Email Compromise (BEC), phishing, ransomware, supply chain threats and more. With flexible deployment options via both APIs and an inline architecture, Aegis offers advanced AI-powered cloud-based protection that complements native Microsoft 365 security capabilities.

Proofpoint has combined proprietary behavioral analysis and threat intelligence for features that provide visibility into attacks targeting cybercriminals for account takeovers, both within an organization's environment and via external vendors. Take EvilProxy, for example, which has become the most well-known MFA phishing-as-a-service provider, according to recent threat data from Proofpoint - a form of attack that allows cybercriminals to hijack accounts belonging to employees or trusted suppliers.

New features of the Aegis Threat Protection Platform

Supplier Threat Protection: Trusted supplier relationships are becoming increasingly popular as a gateway for cybercriminals: 69 percent of companies experienced an attack through the supply chain in the last year, and most CISOs view this fact with great concern. With Proofpoint Supplier Threat Protection, available today, organizations can identify compromised supplier accounts so security teams can quickly investigate and respond.

Targeted Attack Prevention Account Takeover (TAP ATO)

According to Proofpoint research, cybercriminals successfully defeat multi-factor authentication in 30 percent of targeted cloud and email account takeovers. Once inside, perpetrators can hide undetected around a company's perimeter and launch sophisticated attacks at will. Proofpoint TAP ATO, which will be available by the end of Q2023 XNUMX, provides visibility into the entire email account takeover attack chain. It accelerates inspection and prevents compromised accounts, malicious mailbox rule changes, third-party application tampering, and data exfiltration in email and cloud environments.

Identity Threat Defense

From ransomware to advanced persistent threats (APT), 90 percent of attacks are based on compromised identities. The complexity of managing Active Directory (AD) has meant that one in six endpoints in an organization is associated with a privileged identity that can be exploited for attacks. These identity risks include unmanaged on-premises administrators with outdated passwords, misconfigured users with unnecessary privileges, cached credentials left exposed on endpoints, and more.

Do you have a moment?

Take a few minutes for our 2023 user survey and help make B2B-CYBER-SECURITY.de better!

You only have to answer 10 questions and you have an immediate chance to win prizes from Kaspersky, ESET and Bitdefender.

Here you go directly to the survey
 

The new features of Identity Threat Defense

Spotlight Risk Analytics: The new advanced risk analytics in the Spotlight dashboard enable users to get an overview of the risk trends and exposure of an organization in different risk categories and risk levels.

Proofpoint Spotlight Cross Domain & Trust Visibility: In organizations with complex infrastructures, the infrastructure for managing digital identities is often like a patchwork quilt. Spotlight Cross Domain & Trust Visibility provides insight into where there is too much trust between different segments of Active Directory.

Sigma Information Protection Platform

Proofpoint's Information Protection Platform is the only information protection platform that brings together content inspection, threat telemetry, and user behavior across all channels in a unified, cloud-native interface.

New feature of the Sigma Information Protection Platform

Privacy by Design Data Loss Prevention: International organizations need to accommodate new and changing local privacy and data sovereignty requirements. That's why Proofpoint now hosts its Sigma Information Protection platform not only in the US, but also in regions like the European Union, Japan and Australia.

More at Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

SME: Backup and recovery including malware detection 

More resilience against ransomware for SMBs: The latest version of the all-in-one data protection solution Veritas Backup Exec offers new malware detection, role-based access control and faster ➡ Read more

Without a forced break: Fast data migration to new systems

Data migration, i.e. moving data from an old system to a new one, is an important task in one ➡ Read more

Sharp increase in ransomware

A leading provider of an AI-powered, cloud-based cybersecurity platform has released its new cyberattack and ransomware statistics for Q1 2024 ➡ Read more

MDR: Advanced Managed Detection and Response service

Cybersecurity specialist Bitdefender has presented its further developed offering for managed detection and response services. Companies and organizations can now use two different levels of service ➡ Read more

Browser attack: Acceleration through graphics card as a point of attack

Browser attack: Researchers from the Institute for Applied Information Processing and Communication Technology at Graz University of Technology were able to use a website with malicious JavaScript ➡ Read more

Trap: Fake Skype, Zoom and Google Meet websites

Some attackers use online meeting services as bait for malware. Zscaler researchers found fake Skype, Zoom and Google Meet websites, ➡ Read more

Increase in ransomware attacks and compliance failures

An annual report highlights the latest threats, trends and emerging topics in data security. It is based on a survey ➡ Read more

Protect identities with intelligent authorization controls

The number of human and non-human identities in organizations is growing rapidly, and sooner or later each of these identities will need access ➡ Read more