Proofpoint is bringing a number of new capabilities to its Aegis Threat Protection, Identity Threat Defense, and Sigma Information Protection platforms. These enable organizations to stop malicious email attacks, detect and prevent identity-based threats, and protect sensitive data from theft, loss, and insider threats.
The new innovations from Proofpoint also complement the range of the newly founded Identity Threat Defense (formerly Illusive) business unit, in order to flexibly complement and protect productivity solutions such as Microsoft 365 in particular.
Aegis Threat Protection Platform
The Proofpoint Aegis Threat Protection Platform is an AI/ML-powered threat protection platform that defends against modern attacks such as Business Email Compromise (BEC), phishing, ransomware, supply chain threats and more. With flexible deployment options via both APIs and an inline architecture, Aegis offers advanced AI-powered cloud-based protection that complements native Microsoft 365 security capabilities.
Proofpoint has combined proprietary behavioral analysis and threat intelligence for features that provide visibility into attacks targeting cybercriminals for account takeovers, both within an organization's environment and via external vendors. Take EvilProxy, for example, which has become the most well-known MFA phishing-as-a-service provider, according to recent threat data from Proofpoint - a form of attack that allows cybercriminals to hijack accounts belonging to employees or trusted suppliers.
New features of the Aegis Threat Protection Platform
Supplier Threat Protection: Trusted supplier relationships are becoming increasingly popular as a gateway for cybercriminals: 69 percent of companies experienced an attack through the supply chain in the last year, and most CISOs view this fact with great concern. With Proofpoint Supplier Threat Protection, available today, organizations can identify compromised supplier accounts so security teams can quickly investigate and respond.
Targeted Attack Prevention Account Takeover (TAP ATO)
According to Proofpoint research, cybercriminals successfully defeat multi-factor authentication in 30 percent of targeted cloud and email account takeovers. Once inside, perpetrators can hide undetected around a company's perimeter and launch sophisticated attacks at will. Proofpoint TAP ATO, which will be available by the end of Q2023 XNUMX, provides visibility into the entire email account takeover attack chain. It accelerates inspection and prevents compromised accounts, malicious mailbox rule changes, third-party application tampering, and data exfiltration in email and cloud environments.
Identity Threat Defense
From ransomware to advanced persistent threats (APT), 90 percent of attacks are based on compromised identities. The complexity of managing Active Directory (AD) has meant that one in six endpoints in an organization is associated with a privileged identity that can be exploited for attacks. These identity risks include unmanaged on-premises administrators with outdated passwords, misconfigured users with unnecessary privileges, cached credentials left exposed on endpoints, and more.
Do you have a moment?
Take a few minutes for our 2023 user survey and help make B2B-CYBER-SECURITY.de better!You only have to answer 10 questions and you have an immediate chance to win prizes from Kaspersky, ESET and Bitdefender.
Here you go directly to the survey
The new features of Identity Threat Defense
Spotlight Risk Analytics: The new advanced risk analytics in the Spotlight dashboard enable users to get an overview of the risk trends and exposure of an organization in different risk categories and risk levels.
Proofpoint Spotlight Cross Domain & Trust Visibility: In organizations with complex infrastructures, the infrastructure for managing digital identities is often like a patchwork quilt. Spotlight Cross Domain & Trust Visibility provides insight into where there is too much trust between different segments of Active Directory.
Sigma Information Protection Platform
Proofpoint's Information Protection Platform is the only information protection platform that brings together content inspection, threat telemetry, and user behavior across all channels in a unified, cloud-native interface.
New feature of the Sigma Information Protection Platform
Privacy by Design Data Loss Prevention: International organizations need to accommodate new and changing local privacy and data sovereignty requirements. That's why Proofpoint now hosts its Sigma Information Protection platform not only in the US, but also in regions like the European Union, Japan and Australia.
More at Proofpoint.com
About Proofpoint Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.