proofpoint

proofpoint

Languages: Deutsch English Español Français Portuguese Русский
Localization: World

- Proofpoint products are designed to solve three business problems: advanced cybersecurity threats, regulatory compliance, and brand-impostor fraud (which it calls "digital risk"). These products work across email, social media, mobile devices, and the cloud - Email security In June 2008, Proofpoint acquired Fortiva, Inc., a provider of on-demand email archiving software for legal discovery, regulatory compliance and email storage management. Fortiva used Exchange journaling to automatically archive all internal and external communications so that end users can search all archived messages, including attachments, directly from a search folder in Outlook.

 

- Cybersecurity Proofpoint's security portfolio includes products that stop both traditional cyberattacks (delivered via malicious attachments and URLs) and socially engineered attacks - such as business email compromise (BEC) and credential phishing that do not use malware. It uses a blend of sandbox analysis, reputational analysis, automated threat data, human threat intelligence and attributes such as sender / recipient relationship, headers, and content, and more to detect potential threats. Automated encryption, data-loss prevention and forensics-gathering tools are designed to speed incident response and mitigate the damage and costs of any threats that do get through. The portfolio also includes protection from social-media account takeovers, harmful mobile apps, and rogue Wi-Fi networks.

- Regulatory compliances Proofpoint's compliance products are designed to reduce the manual labor involved in identifying potentially sensitive data, managing and supervising it in compliance with government and industry rules, and producing it quickly in e-discovery legal requests.

- Digital risk digital risk products are aimed at companies seeking to stop cybercriminals from impersonating their brand to harm customers, partners, and the brand's reputation. Its email digital risk portfolio includes authentication technology to prevent email domain spoofing. On social media, it stops scams in which fraudsters create fake customer-service accounts to find people seeking help over social media and trick them into handing over account credentials or visiting a malicious website. And in mobile, it finds counterfeit apps distributed through mobile app stores.

 

- In the 2016 Forrester Wave for Digital Risk Monitoring, Q3 2016 the Proofpoint digital risk / social media product was included in an evaluation of the nine top vendors in this emerging market. These monitor "digital" (ie social, mobile, web, and dark web) channels to detect, prevent, malicious or unwanted content from undermining organizational efforts to build brand across all major social media platforms. On October 23, 2014 Proofpoint acquired Nexgate, Inc., a social media and security compliance vendor. On November 4, 2015 Proofpoint acquired Socialware Inc., a compliance workflow & content capture and review technology company.

 

Image may contain: 1 person, sitting, text that says' Attackers start with people.  Your security should too.  proofpoint. '

No photo description available.

No photo description available.

No photo description available.





2024-10-25 17:19:41: Proofpoint Protect EMEA 2024 Youtube
2024-10-23 19:12:32: Proofpoint on Evolving Cybersecurity Trends in ANZ Youtube
2024-09-25 18:09:24: Proofpoint Protect New York 2024 Youtube
2024-09-20 23:14:19: Account Takeover: Bypassing Multi-factor Authentication Youtube
2024-09-20 23:14:09: Proofpoint - Supporting the CISO with Raconteur Youtube
2024-08-19 20:48:25: Proofpoint Protect 2024 Youtube
2024-08-19 19:05:05: Proofpoint Adaptive Email DLP Youtube
2024-07-08 20:05:13: Proofpoint 2024 Voice of the CISO Youtube
2024-07-08 20:01:41: Proofpoint EMEA Protect 2024 Youtube
2024-05-17 17:24:27: Proofpoint - The Human-Centric Cybersecurity Platform Provider Youtube
2023-04-04 13:05:10: Proofpoint has released research that shows that only 65% of the top 20 #retailers in the #MiddleEast have implemented the minimum level of #DMARC protection, meaning 35% are taking no steps to prevent #malicious actors from spoofing their domain. #email https://t.co/QS5mtnUm5s Twitter
2023-04-03 20:05:11: Daniela Almeida leans on her communications and cultural studies background in her current role as CISO of #fintech company, Tinka. This blog summarizes Daniela’s thoughts on people-centric cybersecurity, the pandemic's legacy and the language of the CISO.https://t.co/XChx69zlKL Twitter
2023-04-03 14:05:13: Coming to a city near you ➡️ Discovery Hands-On Lab: Combat #DataLoss and #InsiderRisk Experience our products and learn best practices to detect, investigate, respond to and stop potential threats and incidents. Receive a virtual badge upon completion! https://t.co/TFj47OhYTU Twitter
2023-03-31 16:05:15: Insider threats are less threatening when you know how to manage them. https://t.co/HGISdOoHCg In the Proofpoint Insider Threat Management (ITM) Starter Pack, you will find everything you need to get started with an ITM program or make your existing strategies more effective. https://t.co/k681iQSM9N Twitter
2023-03-30 23:05:11: Attackers know people are the easiest way into your organization. And now they’re doubling down on emerging and tried-and-tested tactics to outwit employees. Learn more in our report. https://t.co/3wFfn8cuZo #socialengineering #phishing #email Twitter

Alternatives

Videos