proofpoint product portfolio · proofpoint product portfolio reducing risk with people-centric...
TRANSCRIPT
Proofpoint Product PortfolioReducing Risk with People-Centric Security
Roberto MainaSystem Engineer – Exclusive [email protected]
1
AGENDA
• Proofpoint Overview• Email Protection Server• Targeted Attack Prevention (TAP)• Threat Response Auto-Pull (TRAP)• Essentials for SMB• P-SAT (Security Awareness Training)• P-CASB (Cloud Access Security Broker)• Q&A
Proofpoint Overview
OverviewThe leader in protecting people from advanced threats and compliance risk
Magic Quadrant leadership across:
The most trusted partner to protect the leading threat vector
Most deployed solution for the Fortune 100
Seamless integration with other next gen
leadersglobal cybersecuritycompany in revenue
and market cap
Secure Email Gateway
Information Archiving
Security Awareness Training
Top 10
the only one focused on protecting people
Leading visionary
Leader for 7consecutive years
Leader for 6consecutive years
Leader for 7consecutive years
#1
Most deployed solution for the Global 2000
#1Most deployed solution
for the Fortune 1000
#1
Cloud Access Security Broker
Attacks increasingly target people, not infrastructure
$26.2B+
166,349Incidents worldwide
Direct losses worldwide(June 2016 – July 2019)
Source: FBI.
99%+Malware attacks rely on user to run malicious code
Source: Proofpoint Threat Data.
THREATS USE SOCIAL ENGINEERING, NOT VULNERABILITIES
Source: Proofpoint Threat Data.
Orgs exposed to targeted password attacks
85%Orgs detected successful account compromise
45%
Account takeover of cloud apps is a growing problem
SHIFT TO CLOUD CREATES NEW THREAT VECTORS, DATA EXPOSURE
EMAIL FRAUD IS ABOARD-LEVEL ISSUE
300%+Increase in corporate credential phishing
Active accounts in orgs targeted by attacks0.6%
$12.5B+
78,617Incidents worldwide
Direct losses worldwide(Oct 2013–May 2018)
Defenders Don’t Focus on People, Attackers Do
Source: 2019 Verizon DBIR
Source: Gartner Information Security, Worldwide 2017-2023, 2Q 2019 update (2019 forecast)
Network59%
Endpoint19%
Email10%
Web 12%
96%of breaches start
with attacks targeting people
SECURITY SPENDING BREACHES
Defensive strategy needs to counter attacker tactics
Who are your VAPs?
8
Attack
Vulnerability Privilege
VAPs Who Represents Risk to the Organization?
Who is Likely to Fall for those Threats?
Who Gets Targeted by Serious Threats?
Receive highly targeted, very sophisticated, or
high volumes of attacks
Clicks on malicious content, fails awareness
training, or uses risky devices or cloud services
Can access critical systems or sensitive data, or can be a vector for lateral movement
The Proofpoint People-Centric Protection
© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary
Spoofing/BECPhish
MalwareDelayed action URLs
Targeted password attacksData Exfiltration
Email Protection Server
The Billion Dollar Problem
Payload free
Socially Manipulative
Highly targetedAttacks
Targeted AttackProtection
Email Fraud Defense
EmailProtection
Information Protection
Proofpoint Advanced Email Security
Bulk Spam, DDOS Attacks
Email Classification
Virus Scanning
Dynamic Reputation
Composite Learning Engine
Anti-Virus
File-Based Threat Protection
Malicious URL Protection
Attachment Defense URL Defense
Email arrives
Encrypt communications Identify sensitive data
Email Encryption Email DLP
Email leaves
BEC Attacks Consumer Phishing
Email Authentication & Visibility
Continuity
TRAP
DomainDiscover
**
Targeted Attack Protection (TAP)
HOW you are being attacked
WHEN you might be compromised
WHEN you are being attacked
File URL
HOW targeted is the attack
Phish
Malware
Impostor
Impostor
Highlighted
Who are your VAPs & how are they being attacked?
Threat Response Auto-Pull (TRAP)
Proofpoint Essentials for SMB
EmailProtection
Email Archiving
InformationProtection
Advanced ThreatProtection
EmailContinuity
Proofpoint Cloud
24x7 Support
SMB Focused
Proofpoint Essentials
Key Differences in Essentials
• Much simpler interface• More ‘best practice’ functionality built in• Less customization around mail
routing/policies• Multi-tenant, cloud only• Simplistic reporting• Much quicker to deploy• POCs managed easily
Key Similarities
• Threat Intelligence• Spam and Threat Detection Engines• BEC Impostor Detection Engine• F-Secure AV & Clam AV• URL rewriting and Sandboxing• Attachment Sandboxing• Data Centre Locations• Threat Research team
Solution Comparison – Essentials vs. Enterprise
© 2019 Proofpoint. All rights reserved
© 2019 Proofpoint. All rights reserved
© 2019 Proofpoint. All rights reserved
Proofpoint Security Awareness Training (PSAT)
WOMBAT ACQUISITION AND BIRTH OF P-SAT
Proofpoint offers Security Solutions aiming atmodifying end-user behavior
• A company leader in behavior changing• Leader for 4 consecutive years in Gartner Magic
Quadrant• Born from a research of Carnegie Mellon
University in 2008• Global customers including most Fortune 500
companies• Acquired by Proofpoint in March 2018
Continuous Training Methodology
Analyze and
Repeat
Knowledge assessmentsMock attacks
Interactive training modules & games
Reporting attacks, videos, posters, articles
Detailed reports show progress
Proofpoint Cloud Access Security Broker (P-CASB)
Employees
Partners
Customers
Vendors
Managed
Unmanaged
Mass migration to the cloud
On-Network Off-Network
East-West Traffic
North-South Traffic
© 2020 Proofpoint. All rights reserved
• Adaptive access controls• Risk based authentication
• Unified DLP across cloud apps, email and on-premises file repositories
• Consistent data classification• Microsoft AIP support
Agentless Architecture with Access Control
• Extend People-Centric Threat Protection
• Compromised accountsdetection and remediation
• Malware protection
• Shadow IT visibility• OAuth based third-
party apps protection
Proofpoint CASB
Data Security
© 2020 Proofpoint. All rights reserved
Threat Protection
Cloud Governance
© 2019 Proofpoint. All rights reserved
Q&A
GRAZIE
[email protected]@exclusive-networks.com