proofpoint product portfolio · proofpoint product portfolio reducing risk with people-centric...

38
Proofpoint Product Portfolio Reducing Risk with People-Centric Security Roberto Maina System Engineer – Exclusive Networks [email protected] 1

Upload: others

Post on 21-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Proofpoint Product PortfolioReducing Risk with People-Centric Security

Roberto MainaSystem Engineer – Exclusive [email protected]

1

Page 2: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

AGENDA

• Proofpoint Overview• Email Protection Server• Targeted Attack Prevention (TAP)• Threat Response Auto-Pull (TRAP)• Essentials for SMB• P-SAT (Security Awareness Training)• P-CASB (Cloud Access Security Broker)• Q&A

Page 3: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Proofpoint Overview

Page 4: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

OverviewThe leader in protecting people from advanced threats and compliance risk

Magic Quadrant leadership across:

The most trusted partner to protect the leading threat vector

Most deployed solution for the Fortune 100

Seamless integration with other next gen

leadersglobal cybersecuritycompany in revenue

and market cap

Secure Email Gateway

Information Archiving

Security Awareness Training

Top 10

the only one focused on protecting people

Leading visionary

Leader for 7consecutive years

Leader for 6consecutive years

Leader for 7consecutive years

#1

Most deployed solution for the Global 2000

#1Most deployed solution

for the Fortune 1000

#1

Cloud Access Security Broker

Page 5: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Attacks increasingly target people, not infrastructure

$26.2B+

166,349Incidents worldwide

Direct losses worldwide(June 2016 – July 2019)

Source: FBI.

99%+Malware attacks rely on user to run malicious code

Source: Proofpoint Threat Data.

THREATS USE SOCIAL ENGINEERING, NOT VULNERABILITIES

Source: Proofpoint Threat Data.

Orgs exposed to targeted password attacks

85%Orgs detected successful account compromise

45%

Account takeover of cloud apps is a growing problem

SHIFT TO CLOUD CREATES NEW THREAT VECTORS, DATA EXPOSURE

EMAIL FRAUD IS ABOARD-LEVEL ISSUE

300%+Increase in corporate credential phishing

Active accounts in orgs targeted by attacks0.6%

$12.5B+

78,617Incidents worldwide

Direct losses worldwide(Oct 2013–May 2018)

Page 6: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Defenders Don’t Focus on People, Attackers Do

Source: 2019 Verizon DBIR

Source: Gartner Information Security, Worldwide 2017-2023, 2Q 2019 update (2019 forecast)

Network59%

Endpoint19%

Email10%

Web 12%

96%of breaches start

with attacks targeting people

SECURITY SPENDING BREACHES

Page 7: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Defensive strategy needs to counter attacker tactics

Page 8: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Who are your VAPs?

8

Attack

Vulnerability Privilege

VAPs Who Represents Risk to the Organization?

Who is Likely to Fall for those Threats?

Who Gets Targeted by Serious Threats?

Receive highly targeted, very sophisticated, or

high volumes of attacks

Clicks on malicious content, fails awareness

training, or uses risky devices or cloud services

Can access critical systems or sensitive data, or can be a vector for lateral movement

Page 9: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

The Proofpoint People-Centric Protection

© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary

Spoofing/BECPhish

MalwareDelayed action URLs

Targeted password attacksData Exfiltration

Page 10: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Email Protection Server

Page 11: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

The Billion Dollar Problem

Payload free

Socially Manipulative

Highly targetedAttacks

Page 12: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Targeted AttackProtection

Email Fraud Defense

EmailProtection

Information Protection

Proofpoint Advanced Email Security

Bulk Spam, DDOS Attacks

Email Classification

Virus Scanning

Dynamic Reputation

Composite Learning Engine

Anti-Virus

File-Based Threat Protection

Malicious URL Protection

Attachment Defense URL Defense

Email arrives

Encrypt communications Identify sensitive data

Email Encryption Email DLP

Email leaves

BEC Attacks Consumer Phishing

Email Authentication & Visibility

Continuity

TRAP

DomainDiscover

**

Page 13: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 14: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 15: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 16: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 17: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Targeted Attack Protection (TAP)

Page 18: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

HOW you are being attacked

WHEN you might be compromised

WHEN you are being attacked

File URL

HOW targeted is the attack

Phish

Malware

Impostor

Impostor

Highlighted

Page 19: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Who are your VAPs & how are they being attacked?

Page 20: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Threat Response Auto-Pull (TRAP)

Page 21: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 22: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 23: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Proofpoint Essentials for SMB

Page 24: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

EmailProtection

Email Archiving

InformationProtection

Advanced ThreatProtection

EmailContinuity

Proofpoint Cloud

24x7 Support

SMB Focused

Proofpoint Essentials

Page 25: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Key Differences in Essentials

• Much simpler interface• More ‘best practice’ functionality built in• Less customization around mail

routing/policies• Multi-tenant, cloud only• Simplistic reporting• Much quicker to deploy• POCs managed easily

Key Similarities

• Threat Intelligence• Spam and Threat Detection Engines• BEC Impostor Detection Engine• F-Secure AV & Clam AV• URL rewriting and Sandboxing• Attachment Sandboxing• Data Centre Locations• Threat Research team

Solution Comparison – Essentials vs. Enterprise

Page 26: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

© 2019 Proofpoint. All rights reserved

Page 27: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

© 2019 Proofpoint. All rights reserved

Page 28: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

© 2019 Proofpoint. All rights reserved

Page 29: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Proofpoint Security Awareness Training (PSAT)

Page 30: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

WOMBAT ACQUISITION AND BIRTH OF P-SAT

Proofpoint offers Security Solutions aiming atmodifying end-user behavior

• A company leader in behavior changing• Leader for 4 consecutive years in Gartner Magic

Quadrant• Born from a research of Carnegie Mellon

University in 2008• Global customers including most Fortune 500

companies• Acquired by Proofpoint in March 2018

Page 31: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Continuous Training Methodology

Analyze and

Repeat

Knowledge assessmentsMock attacks

Interactive training modules & games

Reporting attacks, videos, posters, articles

Detailed reports show progress

Page 32: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS
Page 33: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Proofpoint Cloud Access Security Broker (P-CASB)

Page 34: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Employees

Partners

Customers

Vendors

Managed

Unmanaged

Mass migration to the cloud

On-Network Off-Network

East-West Traffic

North-South Traffic

© 2020 Proofpoint. All rights reserved

Page 35: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

• Adaptive access controls• Risk based authentication

• Unified DLP across cloud apps, email and on-premises file repositories

• Consistent data classification• Microsoft AIP support

Agentless Architecture with Access Control

• Extend People-Centric Threat Protection

• Compromised accountsdetection and remediation

• Malware protection

• Shadow IT visibility• OAuth based third-

party apps protection

Proofpoint CASB

Data Security

© 2020 Proofpoint. All rights reserved

Threat Protection

Cloud Governance

Page 36: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

© 2019 Proofpoint. All rights reserved

Page 37: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

Q&A

Page 38: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS

GRAZIE

[email protected]@exclusive-networks.com