Follow-me Protection

Proofpoint Targeted Attack ProtectionUnique URL re-writing of links within all suspicious emails to enable click-time protection via the URL Defense Service that is agnostic to browser, user device, and user location.

A frequent tactic has been to send users socially engineered emails that are designed to entice the user to click a URL within the email. The URL web destination either automatically initiates a download, or tricks the user to enter sensitive or private information. Proofpoint research has shown that 20% of clicks by users on malicious emails occur off the corporate network, bypassing on-premise security controls.

Proofpoint’s URL Defense Service enables the solution to provide comprehensive security by following the email and checking for the URL destination’s safety in real-time. This provides the following benefits:

  • Protects the organization by testing every URL behind the scenes, wherever it’s clicked, whenever it’s clicked, to ensure that the organization is protected whether the user is accessing email on the corporate VPN or on an unsecured public connection (i.e. off the corporate VPN)

  • Provides discrete visibility and click-tracking by ensuring URLs are unique for each recipient and each message, enabling end-to-end insight

  • Does not act as a proxy service, but rather, redirects the user’s browser to safe destinations upon confirmation by Targeted Attack Protection; this ensures existing corporate security controls and acceptable use policies are not bypassed

Follow-Me Protection works in conjunction with Next-generation Detection and Predictive Defense to provide a comprehensive solution to defend against targeted attacks even after an email has been delivered to the recipient’s inbox.

Learn more about Targeted Threats or Proofpoint Targeted Attack Protection's capabilities:

Watch Demo
Watch Video NowProofpoint Targeted Attack Protection

Watch Demo Now »
Related Resources
Proofpoint Targeted Attack Protection DatasheetData Sheet: Learn more about Proofpoint Targeted Attack Protection.
Download Data Sheet »

Talk Now
Try it Now
Live Demo

2014 Targeted Attacks Study
Watch NowHow to Detect, Predict and Eliminate Advanced Targeted Threats.
Download Now
PodcastPhishing Attacks Remain No. 1 Risk
Targeted Campaigns Three Times More Likely to Target Financial Services
Listen Now
WebinarTargeted Attacks, Longline Phishing, and The Human Factor: Who’s Clicking, Why and How
Download Now
White Paper
Defense Against the Dark Arts: Finding and Stopping Advanced ThreatsDownload Now
©2014 Proofpoint, Inc.