Keeping data safe is more than just enforcing policies in a reactive manner—it’s about knowing where the risks come from and being proactive. Proofpoint Data Security helps organizations discover, classify and protect data. Our unified solution defends your data against risky users, excessive access, misconfigurations, and vulnerabilities. By combining content and context, Proofpoint provides visibility into user-centric risks to data. This human-centric approach helps organizations transform their data security programs.
This blog describes the latest innovations for the Proofpoint data security solution. These new product and service capabilities help organizations address top use cases, accelerate investigations, and streamline data protection.
1: Gain a holistic view of human and data risk
Proofpoint Human Risk Explorer aggregates intelligence from across the Proofpoint platform to deliver a unified view of user risk. It shows you threat activity, exposed data, behavioral signals, and security awareness engagement.
Human Risk Explorer helps identify and address your riskiest users through precise, data-driven insights. And it provides automated recommendations that are based on the level and type of risk to help prevent data loss and insider threats.
2: Protect against data loss and data exposure
Remediate sharing with external users in groups
Cloud DLP now automatically removes file-sharing permissions from external group members in Microsoft 365 (like OneDrive, SharePoint, and Teams) and Google Workspace. This helps improve visibility and reduces the risk of data exposure.
Protect data with Google badged labels
Google badged classification labels provide a visual indication of a file’s sensitivity level, helping improve data visibility, security, and compliance.
Cloud DLP now allows you to manually apply Google labels via Alert or Data Catalog. This complements the rule-driven automatic labeling introduced earlier this year by Proofpoint.
Protect unstructured data on the endpoint
Endpoint DLP now features the advanced content matching capabilities of Index Document Matching (IDM) to protect unstructured files, such as intellectual property (like source code and designs) and other sensitive documents (like roadmaps and M&A plans).
IDM efficiently scans data and pinpoints exact text matches. This improves detection accuracy and reduces false positives.
Enhance investigations
Proofpoint now allows you to retain visual evidence that’s captured by Endpoint DLP and Insider Threat Management in your cloud storage. This means you have streamlined access to files, screenshots, and snippets for investigations and forensic analysis.
Detect email attachments with sensitive data
Adaptive Email DLP now has the ability to look for sensitive keywords inside attachments, helping protect against email exfiltration.
This enables organizations to identify and prevent sensitive data from being sent to personal or unauthorized email accounts.
Real-time Snowflake data classification and tagging
As Snowflake Openflow’s first security partner, Proofpoint empowers enterprises to confidently adopt AI tools while maintaining full visibility and control over data.
Proofpoint DSPM automatically classifies and tags sensitive data when it’s ingested into Openflow. This enhances data security and streamlines compliance reporting without disrupting analytics workflows. Learn more about data security with Snowflake Openflow and Proofpoint DSPM.
View who has access to sensitive data
To improve visibility to access permissions, DSPM maps on-premises Active Directory users and groups to file system access control lists (ACLs). It highlights both direct and inherited permissions.
3: Unified Data Loss Prevention for Email DLP
Proofpoint Email Data Loss Prevention (DLP) is now integrated with Unified DLP. As a result, your teams get a streamlined and centralized way to protect sensitive data across your organization. Configuration, detection, and remediation can all be done from a single interface. The integration allows easier access to new features and updates, which helps teams respond more quickly and reduces administrative effort.
What’s more, the integration enhances how precisely and consistently DLP is enforced across channels. And it also lays a foundation for extended use cases such as data discovery, classification, and protection in hybrid and cloud environments.
Unified DLP also introduces a more structured and scalable framework for detecting content through Detectors and Data Classes:
- Detectors are user-defined rules. These rules are composed of expressions that guide the DLP engine to identify specific patterns or types of sensitive information within files, emails, and other content.
- Data Classes serve as collections of related Detectors. They help consistently enforce DLP policies across different vectors.
When content scanning is enabled across data loss channels, Unified DLP uses this detection logic to accurately identify and alert on sensitive data to help prevent unauthorized disclosure or exfiltration. Examples of detectable data include personally identifiable information (PII) such as Social Security numbers, driver’s license numbers, credit card details, and financial records.
You can create, edit, and test Detectors and Data Classes by using the Data Classification app in the Data Security & Posture platform. Select Data Class as a condition when you’re creating a new DLP rule.
4: Optimize your investments with Proofpoint expertise
New Applied Services for SMBs
Proofpoint Premium Services has introduced a new Applied Services offering that’s tailored to small and medium-sized businesses (SMBs). Here’s just some of what you can expect:
- A monthly meeting with a program strategy manager as well as one ad-hoc touchpoint per month
- Onboarding of your policy packs and one custom use case per quarter
- AI-driven triage
- Access to operational metrics and an annual program health check
Hands-on services for Adaptive Email DLP
To help you maximize the value of Adaptive Email DLP, Proofpoint now offers hands-on management services. These services cover system management, detection optimization, event analysis, notifications, reporting, and analytics.
Stay in the know
Learn more about Proofpoint Data Security. If you want updates about new developments in Proofpoint Data Security, register for our quarterly webinar series “Proofpoint Innovations: Defend Data.”