Proofpoint TAP
(Targeted Attack Protection)
Collaboration Security
90% 以äžã®æšçåæ»æã¯ãã¡ãŒã«ããå§ãŸããŸãããããŠãµã€ããŒè åšã¯åžžã«é²åããŠããŸããProofpoint TAP (Targeted Attack Protection)ã§ã¯ãé«åºŠãªè åšãåä¿¡ç®±ã«å±ãåã«æ€åºãåæããããã¯ãã驿°çãªã¢ãããŒãã䜿ã£ãŠãæ»æè ã®äžæ©å ãè¡ãããšãã§ããŸããé«åºŠãªè åšã«ã¯æªæã®ããæ·»ä»ãã¡ã€ã«ã URL ãéããŠäŸµå ¥ããã©ã³ãµã ãŠã§ã¢ããŒããã€æ»æãããªã¢ãŒãã£ãã¯åãã«ãŠã§ã¢ãæŠåšåãããææžããã£ãã·ã³ã°æ»æãªã©ãå«ãŸããŸããProofpoint TAP ã¯ã人ããããã«å¯ŸããŠé©åãªã»ãã¥ãªãã£ãæäŸããã¢ãããã£ã ã³ã³ãããŒã«ãæäŸãããªã¹ã¯ã«å¿ããŠURL ã¯ãªãã¯ãã¢ã€ãœã¬ãŒã·ã§ã³ç°å¢ã§å®è¡ããããšãã§ããŸãããŸã Proofpoint TAP ã¯ã¯ã©ãŠãã¢ããªã«å åšããè åšããªã¹ã¯ãæ€åºããèªèšŒæ å ±ã®çªåããã®ä»ã®æ»æã«ã€ãªãããããªã¡ãŒã«æ»æãé¢é£ä»ããŸãã
Demo
URLãæ·»ä»ãã¡ã€ã«ãã¯ã©ãŠããçµç±ããè åšããã®é²åŸ¡
Proofpoint TAP (Targeted Attack Protection) ã¯ããã«ãŒããã€ã³ãã®æ¬¡äžä»£åã¡ãŒã«ã»ãã¥ãªãã£ããã³ã¯ã©ãŠããã©ãããã©ãŒã äžã«æ§ç¯ãããŠãããç¬èªã®ã¢ãŒããã¯ãã£äžã®ã¡ãªããããããŸããProofpoint TAP ã¯ãéçææ³ãšåçææ³ã䜿çšããŠæ°ãããµã€ããŒæ»æã®ãã¿ãŒã³ã«ç¶ç¶çã«é©å¿ããæ€ç¥ããŸããæœåšçè åšã®åæã¯ãæ¯ãèããã³ãŒãããããã³ã«ãæ€èšŒããè€æ°ã®ã¢ãããŒãã§è¡ãããŸããããã«ãããæ»æãã§ãŒã³ã®åæã®æ®µéã§è åšãæ€åºããŸããåæäŸµå®³ã詊ã¿ãè åšãšããŠã¯ãæªæã®ããæ·»ä»ãã¡ã€ã«ãçšãããããã«ãŠã§ã¢ãã€ã³ã¹ããŒã«ãããããã® URL ãéãã€ãããŠãŒã¶ãŒãã ãŸããŠãã¹ã¯ãŒããæ©å¯æ å ±ãå ±æãããããšãããªã©ã®ãµã€ããŒæ»æããããŸãããµã³ãããã¯ã¹è§£æã¯ãä»®æ³ç°å¢ããã¢ã¡ã¿ã« ããŒããŠã§ã¢ã§è¡ãããã¢ããªã¹ãã«ããããã¥ã¢ã«è§£æãå å³ããŠæ€ç¥èœåãæå€§åãããã€ã³ããªãžã§ã³ã¹ãåŸãããšãã§ããŸãããŸã Proofpoint TAP ã¯ã¯ã©ãŠãã¢ããªã«å åšããè åšããªã¹ã¯ãæ€ç¥ããèªèšŒæ å ±ã®çªåããã®ä»ã®æ»æã«ã€ãªãããããªã¡ãŒã«æ»æãé¢é£ä»ããŸãããã«ãŒããã€ã³ãã®æè¡ã¯åã«è åšãã©ã³ãµã ãŠã§ã¢ãæ€ç¥ããã ãã§ã¯ãããŸãããæ©æ¢°åŠç¿ãå¿çšããŠåè åšã®ãã¿ãŒã³ãè¡åããã¯ããã¯ã芳å¯ããŸããããããç¥èŠã«åºã¥ããŠãProofpoint TAP ã¯åŠç¿ããé©å¿ããŠãããŸããããã«ãããæ¬¡ã®æ»æããã容æã«ææã§ããããã«ãªããŸãã
ãã«ãŒããã€ã³ã㯠G2 ã® 2023 幎å¬çã¡ãŒã«ã»ãã¥ãªã㣠ã¬ããŒãã«ãã㊠No.1 ã«
|
|
|
|
|
TAP URL Defense
- ãã«ãŠã§ã¢ã®è åšãèªèšŒæ å ±ã®ãã£ãã·ã³ã°ãå«ã URL ãçšããã¡ãŒã«è åšããä¿è·
- ã¡ãŒã«ãã©ãã£ãã¯ã®ãã¿ãŒã³ã«åºã¥ããŠäžå¯©ãª URL ãå åãããŠç¹å®ãããµã³ãããã¯ã¹è§£æããããªãäºæž¬åæ
- ããããããã€ã¹ãŸãã¯ãããã¯ãŒã¯äžã®ãŠãŒã¶ãŒãä¿è·ããã¯ãªãã¯ãããã³ã«ãªã¢ã«ã¿ã€ã ã«ãµã³ãããã¯ã¹è§£æãæäŸããããã« URL ãæžãæã
TAP Attachment Defense
- æ¢ç¥ã®æªæã®ããææžããä¿è·
- äžæãªæ·»ä»ãã¡ã€ã«ãåæã»ãµã³ãããã¯ã¹è§£æ
- ããŸããŸãªã¿ã€ãã®ãã¡ã€ã«ããã¹ã¯ãŒãã§ä¿è·ãããææžãURLãåã蟌ãŸããæ·»ä»ãã¡ã€ã«ãZipãã¡ã€ã«ã®ãµã³ãããã¯ã¹è§£æãšåæ
Advanced BEC Defense
- ããžãã¹ã¡ãŒã«è©æ¬ºïŒBEC: Business Email CompromiseïŒãšãµãã©ã€ã€ãŒã¢ã«ãŠã³ã䟵害ã«å¯Ÿããé²è·
- ã¡ãã»ãŒãžå ã®è©³çްã®åæãFromããããã©ã¬ã³ãžãã¯ãéä¿¡å IPã¢ãã¬ã¹ãéä¿¡è ãšåä¿¡è ã®é¢ä¿ãã¬ãã¥ããŒã·ã§ã³åæã«ãã詳现ãªã³ã³ãã³ãåæ
- ææ³ã芳å¯ãã¡ãã»ãŒãžãµã³ãã«ã®å¯èŠåã«ãã詳现ãªåæ
TAP SaaS Defense
- äžå¯©ãªãã°ã€ã³ã¢ã¯ãã£ããã£ã®å¯èŠå
- åºç¯ãªãã¡ã€ã«å ±æã®å¯èŠå
- éèŠãª/é倧æ§ã®é«ããµãŒãããŒã㣠ã¢ããªã±ãŒã·ã§ã³ã®æ€ç¥
TAP URL Isolation for VAPs
- ãªã¹ã¯ãããã¡ã€ã«ã«åºã¥ããŠVAP (Very Attacked Peopleâ¢) åãã®ã¢ãããã£ã ã»ãã¥ãªã㣠ã³ã³ãããŒã«ãæäŸ
- ãŠãŒã¶ãŒãäžæãŸãã¯ãªã¹ã¯ã®ããWebãµã€ãã«ã¢ã¯ã»ã¹ã§ããããã«ããªãããURLãŸãã¯WebããŒã¹ã®æ»æããçµç¹ãä¿è·
- èš±å¯ãããã¯ãªãã¯ã®å¯èŠæ§ã匷åããä¿è·
Proofpoint STP (Supplier Threat Protection)
- äŒç€ŸãšããåããããµãŒãããŒãã£ããµãã©ã€ã€ãŒã®ãã¡ã€ã³ãããã¢ã¯ãã£ãã«ç£èŠããããšã«ãããã¢ã«ãŠã³ããžã®äžæ£ã¢ã¯ã»ã¹ãçãããã¢ã¯ãã£ããã£ãæ€ç¥
- å¹ççã«ãšããã³ã¹ãåéããäžæ£ã¢ã¯ã»ã¹ãåããé«ãªã¹ã¯ã¢ã«ãŠã³ããžã®å¯ŸåŠãåªå å
- çµç¹ãæšçã«ãããŠããªããŠããçµç¹ãã¡ãŒã«ã®ããåããããŠãããã³ããŒåŽã§ããã«ãŒããã€ã³ãã®ãšã³ã·ã¹ãã å ã®ã©ããã§äžæ£ã¢ã¯ã»ã¹ãåããã¢ã«ãŠã³ãã確èªããæ¬¡ç¬¬ãæ©æã«éç¥
ïŒProofpoint STPã¯ãProofpoint TAPã®ææãªãã·ã§ã³ã§ãïŒ
ãµãã©ã€ãã§ãŒã³æ»æ
Proofpoint TAP Account Takeover
- æ»æãã§ãŒã³ã«ãããŠã¢ã«ãŠã³ãã®ä¹ã£åãããä¿è·
- æ»æè ãã©ã®ããã«ã¢ã«ãŠã³ãã«ã¢ã¯ã»ã¹ãããã«ã€ããŠããŸãã¢ã¯ã»ã¹åŸã®æªæã®ããã¢ã¯ãã£ããã£ã«ã€ããŠã®å¯èŠåãšèª¿æ»
- ã¡ãŒã«ãã¯ã©ãŠãç°å¢ã«ãããŠã䟵害ãããã¢ã«ãŠã³ããæªæã®ããã¡ãŒã«ããã¯ã¹ ã«ãŒã«å€æŽãæªçšããããµãŒãããŒã㣠ã¢ããªãããŒã¿ã®æãåºãã修埩
Proofpoint TAP Account Takeoverã¯ãProofpoint TAP (Targeted Attack Protection)ã®æåãªãã·ã§ã³ ã¢ããªã³ã§ãïŒè¿œå ã®ã©ã€ã»ã³ã¹è³Œå ¥ãå¿ èŠïŒãããã¯ã䟵害åŸã®åªããæ©èœæ§ã確ä¿ããProofpoint CAD (Cloud Account Defense)ã«ä»£ãããã®ãšãªããŸãã
Proofpoint TAP Account Takeover
åŸæ¥å¡ãæšçã«ããè åšã«å¯Ÿããæ·±ãç¥èŠãæäŸ
ã¡ãŒã«ãã¯ã©ãŠãããããã¯ãŒã¯ãã¢ãã€ã«ããœãŒã·ã£ã«ã¡ãã£ã¢ãç¶²çŸ ããè åšã€ã³ããªãžã§ã³ã¹ãæäŸããŠããã®ã¯ãã«ãŒããã€ã³ãã ãã§ããã³ãã¥ããã£ããŒã¹ã®ã€ã³ããªãžã§ã³ã¹ã®è åšã°ã©ãã¯ã1 å ãè¶ ããããŒã¿ãã€ã³ãããæ å ±ãåéããããŸããŸãªæ¥çš®ãšå°åã«ãŸãããæ»æãã£ã³ããŒã³ãçžé¢åæããŸããProofpoint TAP (Targeted Attack Protection)è åšããã·ã¥ããŒããããã®ç¥èŠããçµç¹ããŠãŒã¶ãŒã¬ãã«ã§ãã®ä»ã®ç¬èªã®ç¥èŠãç°¡åã«æŽ»çšããããšãã§ããŸãã
Advanced BEC Defenseæ©èœ
NexusAI ãæèŒãã Advanced BEC Defenseæ©èœ ã¯ããŸããŸãªã¡ãŒã«è©æ¬ºã黿¢ããããã«èšèšãããŠããŸãã䟵害ãããã¢ã«ãŠã³ããæªçšããééå å£åº§ã®å€æŽäŸé Œããµãã©ã€ã€ãŒè«æ±æžè©æ¬ºãªã©ã广çã«é»æ¢ããŸãããã®çš®ã®æ»æã§ã¯æ€ç¥å¯èœãªæªæã®ãããã€ããŒãã䜿ãããŠããªãããšãå€ããæ€ç¥ããã«ã¯ããé«åºŠãªæè¡ãå¿ èŠã«ãªããŸãã
Advanced BEC Defense æ©èœã¯ãAI ãšæ©æ¢°åŠç¿ãå¿çšããæ€ç¥ãšã³ãžã³ãåããŠãããBEC æ»æãçºèŠã黿¢ããããèšèšãããŠããŸããæ¬¡ã®ãããªè€æ°ã®ã¡ãã»ãŒãžå±æ§ãåæããŸãã
- ã¡ãã»ãŒãž ããã㌠ããŒã¿
- éä¿¡è ã® IP ã¢ãã¬ã¹ (X-Originating IP ãã¬ãã¥ããŒã·ã§ã³)
- ã¡ãã»ãŒãžæ¬æå ã®ç·æ¥æ§ã蚎ããåèªããã¬ãŒãºãªã©
ããã«ãããã¡ãã»ãŒãžã BEC è åšãã©ãããå€å¥ããŸãããŸããè¿ä¿¡å ïŒreply-toïŒã®å€æŽãæªæã®ãã IP ã®äœ¿çšããµãã©ã€ã€ãŒã«ãªãããŸãããã¡ã€ã³ã®äœ¿çšãšãã£ããæ»æè ã®ããŸããŸãªæŠè¡ãæ€ç¥ããŸãã
Advanced BEC Defense æ©èœã¯ãŸããBEC è åšã®è©³çްãæäŸããŸããBEC ããŒã (äŸ: ãµãã©ã€ã€ãŒè«æ±ãã®ããã«ãŒããçµŠäžæ¯èŸŒå 倿Ž)ãã¡ãã»ãŒãžãäžå¯©ã§ããçç±ãã¡ãã»ãŒãžã®ãµã³ãã«ãæäŸããŸãããããã®éèŠæ å ±ã«ãããã»ãã¥ãªãã£ããŒã ã¯æ»æãçè§£ããŠéç¥ã§ããŸãã
VAP (Very Attacked Peopleâ¢)
- ã»ãã¥ãªãã£ããŒã ã¯æšçåã®è åšãã©ã³ãµã ãŠã§ã¢ãã人ãä¿è·ããããã«ãæãæ»æãåãããã人ïŒVAPïŒã¯èª°ãªã®ããç¥ãå¿ èŠããããŸããProofpoint Attack Indexã䜿çšãããšããã®ãããªVAPã容æã«ç¹å®ã§ããŸãããã®ã€ã³ããã¯ã¹ã¯çµç¹å ã®ãŠãŒã¶ãŒã«éä»ããããã¹ãŠã®è åšã«é¢ããå éè€åã¹ã³ã¢ã§ãæ»æè ã®é«åºŠããæ»ææšçã®æ¡æ£ãšéäžãæ»æã¿ã€ããå šäœã®æ»æããªã¥ãŒã ã®4ã€ã®ãã¡ã¯ã¿ãŒã«åºã¥ããŠ0ãã1000ã§è åšãæ¡ç¹ããŸããVAPãææ¡ããã°ããã广çãªå¯Ÿçãåªå ããŠãè åšã黿¢ããããšãå¯èœã«ãªããŸãã
Company-Level Attack Index
- Company-Level Attack IndexïŒäŒæ¥ã¬ãã«ã§ã®æ»æææ°ïŒã«ã¯2ã€ã®ã¬ããŒããå«ãŸããŸããIndustry ComparisonïŒæ¥çæ¯èŒïŒã¬ããŒããšHistorical Attack Index TrendingïŒéå»ã®æ»æææ°ååïŒã¬ããŒãã§ãããããã¯ã©ã¡ãããšã°ãŒã¯ãã£ãã¬ãã«ã®ã¬ããŒããšããŠãçµç¹ãæ»æããè åšã®é倧æ§ã«åºã¥ããŠäŒç€Ÿã¬ãã«ã®ãªã¹ã¯ãçè§£ããå ±æããŸãããŸããææ¬¡ã®Company Attack IndexïŒäŒæ¥æ»æææ°ïŒãæéã®çµéãšå ±ã«ã©ã®ããã«å€åããŠãããã«ã€ããŠå¯èŠåããããšãã§ããŸããããã«ãããè åšç¶æ³ãã©ã®ããã«å€åããŠãããã«ã€ããŠæŠè¡çãªç¥èŠã衚é¢åãããããšãã§ããŸãããŸãããã«ãŒããã€ã³ãå°æã®ããŒã¿ã掻çšããããšãã§ããŸããããã«ãããCompany Attack IndexïŒäŒæ¥æ»æææ°ïŒããã¢ã°ã«ãŒãïŒäŸïŒæ¥çš®å¥ïŒãšæ¯èŒããããšãã§ããŸããããã«ãããè åšç¶æ³ã«å¯Ÿããå¯èŠæ§ã匷åããæ¡å€§ããããšãã§ããŸãã
Threat Insightããã·ã¥ããŒã
- TAP Threat Insightããã·ã¥ããŒãã¯ãè åšãšãã£ã³ããŒã³ã«é¢ããè©³çŽ°ãªæ å ±ããªã¢ã«ã¿ã€ã ã§æäŸããŸããããã«ãããæ»æã®ç¯å²ãšæšçãå¯èŠåã§ããŸãã圱é¿ãåããŠãããŠãŒã¶ãŒãæ»æã®ã¹ã¯ãªãŒã³ã·ã§ããã詳现ãªãã©ã¬ã³ãžãã¯ããè åšã«é¢ãã詳现ãåŸãããšãã§ããŸãã
åªããã€ã³ããªãžã§ã³ã¹ãšå¯èŠæ§
ãã«ãŒããã€ã³ãã ããã¡ãŒã«ãã¯ã©ãŠãããããã¯ãŒã¯ãã¢ãã€ã«ã¢ããªããã³ãœãŒã·ã£ã«ã¡ãã£ã¢ãç¶²çŸ ããè åšã€ã³ããªãžã§ã³ã¹ãæäŸããŠããŸããã³ãã¥ããã£ããŒã¹ã®ã€ã³ããªãžã§ã³ã¹ã®è åšã°ã©ãã§ã¯ã 6,000å以äžã®ããŒã¿ãã€ã³ããçšããŠãããŸããŸãªæ¥çãšå°åã«ããã¶æ»æãã£ã³ããŒã³ãé¢é£ä»ããŠããŸãããããã®ç¥èŠã«ã¯TAPè åšããã·ã¥ããŒãããç°¡åã«ã¢ã¯ã»ã¹ã§ããŸããTAPè åšããã·ã¥ããŒãã§ã¯ä»¥äžãæäŸãããŸãã
- Webãã©ãŠã¶ããã¢ã¯ã»ã¹å¯èœãçµç¹ã«äŸµå ¥ããè åšãå¯èŠåãæ»æè ãæ»ææ¹æ³ãæ»æå¯Ÿè±¡ã確èªã
- çµç¹ãè åšããŠãŒã¶ãŒå¥ã«ã©ã³ãµã ãŠã§ã¢ä¿è·ããŒã¿ãæäŸãããã«ãã£ãŠã¢ã©ãŒãã®åªå é äœãæããã«ããããã«æ²¿ã£ãŠè¡åãèµ·ããããšãã§ããããã«ãªããŸãã
- åºç¯ãªæ»æãã£ã³ããŒã³ãšæšçåã©ã³ãµã ãŠã§ã¢ã®è åšã匷調ããšã°ãŒã¯ãã£ãããéèŠãªåŸæ¥å¡ã«åããããæ»æã確èªããããšãã§ããŸãã
- ã¡ãŒã«æ»æã«é¢é£ããã¢ã«ãŠã³ã䟵害ãå¯èŠåã
- ç·åœããæ»æãšäžå¯©ãªãŠãŒã¶ãŒè¡åã匷調ã
- è åšãšãã£ã³ããŒã³ã«é¢ãã詳现ãªãã©ã¬ã³ãžãã¯æ å ±ããªã¢ã«ã¿ã€ã ã§æäŸãããŠã³ããŒãå¯èœãªã¬ããŒããçšãããšãã¢ããªã±ãŒã·ã§ã³ ããã°ã©ãã³ã° ã€ã³ã¿ãŒãã§ãŒã¹ïŒAPIïŒãéããŠãã®ä»ã®ããŒã«ãšçµ±åã§ããŸãã
ãããã¯ãŒã¯ã®ãã®å ã®ä¿è·
人ãä¿è·ããããã«ã¯ãäººãæŽ»åããå Žæã§ãã®äººã®æŽ»åããŒã¹ã«åãããé²åŸ¡ãå¿ èŠã§ããTAPã§ã¯ä»¥äžãæäŸããŸãã
- ãŠãŒã¶ãŒãã¡ãŒã«ããã§ãã¯ããéã«äœ¿çšãããã¹ãŠã®ãããã¯ãŒã¯ãããã€ã¹ããããŠå Žæã§ãŠãŒã¶ãŒãä¿è·ãTAPã¯ç€Ÿå ãŸãã¯ç€Ÿå€ãããã¯ãŒã¯ïŒãããªãã¯ãšãã©ã€ããŒãã®äž¡æ¹ïŒã«æ¥ç¶ããã¢ãã€ã« ããã€ã¹ããã¹ã¯ãããPCãããã³Webã§åäœããŸãã
- è¿ éãªå°å ¥ã§éãããªäŸ¡å€ã®å®çŸãé±åäœãæåäœã§ã¯ãªããæ°æ¥ã§äœåäžãã®ãŠãŒã¶ãŒãä¿è·ã§ããããã«ãªããŸããTAPã¯ãä»®æ³ã¢ãã©ã€ã¢ã³ã¹ãããŒããŠã§ã¢ã¢ãã©ã€ã©ã³ã¹ãŸãã¯ã¯ã©ãŠããµãŒãã¹ãšããŠå°å ¥ã§ããProofpoint Protection Serverãžã®ã¢ããªã³ã¢ãžã¥ãŒã«ãšããŠç°¡åã«å°å ¥ã§ããŸãã
- SaaSãã¡ã€ã«ã¹ãã¢å ã«ãããã¡ã€ã«ããŒã¹ã®è åšãæããã«ããã¢ã«ãŠã³ãäŸµå®³ãæ€ç¥ã
- ã¯ã©ãŠãåæãµãŒãã¹ãžã®é »ç¹ãªæ¯æ¥ã®ã¢ããããŒãã§ãæ»æè ããäžæ©å è¡ã
- ã¡ãŒã« ãã©ãããã©ãŒã ã®ã»ãã¥ãªãã£ã匷åïŒMicrosoft Office 365ããã€ããªããExchangeç°å¢ã§ãã£ãŠãå¯èœïŒã
Microsoft 365 åãã® æ°ããªã¬ãã«ã®ä¿è·ãš ã³ã³ãã©ã€ã¢ã³ã¹
æ»æè ã«é¢ããç¥èŠ
- ãããŸã§ãšåæ§ã«ãäººãæšçã«ãªãç¶ããããšãããæ»æè ã®å šäœåãææ¡ããããšããŸããŸãéèŠã«ãªã£ãŠããŸãããã«ãŒããã€ã³ãã®è åšãªãµãŒãã£ãŒã¯ãé·å¹Žã«ãããæ»æè ã«é¢ããããŒã¿ãåéã»æŽçããŠããããã®ã€ã³ããªãžã§ã³ã¹æ å ±ã¯ãTAPããã·ã¥ããŒãã§è¡šç€ºãããŸããçµç¹ãæšçãšããæ»æè ãæšçãšãªã£ãŠãã察象è ãæéã®çµéãšå ±ã«åœ¢æãããæ»æã®åŸåãªã©ã䜿ãããŠããæå£ããã¯ããã¯ã確èªã§ããŸããããã«ãããå¿ èŠãšãªã远å çãªã»ãã¥ãªãã£ã修埩ã³ã³ãããŒã«ãåªå ãããããšãã§ããŸãããŸãäººãæšçã«ããæ»æè ã«å¯Ÿããä¿è·ã匷åããããšãã§ããŸãã
äžæ£ã¢ã¯ã»ã¹ãåãããµãã©ã€ã€ãŒã¢ã«ãŠã³ãã®æ€ç¥
Proofpoint STPã¯ããµãã©ã€ã€ãŒããµãŒãããŒãã£ã®ãäžæ£ã¢ã¯ã»ã¹ãåããã¡ãŒã«ã¢ã«ãŠã³ãã«å¯Ÿãã远å ã®é²è·ã¬ã€ã€ãŒãæäŸããŸãããã«ãŒããã€ã³ãã®ãšã³ã·ã¹ãã å ã®ã©ã®ãããªå Žæã§ããäžæ£ã¢ã¯ã»ã¹ãåããã¢ã«ãŠã³ããæ€ç¥ãããããžã®å¯ŸåŠãåªå åãããã®ã¢ã«ãŠã³ãã«é¢ããå®çšçãªç¥èŠãæäŸããŸãã
- ãµãã©ã€ã€ãŒãæ¢ç¥ã®ãµãŒãããŒãã£ã®ãäžæ£ã¢ã¯ã»ã¹ãåããã¢ã«ãŠã³ããèå¥ããŠå¯ŸåŠãåªå åãããã®ã¢ã«ãŠã³ãã«ããæŽ»åã黿¢
- ãã«ãŒããã€ã³ãã®ãšã³ã·ã¹ãã ãŸãã¯é¡§å®¢ã®åä¿¡ãã©ãã£ãã¯ã«ãããŠç¢ºèªããããäžæ£ã¢ã¯ã»ã¹ãåãããµãã©ã€ã€ãŒã¢ã«ãŠã³ãã«é¢ããå®çšçãªç¥èŠãæäŸ
- äžæ£ã¢ã¯ã»ã¹ãåãããµãŒãããŒãã£ã¢ã«ãŠã³ãã®èª¿æ»ãå¹çå
Proofpoint STPã¯ãTAPã®ãªãã·ã§ã³ ã¢ããªã³ã§ãïŒè¿œå ã®ã©ã€ã»ã³ã¹ãå¿ èŠïŒã
ãµãã©ã€ã€ãŒã¢ã«ãŠã³ã䟵害ããé²åŸ¡
ããŸããŸãªçµè·¯ãèæ ®ããè åšã€ã³ããªãžã§ã³ã¹
Proofpoint TAP ã¯ãProofpoint Nexus Threat Graph ã®è åšã€ã³ããªãžã§ã³ã¹ã䜿çšããŸãããã®ã°ã©ãã¯ãäœå åãã®ããŒã¿ãã€ã³ãããã¡ãŒã«ãã¯ã©ãŠãããããã¯ãŒã¯ããœãŒã·ã£ã«ã¡ãã£ã¢ã®æ å ±ããªã¢ã«ã¿ã€ã ã§åéããçžé¢åæãè¡ããŸããããã¯ããã«ãŒããã€ã³ãã®æ¥çããªãŒããããã¯ãããžãŒ ãã©ãããã©ãŒã ã§æŽ»çšããããã«ãŒããã€ã³ãã®ãœãªã¥ãŒã·ã§ã³ ããŒããã©ãªãªå šäœã«ãããŠæ©èœããŸãããŠãŒã¶ãŒã远å ã§äœããã€ã³ã¹ããŒã«ãå°å ¥ã管çããå¿ èŠã¯ãããŸããã
Proofpoint TAP ã¯ãNexus Threat Graph ããã®ã€ã³ããªãžã§ã³ã¹ã䜿çšããããšãããããŸããŸãªçµè·¯ãèæ ®ããè åšã«é¢ããæ¯é¡ãªãç¥èŠãæäŸããããšãã§ããããã«ãã仿¥ã®è åšã«å æãæã€ããšãã§ããŸããããšãã°ãã¯ã©ãŠãã¢ã«ãŠã³ããžã®åºç¯ãªã¢ã¯ã»ã¹ãä»äžãããããŠãŒã¶ãŒãã ãŸãããã®ãå®å šã§ãªã OAuth 察å¿ã¯ã©ãŠãã¢ããªãžã®ãªã³ã¯ãèšèŒããã¡ãŒã«ãæ€ç¥ã§ããŸããããããæ»æã¯ãåºãç¥ãããŠãã Web ãµã€ãã OAuth ãµãŒãã¹ã䜿çšããããšãå€ããæ»æã黿¢ããã«ã¯ãã¯ã©ãŠããã¡ãŒã«ãšãã£ãããŸããŸãªçµè·¯ãã«ããŒã§ãããœãªã¥ãŒã·ã§ã³ãå¿ èŠã§ãã
- 115,000 以äžã®é¡§å®¢ããåŸãããè åšã€ã³ããªãžã§ã³ã¹ããªã¢ã«ã¿ã€ã ã«å ±æ
- ã¡ãŒã«ãã¯ã©ãŠãããããã¯ãŒã¯ããœãŒã·ã£ã«ã¡ãã£ã¢ããã¹ãŠå¯èŠå
- 100 以äžã®æ»æè ã远跡ããŠåæ©ãšæŠè¡ã«é¢ããç¥èŠãæäŸ