Level Up Icon

๋‚ก๊ณ  ์˜ค๋ž˜๋œ ๋ฐฉ์‹๊ณผ ์ž‘๋ณ„ํ•˜๊ณ 
Switch Icon ๋ณด์•ˆ์˜ ๋ฏธ๋ž˜๋กœ ์ „ํ™˜ํ•  ์‹œ๊ฐ„.

Microsoft ์ œํ’ˆ์„ Proofpoint๋กœ ์—…๊ทธ๋ ˆ
์ด๋“œํ•˜์—ฌ ๋”์šฑ ์ˆ˜์ค€ ๋†’๊ณ  ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ๋ณดํ˜ธ๋ฅผ ๋ฐ›์œผ์‹ญ์‹œ์˜ค.

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ฐ•ํ™”ํ•˜๊ธฐ

๊ฐœ์š”

Proofpoint๋ฅผ ํ†ตํ•ด Microsoft ํˆฌ์ž ๋ณดํ˜ธ

Proofpoint๋Š” ์ „์†ก ์ „๋ถ€ํ„ฐ ์ „์†ก ํ›„, ํด๋ฆญ ์‹œ๊ฐ„์— ์ด๋ฅด๋Š” ์ด๋ฉ”์ผ ์ „๋‹ฌ์˜ ์ „์ฒด ์ˆ˜๋ช… ์ฃผ๊ธฐ ๋™์•ˆ ์ง€์†์ ์ธ ํƒ์ง€์™€ ๋ถ„์„์„ ํ†ตํ•ด ์ตœ์‹  ์ด๋ฉ”์ผ ์œ„ํ˜‘์„ ๋ณด๋‹ค ์ •ํ™•ํ•˜๊ฒŒ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค. ์ด์ œ Proofpoint๋ฅผ ํ†ตํ•ด Microsoft 365 ๋ณด์•ˆ์„ ๊ฐ•ํ™”ํ•˜์—ฌ ์ง์›๊ณผ ๋น„์ฆˆ๋‹ˆ์Šค๋ฅผ ํšจ์œจ์ ์œผ๋กœ ๋ณดํ˜ธํ•˜์‹ญ์‹œ์˜ค.

1๋งŒ ์ด์ƒ
Proofpoint๋ฅผ ํ†ตํ•ด ์—ญ๋Ÿ‰์„ ๊ฐ•ํ™”ํ•˜๊ณ  ์žˆ๋Š” ์ „ ์„ธ๊ณ„ ์ฃผ์š” ์กฐ์ง์˜ ์ˆ˜
1%
Microsoft 365 E5 ๋ณด์•ˆ์„ ์‚ฌ์šฉํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  Microsoft ๋ณด์•ˆ ๊ฐ•ํ™”๋ฅผ ์œ„ํ•ด Proofpoint๋ฅผ ์‹ ๋ขฐํ•˜๊ณ  ์žˆ๋Š” Fortune 100 ๊ธฐ์—…์˜ ๋น„์œจ
1%
Microsoft 365 E5 ๋ณด์•ˆ์„ ์‚ฌ์šฉํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  Proofpoint๋กœ Microsoft ๋ณด์•ˆ์„ ๋ณด์™„ํ•˜๊ณ  ์žˆ๋Š” Fortune 1000 ๊ธฐ์—…์˜ ๋น„์œจ
PROOFPOINT๋ฅผ ์„ ํƒํ•ด์•ผ ํ•˜๋Š” ์ด์œ 

Proofpoint๋ฅผ ํ†ตํ•ด ์กฐ์ง์˜ Microsoft 365 ๋ณด์•ˆ์„ ์ง€๊ธˆ ๋ฐ”๋กœ ๊ฐ•ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Microsoft๋Š” ๋Œ€๊ทœ๋ชจ ๋น„์ฆˆ๋‹ˆ์Šค ์ƒ์‚ฐ์„ฑ ํšŒ์‚ฌ์ž…๋‹ˆ๋‹ค๋งŒ...

Microsoft์—๋Š” ๊ฒฌ๊ณ ํ•œ ์ด๋ฉ”์ผ ๋ณดํ˜ธ๊ฐ€ ๋ถ€์กฑํ•˜์—ฌ ์‚ฌ์šฉ์ž๋กœ ํ•˜์—ฌ๊ธˆ ์ตœ์‹  ์ด๋ฉ”์ผ ์œ„ํ˜‘์— ๋…ธ์ถœ๋˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. Microsoft 365 E3 ๋ฐ E5 ์ด๋ฉ”์ผ ๋ณด์•ˆ ๊ธฐ๋Šฅ์€ ํ”ผ์‹ฑ, ๋ฉ€์›จ์–ด, ๋žœ์„ฌ์›จ์–ด ๊ฐ™์ด ์ƒ์šฉํ™”๋œ ๊ณ ๊ธ‰ ์œ„ํ˜‘์œผ๋กœ ์ธํ•ด ์–ด๋ ค์›€์„ ๊ฒช๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. PowerPoint์—์„œ ํ•ด๋‹น ๊ธฐ๋Šฅ์ด ์ข‹์•„ ๋ณด์ด์ง€๋งŒ ์ง€๊ธˆ๊ณผ ๊ฐ™์€ ๋™์  ์œ„ํ˜‘ ํ™˜๊ฒฝ์—์„œ ํ•„์š”ํ•œ ํƒ์ง€ ํšจ์œจ๊ณผ ๋ณดํ˜ธ ๊ธฐ๋Šฅ์œผ๋กœ๋Š” ๋ถ€์กฑํ•ฉ๋‹ˆ๋‹ค. Proofpoint๋ฅผ ์ด์šฉํ•˜๋ฉด ํ˜„์žฌ Microsoft 365 ๋ณด์•ˆ์„ ๊ฐ•ํ™”ํ•˜๊ณ  ๋›ฐ์–ด๋‚œ ์œ„ํ˜‘ ํƒ์ง€, ๊ฐ€์‹œ์„ฑ ๋ฐ ์šด์˜ ๊ฐ„์†Œํ™”๋ฅผ ๋ชจ๋‘ ๊ฐ•๋ ฅํ•œ ํˆฌ์ž ์ด์ต๋ฅ ์„ ํ†ตํ•ด ๊ฒฝํ—˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ณ ๊ฐ์ด Microsoft๋ณด๋‹ค Proofpoint๋ฅผ ์„ ํ˜ธํ•˜๋Š” ์ด์œ 

๋›ฐ์–ด๋‚œ ํƒ์ง€ ํšจ์œจ

Microsoft Proofpoint
Proofpoint vs. Microsoft

Microsoft๋Š” ํ‰๊ท ์ ์œผ๋กœ ์กฐ์ง์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๋ชจ๋“  ์œ„ํ˜‘์˜ 30% ์ด์ƒ์„ ๋†“์นฉ๋‹ˆ๋‹ค. ์•…์˜์ ์ธ ํ–‰์œ„์ž๊ฐ€ MFA, ์˜ค๋ž˜๋œ ๊ธฐ๋Šฅ ์ต์Šคํ”Œ๋กœ์ž‡์„ ๋น„๋กฏํ•œ ๋„ค์ดํ‹ฐ๋ธŒ ์ถ”๊ฐ€ ๊ธฐ๋Šฅ Microsoft 365 ๋ณด์•ˆ ์ œ์–ด๋ฅผ ์†์‰ฝ๊ฒŒ ์šฐํšŒํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. Microsoft๋Š” ๊ธฐ๋ณธ์ ์ธ ์ด๋ฉ”์ผ ๋ณดํ˜ธ๋ฅผ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋งŒ ๋นˆ๋ฒˆํ•˜๊ณ  ๋ฒˆ๊ฑฐ๋กœ์šด ์—…๋ฐ์ดํŠธ๋ฅผ ๊ฐ•์ œํ•˜๋ฉฐ ์ตœ์‹  ์œ„ํ˜‘์—๋Š” ํšจ๊ณผ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค. Microsoft๋Š” ํƒ์ง€ ์œ ํšจ์„ฑ์ด ๋‚ฎ๊ณ , ์˜คํƒ์ง€์œจ์ด ๋†’์œผ๋ฉฐ, ์šด์˜ ๋ฐ ์œ ์ง€ ๊ด€๋ฆฌ๊ฐ€ ๋งค์šฐ ๋ณต์žกํ•ฉ๋‹ˆ๋‹ค.

Proofpoint vs. Microsoft

Proofpoint๋Š” ๋ฐฐ์†ก ์ „๋ถ€ํ„ฐ ๋ฐฐ์†ก ํ›„, ํด๋ฆญ ์‹œ๊ฐ„๊นŒ์ง€ ์ด๋ฅด๋Š” ๊ณผ์ • ์ „๋ฐ˜์—์„œ ์ง€์†์ ์ธ ํƒ์ง€ ๋ฐ ๋ถ„์„์„ ์ œ๊ณตํ•˜์—ฌ ํƒ์›”ํ•œ ์—”๋“œํˆฌ์—”๋“œ ์œ„ํ˜‘ ๋ณดํ˜ธ๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. Proofpoint์˜ ์ •ํ™•๋„ ๋†’์€ ํƒ์ง€ ์Šคํƒ์€ ๊ณ ๊ธ‰ AI, ๋จธ์‹  ๋Ÿฌ๋‹(ML), ๋Œ€๊ทœ๋ชจ ์–ธ์–ด ๋ชจ๋ธ(LLM), ์—…๊ณ„๋ฅผ ์„ ๋„ํ•˜๋Š” ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๊ฐ€์žฅ ์ง„ํ™”ํ•œ ์ด๋ฉ”์ผ ์œ„ํ˜‘์„ ํƒ์ง€ํ•ฉ๋‹ˆ๋‹ค. Proofpoint๋ฅผ ํ†ตํ•ด 99.99% ์ด๋ฉ”์ผ ํƒ์ง€ ํšจ์œจ์„ ๋‹ฌ์„ฑํ•˜๊ณ , ์˜คํƒ์ง€๋ฅผ ์ค„์ด๋ฉฐ, ๊ฐ„ํŽธํ•˜๊ณ  ์šด์˜ํ•˜๊ธฐ ์‰ฌ์šด ์†”๋ฃจ์…˜์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

AI ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ๋ฐฉ์ง€

Microsoft Proofpoint
Proofpoint vs. Microsoft

Microsoft๋Š” ์ž๊ฒฉ ์ฆ๋ช… ํ”ผ์‹ฑ, ๋น„์ฆˆ๋‹ˆ์Šค ์ด๋ฉ”์ผ ์‚ฌ๊ธฐ ๊ณต๊ฒฉ(BEC), ์†Œ์…œ ์—”์ง€๋‹ˆ์–ด๋ง ๊ณต๊ฒฉ๊ณผ ๊ฐ™์€ ์ตœ์‹  ์ด๋ฉ”์ผ ์œ„ํ˜‘์„ ํƒ์ง€ํ•˜๊ณ  ์™„ํ™”ํ•˜๋Š” ๋ฐ ์–ด๋ ค์›€์ด ์žˆ์Šต๋‹ˆ๋‹ค. Microsoft์˜ ์ •์  ํƒ์ง€ ๋ฐ ๋ถ„์„ ๊ธฐ๋Šฅ์€ ์œ„ํ˜‘ ํƒ์ง€๊ฐ€ ์ œ๋Œ€๋กœ ์ด๋ฃจ์–ด์ง€์ง€ ์•Š์•„ ์กฐ์ง์ด ์†์ƒ์— ๋…ธ์ถœ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Microsoft๋Š” ์ƒ์„ฑํ˜• AI๊ฐ€ ๋ณด์•ˆ์„ ๊ฐœ์„ ํ•œ๋‹ค๊ณ  ํ™๋ณดํ•˜์ง€๋งŒ, ์‹ค์ œ๋กœ๋Š” ์ž˜ ์ž‘๋™ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ๋†’์€ ๋น„์šฉ์— ๋น„ํ•ด ์กฐ์ง์— ๋Œ€ํ•œ ์œ„ํ˜‘ ํƒ์ง€ ์„ฑ๋Šฅ์€ ์—ด์•…ํ•œ ๊ฒƒ์ž…๋‹ˆ๋‹ค.

Proofpoint vs. Microsoft

Proofpoint์—๋Š” ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค, ์ •์  ๋ฐ ๋™์  ์œ„ํ˜‘ ๋ถ„์„, ํ–‰๋™ AI, ์˜๋ฏธ๋ก ์  ๋ถ„์„ LLM, ์˜ˆ์ธกํ˜• URL ๋ถ„์„ ๋ฐ ์ƒŒ๋“œ๋ฐ•์‹ฑ์„ ๊ฒฐํ•ฉํ•˜์—ฌ ์ตœ์‹  ์œ„ํ˜‘์„ ๊ฒฝ๋กœ ๋‚ด์—์„œ ์‹๋ณ„ํ•˜๊ณ  ์ฐจ๋‹จํ•˜๋Š” AI ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ๊ณ„์ธต ํƒ์ง€ ์Šคํƒ์ด ์žˆ์Šต๋‹ˆ๋‹ค. Proofpoint๋Š” 20๋…„ ์ด์ƒ์˜ AI/ML ๊ฒฝํ—˜๊ณผ 250๊ฐœ ์ด์ƒ(์ฆ๊ฐ€ ์ค‘)์˜ AI ํŠนํ—ˆ๋ฅผ ๋ณด์œ ํ•˜์—ฌ ์ตœ์‹  ์ด๋ฉ”์ผ ์œ„ํ˜‘์— ๋Œ€ํ•œ ํƒ์›”ํ•œ ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ์—”๋“œํˆฌ์—”๋“œ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์‚ฌ๋žŒ ๋ฐ ์œ„ํ˜‘ ๊ฐ€์‹œ์„ฑ

Microsoft๋Š” ๋ณด์ด์ง€ ์•Š๋Š” ๊ฒƒ์„ ๋ณดํ˜ธํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ์บ ํŽ˜์ธ ๋ฐ ์œ„ํ˜‘ ์ธ์‚ฌ์ดํŠธ๊ฐ€ ๋ถ€์กฑํ•˜๊ณ  ์œ„ํ˜‘ ์บ ํŽ˜์ธ์˜ ์ƒ๊ด€๊ด€๊ณ„๋ฅผ ๊ฐ€๋ ค๋‚ด์ง€ ๋ชปํ•˜๋ฉฐ ์ธ์  ์œ„ํ—˜์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ์ด ์—†๋Š” Microsoft๋Š” ์กฐ์ง์˜ ๊ฐ€์žฅ ํฐ ์œ„ํ—˜์ธ ์‚ฌ๋žŒ์„ ํŒŒ์•…ํ•˜์ง€ ๋ชปํ•ฉ๋‹ˆ๋‹ค. Microsoft๋Š” ์‚ฌ๋žŒ์œผ๋กœ ์ธํ•œ ์œ„ํ—˜์„ ์‹๋ณ„ํ•  ์ˆ˜ ์—†์œผ๋ฏ€๋กœ ์กฐ์ง๋ฟ ์•„๋‹ˆ๋ผ ๋ฌด์—‡๋ณด๋‹ค๋„ ์‚ฌ๋žŒ์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ์บ ํŽ˜์ธ์„ ๊ฐ์ง€ํ•˜์ง€ ๋ชปํ•ฉ๋‹ˆ๋‹ค.

Proofpoint๋Š” ์œ„ํ˜‘ ์ถ”์„ธ๋ฅผ ์ถ”์ ํ•˜๊ณ , ์บ ํŽ˜์ธ ์ธ์‚ฌ์ดํŠธ์˜ ์ƒ๊ด€๊ด€๊ณ„๋ฅผ ํŒŒ์•…ํ•˜๊ณ , ์œ„ํ˜‘ ํฌ๋ Œ์‹์„ ์ž๋™ํ™”ํ•˜์—ฌ ์กฐ์ง์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์œ„ํ˜‘ ์œ ํ˜•์„ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๋„๋ก ๋„์™€์ค๋‹ˆ๋‹ค. Very Attacked Peopleโ„ข(VAP) ๊ฐ€์‹œ์„ฑ๊ณผ ๊ฒฐํ•ฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ์œ„ํ˜‘์„ ๋ฐํžˆ๊ณ  ์œ„ํ˜‘ ํ–‰์œ„์ž๊ฐ€ ์‚ฌ์šฉ์ž๋ฅผ ๊ณต๊ฒฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ๋ ค์ค๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ๊ฐ€์žฅ ์œ„ํ—˜ํ•˜๊ณ  ์†์ƒ๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ ์‚ฌ์šฉ์ž๋ฅผ ๋น ๋ฅด๊ฒŒ ์‹๋ณ„ํ•˜์—ฌ ์ฆ‰์‹œ ์ˆ˜์Šต ์กฐ์น˜๋ฅผ ์ทจํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Proofpoint Very Attacked People visibility
Compare At-A-Glance

ํ•œ๋ˆˆ์— ๋ณด๋Š” Proofpoint์™€ Microsoft ๋น„๊ต:

์ธ๋ ฅ ๋ณดํ˜ธ ๊ธฐ๋Šฅ ๋น„๊ต Proofpoint Complete Microsoft 365 E5
์—ฐ๊ฒฐ ํ•„ํ„ฐ
Yes
Yes
์ธ๋ฐ”์šด๋“œ ์ด๋ฉ”์ผ ์ธ์ฆ
Yes
Yes
๊ธฐ๋ณธ ์ด๋ฉ”์ผ ๊ฑด์ „์„ฑ(AV/AS)
Yes
Yes
๊ธฐ๋ณธ ์‚ฌ๊ธฐ ๋ฐฉ์ง€(๋„๋ฉ”์ธ ์Šคํ‘ธํ•‘, ํ‘œ์‹œ ์ด๋ฆ„ ๋“ฑ)
Yes
Yes
๊ณ ๊ธ‰ BEC ๋ณดํ˜ธ
Yes
No
์ƒํ™ฉ๋ณ„ ์ด๋ฉ”์ผ ๊ฒฝ๊ณ  ํƒœ๊ทธ
Yes
No
์‚ฌ์šฉ์ž ๋ณด๊ณ  ๋ฉ”์‹œ์ง€ ์ž๋™ํ™”
Yes
Yes
์ด๋ฉ”์ผ ๋ฉ”์‹œ์ง€ ๋ณด๋ฅ˜
Yes
No
๊ธฐ๋ณธ ์ฒจ๋ถ€ ํŒŒ์ผ ํ‰ํŒ
Yes
Yes
๊ธฐ๋ณธ ์ฒจ๋ถ€ ํŒŒ์ผ ์ƒŒ๋“œ๋ฐ•์‹ฑ
Yes
Yes
๊ธฐ๋ณธ URL ์žฌ์ž‘์„ฑ
Yes
Yes
ํฌ๊ด„์ ์ธ URL ์ƒŒ๋“œ๋ฐ•์‹ฑ(๋ฐฐ์†ก ์ „ ๋ฐ ๋ฐฐ์†ก ํ›„)
Yes
No
์ˆ˜๋™ ๋ฉ”์‹œ์ง€ ์ˆ˜์Šต
Yes
Yes
๊ธฐ๋ณธ ์ž๋™ ๋ฉ”์‹œ์ง€ ์ˆ˜์Šต(URL ๋ฐ ์ฒจ๋ถ€ ํŒŒ์ผ)
Yes
Yes
๋ธŒ๋ผ์šฐ์ € ๊ฒฉ๋ฆฌ(Very Attacked People)
Yes
No
์˜๋ฏธ๋ก ์  ๋ถ„์„ LLM ํƒ์ง€(๋ฐฐ์†ก ์ „)
Yes
No
๊ณ ๊ธ‰ QR ์ฝ”๋“œ ํƒ์ง€ ๋ฐ ๋ถ„์„(๋ฐฐ์†ก ์ „ ๋ชจ๋“  ์ธ๋ฐ”์šด๋“œ URL ๊ฒ€์‚ฌ)
Yes
No
์ž˜๋ชป ์ „๋‹ฌ๋œ ์ด๋ฉ”์ผ ๋ฐ ์ฒจ๋ถ€ ํŒŒ์ผ
Yes
No
ํฌ๊ด„์ ์ธ ์บ ํŽ˜์ธ ๋ฐ ์œ„ํ˜‘ ์ธ์‚ฌ์ดํŠธ
Yes
No
์—์ด์ „ํŠธ ์—†๋Š” ์œ„ํ˜‘ ํƒ์ง€
Yes
No
์†์ž„์ˆ˜ ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ํƒ์ง€
Yes
No
Microsoft 365์—์„œ ์•…์˜์ ์ธ ์‚ฌ์šฉ์ž ๊ณ„์ • ๊ตฌ์„ฑ ๋ณ€๊ฒฝ ์ž๋™ ์žฌ์„ค์ •
Yes
No
์ •๊ตํ•œ ๊ณ„์ • ํƒˆ์ทจ ํƒ์ง€
Yes
No
์†์ƒ๋œ ๋ฒค๋” ๊ณ„์ • ์‹๋ณ„ ๋ฐ ๊ฒฝ๊ณ 
Yes
No
๊ณต๊ธ‰์—…์ฒด์˜ ์†์ƒ๋œ ๊ณ„์ • ์œ„ํ—˜ ์ ์ˆ˜ ์ฑ„์ 
Yes
No
์†์ƒ๋œ ๊ณต๊ธ‰์—…์ฒด ๊ณ„์ • ๋ฐ Very Attacked People์— ๋Œ€ํ•œ ์ ์‘ํ˜• ์ œ์–ด(๊ฒฉ๋ฆฌ)
Yes
No
๋‚ด๋ถ€ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ๋ฐ SaaS ๊ณต๊ธ‰์—…์ฒด์˜ ํŠธ๋žœ์žญ์…˜ ์ด๋ฉ”์ผ ๋ณดํ˜ธ
Yes
No
DKIM ์„œ๋ช…์„ ํ†ตํ•ด DMARC ํŠธ๋žœ์žญ์…˜ ์ด๋ฉ”์ผ ๊ทœ์ • ์ค€์ˆ˜
Yes
No
์•”ํ˜ธํ™” ๋ฐ ๋ฐ์ดํ„ฐ ์†์‹ค ๋ฐฉ์ง€๋ฅผ ํ†ตํ•ด ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ์ด๋ฉ”์ผ ๊ทœ์ • ์ค€์ˆ˜
Yes
No
์ „๋‹ฌ๋œ ์œ„ํ˜‘ ๊ฒฝ๊ณ 
Yes
Yes
ํฌ๋ Œ์‹/IOC(URL ๋ฐ ์ฒจ๋ถ€ ํŒŒ์ผ)
Yes
No
์บ ํŽ˜์ธ ์ƒ๊ด€๊ด€๊ณ„ ํŒŒ์•…
Yes
No
์œ„ํ˜‘ ํ–‰์œ„์ž ๋ถ„์„, ๋ณด๊ณ  ๋ฐ ์ถ”์„ธ ํŒŒ์•…
Yes
No
SaaS ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ๊ฐ€์‹œ์„ฑ
Yes
Yes
People Risk Explorer
Yes
No
์ ์‘ํ˜• ์ œ์–ด๋กœ ๋Œ€์ƒ ์ง€์ • ์ถ”์„ธ์— ๋Œ€์‘
Yes
No
๊ฒฝ์˜์ง„ ์œ„ํ˜‘ ์š”์•ฝ
Yes
Yes
๋น„๋‚œ ์œ„ํ˜‘ ์š”์•ฝ
Yes
No
ํฌ๊ด„์ ์ธ ID ์ทจ์•ฝ์„ฑ ๊ฒ€์ƒ‰ ๋ฐ ์ˆ˜์Šต(ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ๋ฐ ์—”๋“œํฌ์ธํŠธ ํฌํ•จ)
Yes
No
๊ณต๊ฒฉ ๊ฒฝ๋กœ ๊ฐ€์‹œ์„ฑ์„ ํ™•๋ณดํ•˜์—ฌ ์œ„ํ—˜ ์ˆ˜์Šต ์šฐ์„ ์ˆœ์œ„ ์ง€์ •
Yes
No
์ „์ฒด ๊ณต๊ฒฉ ์‹œํ€€์Šค ํƒ€์ž„๋ผ์ธ ๋ณด๊ธฐ
Yes
No
์†์ƒ์ด ์˜์‹ฌ๋˜๋Š” ๊ณต๊ธ‰์—…์ฒด ๊ณ„์ • ์ธ์‚ฌ์ดํŠธ
Yes
No
์Šคํ‘ธํ•‘๋œ ๊ณต๊ธ‰์—…์ฒด ๋„๋ฉ”์ธ ๊ฐ€์‹œ์„ฑ
Yes
No
๊ธ€๋กœ๋ฒŒ ๊ณต๊ธ‰์—…์ฒด ๊ณ ์œ„ํ—˜ ์ˆœ์œ„
Yes
No
ํฌ๊ด„์ ์ธ ์˜์‹ฌ์Šค๋Ÿฌ์šด ๋„๋ฉ”์ธ ๊ฐ€์‹œ์„ฑ
Yes
No
์ „์ฒด ์ด๋ฉ”์ผ ๋„๋ฉ”์ธ ๊ฐ€์‹œ์„ฑ(ํ•˜์ด์žฌํ‚น๋œ ๋„๋ฉ”์ธ, ๋„๋ฉ”์ธ ์•…์šฉ ๋น„์œจ, DMARC, SPF, DKIM ํ†ต๊ณผ ๋น„์œจ ๋“ฑ)
Yes
No
๊ณต๊ธ‰์—…์ฒด DMARC ๊ธฐ๋ก ๊ฒ€์ฆ ๊ฐ€์‹œ์„ฑ(Nexus Supplier Risk Explorer)
Yes
No
์œ ์‚ฌ ๊ณต๊ธ‰์—…์ฒด ๋„๋ฉ”์ธ์˜ ๊ณต๊ธ‰์—…์ฒด DMARC ๋ฉ”์‹œ์ง€ ๋ณผ๋ฅจ ๋ฐ ๋ฉ”์‹œ์ง€ ๊ฐ€์‹œ์„ฑ(Nexus Supplier Risk Explorer)
Yes
No
Proofpoint๋Š” ๊ฒ€์ฆ๋œ ๋ฆฌ๋”์ž…๋‹ˆ๋‹ค

Proofpoint๋Š” ์ฃผ์š” ๋ถ„์„ ํšŒ์‚ฌ์™€ ๊ณ ๊ฐ ๋ชจ๋‘๋กœ๋ถ€ํ„ฐ ์—…๊ณ„ ๋ฆฌ๋”๋กœ ์ธ์ •๋ฐ›๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

Proofpoint์˜ ์‚ฌ๋ช…์€ ์ง์›๊ณผ ๋น„์ฆˆ๋‹ˆ์Šค๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. Microsoft์˜ ์‚ฌ๋ช…์€ Microsoft ์ œํ’ˆ์„ ๋” ๋งŽ์ด ํŒ๋งคํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. Microsoft ์ด๋ฉ”์ผ ๋ณด์•ˆ์€ ์˜ค๋ž˜๋˜๊ณ  ํšจ๊ณผ๊ฐ€ ๋–จ์–ด์ง€๋ฉฐ, ์Šค์Šค๋กœ ์ด๋ฅผ ์ž˜ ์•Œ๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๋” ๋งŽ์€ ์†”๋ฃจ์…˜์„ ํŒ๋งคํ•˜๋ ค ํ•ฉ๋‹ˆ๋‹ค. Microsoft์™€ ๋‹ฌ๋ฆฌ Proofpoint๋Š” ์•Œ๋ ค์ง„ ์œ„ํ˜‘๊ณผ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์—”๋“œํˆฌ์—”๋“œ ๋ณดํ˜ธ๋ฅผ ์ง€์›ํ•˜๋Š” ์™„์ „ํ•œ ์ด๋ฉ”์ผ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋ฏ€๋กœ Fortune 100 ๊ธฐ์—…์˜ 83%๊ฐ€ Microsoft ๋„ค์ดํ‹ฐ๋ธŒ ๋ณด์•ˆ ๊ฐ•ํ™”๋ฅผ ์œ„ํ•ด Proofpoint๋ฅผ ์‹ ๋ขฐํ•˜๋Š” ๊ฒƒ์€ ๋‹น์—ฐํ•ฉ๋‹ˆ๋‹ค.

โ€œํ•˜์ง€๋งŒ ์ €ํฌ Forrester๋Š” ๋ฒค๋”๊ฐ€ ์š”๊ตฌํ•˜๋Š” ํƒ์ง€ ๋ฐ ์‘๋‹ต ๊ธฐ๋Šฅ์ด ์ž˜ ๊ฐ–์ถฐ์ ธ ์žˆ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋‚˜ํƒ€๋‚˜๋Š” ๋Œ€์‹œ๋ณด๋“œ ์ „๋ฐ˜์— ๊ฑธ์นœ ๋ณด๊ณ ์˜ ๋ถˆ์ผ์น˜์™€ ๋”๋ถˆ์–ด ๋ฐ›์€ ํŽธ์ง€ํ•จ์— ๊ณ„์† ์ „๋‹ฌ๋˜๋Š” ์•…์˜์  ์ด๋ฉ”์ผ ์ˆ˜์— ๋Œ€ํ•ด Microsoft์— ์“ด์†Œ๋ฆฌ๋ฅผ ํ–ˆ์Šต๋‹ˆ๋‹ค.โ€

- Forrester Wave

Proofpoint, G2 2023๋…„ ์—ฌ๋ฆ„ ์ด๋ฉ”์ผ ๋ณด์•ˆ ๋ณด๊ณ ์„œ์—์„œ 1์œ„๋กœ ์„ ์ •

Best Relationship Enterprise Summer 2023
Momentum Leader Summer 2023
Proofpoint G2 Leader Summer 2023 badge
G2 Awards
G2 Awards

Proofpoint๋Š” ๊ฒ€์ฆ๋œ ๋ฆฌ๋”์ž…๋‹ˆ๋‹ค

Abstract_ChainWaves
์ž๋ฃŒ
KuppingerCole Analysts Report: Leadership Compass Email Security
Proofpoint์™€ ํ•จ๊ป˜ ๋‚˜์•„๊ฐ€์‹ญ์‹œ์˜ค

Proofpoint์™€ ํ•จ๊ป˜ ๋‚˜์•„๊ฐ€์‹ญ์‹œ์˜ค

Microsoft๋Š” ์‹คํ–‰ ๋ฐ ์œ ์ง€ ๊ด€๋ฆฌ๊ฐ€ ๋ณต์žกํ•ฉ๋‹ˆ๋‹ค

Microsoft ์ด๋ฉ”์ผ ๋ณด์•ˆ์€ ๋ฉ‹์ง€๊ณ  ๊ทธ๋Ÿด๋“ฏํ•ด ๋ณด์ด์ง€๋งŒ, ์šด์˜ํ•˜๊ณ  ์œ ์ง€ ๊ด€๋ฆฌํ•˜๋Š” ๊ฒƒ์€ ์•…๋ชฝ์ด๋‚˜ ๋‹ค๋ฆ„์—†์Šต๋‹ˆ๋‹ค. ์œ„ํ—˜์„ ์ƒ๊ฐํ•˜๊ธฐ ์‹œ์ž‘ํ•˜๋ฉด Microsoft์˜ ๋งค๋ ฅ์€ ๋น ๋ฅด๊ฒŒ ํ‡ด์ƒ‰๋ฉ๋‹ˆ๋‹ค. ์œ ์ง€ ๊ด€๋ฆฌ, ์šด์˜ ํšจ์œจ์„ฑ, ๊ณ ๊ฐ ์ง€์›, ์ด ์†Œ์œ  ๋น„์šฉ(TCO)์˜ ์ธก๋ฉด์—์„œ ์กฐ์ง์— ๋ถ€๋‹ด์„ ์ฃผ๋Š” ๋น„์šฉ๊ณผ ๋ณต์žก์„ฑ์ด ์ˆจ๊ฒจ์ ธ ์žˆ์Šต๋‹ˆ๋‹ค.

Microsoft์™€ ๋‹ฌ๋ฆฌ Proofpoint๋Š” ์šฐ์ˆ˜ํ•œ ์šด์˜ ํšจ์œจ์„ฑ๊ณผ ๋‚ฎ์€ ์œ„ํ—˜ ๋ฐ ์ด ์†Œ์œ  ๋น„์šฉ์„ ๊ตฌํ˜„ํ•จ๊ณผ ๋™์‹œ์— ๊ฐ„ํŽธํ•˜๊ณ  ์šด์˜ํ•˜๊ธฐ ์‰ฌ์šด ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

Proofpoint vs. Microsoft

Proofpoint์™€ ํ•จ๊ป˜ ๋‚˜์•„๊ฐ€์‹ญ์‹œ์˜ค

Microsoft๋Š” ์‚ฌ๋žŒ, ๋ฐ์ดํ„ฐ ๋ฐ ์ธํ”„๋ผ ๋ณดํ˜ธ์— ๋Œ€ํ•ด ํฐ ๊ทธ๋ฆผ์„ ๊ทธ๋ฆฌ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด๊ฒƒ์ด ์‹ค์ œ๋กœ ์˜๋ฏธํ•˜๋Š” ๊ฒƒ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค. Microsoft 365, Microsoft Azure, Office 365 ๋“ฑ๊ณผ ๊ฐ™์€ Microsoft ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ, ์‹œ์Šคํ…œ ๋ฐ ์ธํ”„๋ผ๋งŒ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค. Microsoft๋Š” ์ฃผ์š” ํƒ€์‚ฌ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ฒค๋”๋ฅผ ๋ณดํ˜ธํ•˜๊ฑฐ๋‚˜ ํ†ตํ•ฉ์„ ์ง€์›ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ๊ทธ ์ด์œ ๋Š”, Microsoft๋Š” ๊ณ ๊ฐ์ด ๋” ๋งŽ์€ Microsoft ์†”๋ฃจ์…˜์„ ๊ตฌ๋งคํ•˜๊ธฐ๋ฅผ ์›ํ•˜๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค.

Microsoft์™€ ๋‹ฌ๋ฆฌ Proofpoint๋Š” CrowdStrike, Palo Alto Networks, CyberArk, Okta, SailPoint, Microsoft Defender, Sentinel๊ณผ ๊ฐ™์€ ์ฃผ์š” ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ฒค๋”์˜ ํ’๋ถ€ํ•œ ์—์ฝ”์‹œ์Šคํ…œ์„ ํ†ตํ•ฉํ•˜๊ณ  ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. Proofpoint์˜ API ๊ธฐ๋ฐ˜ ํ†ตํ•ฉ์€ ์—”๋“œํฌ์ธํŠธ, ๋„คํŠธ์›Œํฌ ๋ฐ ID ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ Proofpoint ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค, ํ–‰๋™ AI ๋ฐ ๋จธ์‹  ๋Ÿฌ๋‹๊ณผ ๊ฒฐํ•ฉํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๋ณด์•ˆ ์ ์šฉ ๋ฒ”์œ„๋ฅผ ๊ฐœ์„ ํ•˜๊ณ  ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ์ˆ˜์Šต ๊ธฐ๋Šฅ์€ ํ–ฅ์ƒํ•˜๋ฉด์„œ ์šด์˜ ๋น„์šฉ์„ ์ ˆ๊ฐํ•ฉ๋‹ˆ๋‹ค.

Proofpoint vs. Microsoft
์ถ”๊ฐ€ ๋ฆฌ์†Œ์Šค

์ถ”๊ฐ€ ๋ฆฌ์†Œ์Šค

Blogs

Blog

Unmasking Tycoon 2FA: A Stealthy Phishing Kit Used to Bypass Microsoft 365 and Google MFA

Read more
Blog

Community Alert: Ongoing Malicious Campaign Impacting Microsoft Azure Cloud Environments

Read more
Blog

Microsoft Misses Supplier Attacks

Read more
Blog

The Dangerous Consequences of Threat Actors Abusing Microsoftโ€™s โ€œVerified Publisherโ€ Status

Read more
Blog

Microsoft Misses Account Compromise Attacks

Read more
Blog

Playing for the Wrong Team: Dangerous Functionalities in Microsoft Teams Enable Phishing and Malware Delivery

Read more

Take our free Rapid Risk Assessment

Start your Assessment
young man
outbound emails encrypted 23K