User Protection
User Protection
์‚ฌ์šฉ์ž ๋ณดํ˜ธ

๊ณต๊ฒฉ์ž์˜ ์ฃผ์š” ํ‘œ์ ์ธ ์‚ฌ์šฉ์ž ๋ณดํ˜ธ ๊ฐ•ํ™”

์‚ฌ์šฉ์ž ๊ถŒํ•œ ๊ฐ•ํ™” ๋ฐ ์ด๋ฉ”์ผ ์™ธ๋ถ€๋กœ ํ™•์žฅ๋œ ๊ณ„์ • ํƒˆ์ทจ ๋ฐ ํ”ผ์‹ฑ ๋ฐฉ์ง€

 

๊ฐœ์š”

์‚ฌ์šฉ์ž๋Š” ์—ฌ์ „ํžˆ ๊ณต๊ฒฉ์ž๋“ค์˜ ์ฃผ์š” ํ‘œ์ ์ž„

๊ณต๊ฒฉ์ž๋Š” ์‚ฌ์šฉ์ž ๊ณ„์ • ์นจํ•ด๋ฅผ ์œ„ํ•ด ์‚ฌํšŒ ๊ณตํ•™์  ์ „์ˆ ๋กœ ์†์ด๊ฑฐ๋‚˜ ์œ„ํ˜‘ํ•ฉ๋‹ˆ๋‹ค.

96%
๊ณต๊ฒฉ์ž๋Š” ์‚ฌ์šฉ์ž ๊ณ„์ • ์นจํ•ด๋ฅผ ์œ„ํ•ด ์‚ฌํšŒ ๊ณตํ•™์  ์ „์ˆ ๋กœ ์†์ด๊ฑฐ๋‚˜ ์œ„ํ˜‘ํ•ฉ๋‹ˆ๋‹ค.
1 in 7
๊ณ ์˜์ ์œผ๋กœ ๋ณด์•ˆ์„ ์šฐํšŒํ•˜๊ธฐ ์œ„ํ•ด ์œ„ํ—˜ํ•œ ํ–‰๋™์„ ํ•œ ์‚ฌ์šฉ์ž์˜ ๋น„์œจ
99%
๊ณ„์ • ํƒˆ์ทจ ํ‘œ์  ๊ณต๊ฒฉ์„ ์ •๊ธฐ์ ์œผ๋กœ ๊ฒฝํ—˜ํ•œ ์กฐ์ง ๋น„์œจ(์•ฝ 62%๊ฐ€ ์‹ค์ œ ํ”ผํ•ด๋ฅผ ์ž…์Œ)
์ด์ 

๊ณ„์ • ์นจํ•ด์— ๋Œ€ํ•œ ํ™•์žฅ๋œ ์‚ฌ์šฉ์ž ๋ณดํ˜ธ

์‚ฌ์šฉ์ž ๋ณดํ˜ธ๋ฅผ ์œ„ํ•œ ์ถ”๊ฐ€ ๋ณดํ˜ธ ๊ณ„์ธต์„ ์ถ”๊ฐ€ํ•ฉ๋‹ˆ๋‹ค. Proofpoint์˜ ํฌ๊ด„์ ์ธ ์†”๋ฃจ์…˜์€ ์‚ฌ์šฉ์ž๊ฐ€ ์‚ฌํšŒ ๊ณตํ•™์  ์ „์ˆ ์— ๊ฐ•์ธํ•˜๊ฒŒ ๋Œ€์‘ํ•˜๊ณ  ๋ณดํ˜ธ๋ฐ›์„ ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋ฉฐ, ์†์ƒ๋œ ๊ณ„์ •์œผ๋กœ๋ถ€ํ„ฐ์˜ ํ”ผํ•ด๋ฅผ ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค.

ํ–ฅ์ƒ๋œ ์‚ฌ์šฉ์ž ํƒ„๋ ฅ์„ฑ

์œ„ํ˜‘ ์ƒํ™ฉ ๋ฐœ์ƒ ์‹œ ์‚ฌ์šฉ์ž์˜ ์•ˆ์ „ํ•œ ์˜์‚ฌ๊ฒฐ์ • ์ง€์›

ํ™•์žฅ๋œ ํ”ผ์‹ฑ ๋ฐฉ์ง€

Teams, Slack, Zoom ๋“ฑ ํ˜‘์—… ์•ฑ์„ ํ†ตํ•œ ์•…์˜์  ๋งํฌ ์ฐจ๋‹จ

๊ณ„์ • ํƒˆ์ทจ ๋ฐฉ์ง€

์‹ ์†ํ•œ ๊ณ„์ • ํƒˆ์ทจ ํƒ์ง€, ์กฐ์‚ฌ ๋ฐ ๋Œ€์‘

Proofpoint User Protection์˜ ์ด์  ์ฒดํ—˜ํ•˜๊ธฐ

์ž๊ฒฉ ์ฆ๋ช… ํ”ผ์‹ฑ ์‚ฌ๊ณ  88% ๊ฐ์†Œ

๋‹น์‚ฌ์˜ ์†”๋ฃจ์…˜์€ ๊ธ‰๋ณ€ํ•˜๋Š” ์œ„ํ˜‘ ํ™˜๊ฒฝ์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„ ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ, ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ์ƒˆ๋กญ๊ฒŒ ๋Œ€๋‘๋˜๋Š” ์œ„ํ˜‘์— ๋Œ€ํ•œ ๊ต์œก์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ๋‹น์‚ฌ๋Š” ์‚ฌ์šฉ์ž์˜ ๊ณต๊ฒฉ ๋…ธ์ถœ ์ˆ˜์ค€, ์—ญํ•  ๋ฐ ํ–‰๋™์— ๋งž์ถฐ ์ž๋™ํ™”๋œ ์œ„ํ—˜ ๊ธฐ๋ฐ˜ ํ•™์Šต์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ ํ–‰๋™ ๋ณ€ํ™”๋ฅผ ๋” ํšจ๊ณผ์ ์œผ๋กœ ์ด๋Œ์–ด๋‚ด๊ณ  ํ”„๋กœ๊ทธ๋žจ ํ™•์žฅ์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

Identity Threat Protection

์ด๋ฉ”์ผ ์™ธ๋ถ€์—์„œ์˜ ํ”ผ์‹ฑ ๋ฐฉ์–ด ํ™•์žฅ

Proofpoint๋Š” ๋ฉ”์‹œ์ง•, ํ˜‘์—… ๋„๊ตฌ, ์†Œ์…œ ๋ฏธ๋””์–ด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ํ†ตํ•ด ์ „๋‹ฌ๋˜๋Š” ์•…์˜์  URL์„ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž๋“ค์€ ์–ธ์ œ ์–ด๋””์„œ๋‚˜ ๊ณ ๊ธ‰ ํ”ผ์‹ฑ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ๋ฐ›์Šต๋‹ˆ๋‹ค. ๋ชจ๋“  ๋””์ง€ํ„ธ ์ฑ„๋„์—์„œ์˜ ์œ„ํ˜‘์„ ํ†ตํ•ฉ์ ์œผ๋กœ ํŒŒ์•…ํ•จ์œผ๋กœ์จ, ํ”ผ์‹ฑ ์œ„ํ˜‘์ด ์กฐ์ง์— ํ”ผํ•ด๋ฅผ ์ฃผ๊ธฐ ์ „์— ๋” ๋น ๋ฅด๊ฒŒ ์ถ”์ ํ•˜๊ณ  ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Proofpoint versus Abnormal Security

๊ณ„์ • ํƒˆ์ทจ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ํƒ์ง€ ๋ฐ ๋Œ€์‘ ์†๋„ ๊ฐ€์†ํ™”

Proofpoint๋Š” MFA๋ฅผ ์šฐํšŒํ•˜๋Š” ๊ณต๊ฒฉ์„ ํฌํ•จํ•œ ๊ณ„์ • ํƒˆ์ทจ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์กฐ์ง์„ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค. Proofpoint๋Š” ๊ณ„์ • ํƒˆ์ทจ ์ „ํ›„ ํ™œ๋™์— ๋Œ€ํ•œ ์ง‘์ค‘์‹ ๋ณด๊ธฐ๋กœ ์กฐ์‚ฌ๋ฅผ ๊ฐ€์†ํ™”ํ•˜๊ณ , ์ž๋™ํ™”๋œ ๋Œ€์‘์œผ๋กœ ๊ณต๊ฒฉ์ž์˜ ์ฒด๋ฅ˜ ์‹œ๊ฐ„์„ ์ค„์ด๋Š” ๋™์‹œ์— ์šด์˜ ๋ถ€๋‹ด์„ ๊ฒฝ๊ฐ์‹œํ‚ต๋‹ˆ๋‹ค.

Financial Services

์ธ์  ์œ„ํ—˜์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ ํ–ฅ์ƒ

Proofpoint Core Email Protection๊ณผ Proofpoint User Protection ์†”๋ฃจ์…˜ ๊ฐ„์˜ ๊ณต์œ  ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋Š” ์ฃผ์š” ํ‘œ์  ๋ฐ ๊ณ ์œ„ํ—˜ ์‚ฌ์šฉ์ž๋ฅผ ์‹ ์†ํžˆ ์‹๋ณ„ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋ฉ๋‹ˆ๋‹ค. Proofpoint๋Š” ์‚ฌ์šฉ์ž ํ–‰๋™, ๊ต์œกยท๋ฐ ํ”ผ์‹ฑ ํ…Œ์ŠคํŠธ ์„ฑ๋Šฅ, ๊ณ„์ • ํƒˆ์ทจ ์œ„ํ—˜์„ ์ข…ํ•ฉ ํ‰๊ฐ€ํ•ด ์ ์‘ํ˜• ๋ณด์•ˆ ์ œ์–ด๋ฅผ ์ ์šฉํ•จ์œผ๋กœ์จ ์œ„ํ—˜์„ ์ถ”๊ฐ€์ ์œผ๋กœ ๊ฐ์†Œ์‹œํ‚ต๋‹ˆ๋‹ค.

Enterprise Cyber Security Solutions, Services and Training
์ฃผ์š” ๊ธฐ๋Šฅ

Proofpoint User Protection์˜ ์ฃผ์š” ๊ธฐ๋Šฅ

๊ณ ์œ„ํ—˜ ์‚ฌ์šฉ์ž ์‹๋ณ„

Proofpoint Very Attacked Peopleโ„ข, ์ƒ์œ„ ํด๋ฆญ์ž๋Š” ๋ฌผ๋ก , ์œ„ํ˜‘์— ๊ทน๋„๋กœ ๋…ธ์ถœ๋˜์–ด ์žˆ๋Š” ์ฐจ๊ธฐ ํ‘œ์ ์ž๋“ค๊นŒ์ง€ ๊ณ ์œ„ํ—˜๊ตฐ ์ง์›์„ ํ•œ๋ˆˆ์— ํŒŒ์•…ํ•ฉ๋‹ˆ๋‹ค. ๊ฐ€์žฅ ๋ณดํ˜ธ๊ฐ€ ํ•„์š”ํ•œ ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์ƒ์œผ๋กœ ๋ณด์•ˆ ์กฐ์น˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ์„ค์ •ํ•˜๊ณ  ์ ์‘ํ˜• ์ œ์–ด๋ฅผ ์ ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

People Risk Explorer example

์ž๋™ํ™”๋œ ์œ„ํ—˜ ๊ธฐ๋ฐ˜ ํ•™์Šต

Very Attacked People, ์ƒ์œ„ ํด๋ฆญ์ž, ์ทจ์•ฝ์„ฑ์ด ๋†’์€ ๊ฐ€์žฅ ์œ„ํ—˜ํ•œ ์‚ฌ์šฉ์ž ๋“ฑ ๊ณ ์œ„ํ—˜ ์‚ฌ์šฉ์ž๋ฅผ ์ž๋™์œผ๋กœ ์„ ๋ณ„ํ•ด ํƒ€๊ฒŸํŒ…๋œ ๋ณด์•ˆ ์ธ์‹ ํ™œ๋™์— ๋“ฑ๋กํ•จ์œผ๋กœ์จ ํ–‰๋™ ๋ณ€ํ™”๋ฅผ ์œ ๋„ํ•ฉ๋‹ˆ๋‹ค. ์œ„ํ˜‘ ๊ธฐ๋ฐ˜ ๊ต์œก ์ฝ˜ํ…์ธ ์™€ ์‹ค์‹œ๊ฐ„ ๊ต์œก์„ ํ†ตํ•ด ์‚ฌ์šฉ์ž๋“ค์ด ์œ„ํ˜‘์— ์ง๋ฉดํ–ˆ์„ ๋•Œ ๋” ์•ˆ์ „ํ•œ ์„ ํƒ์„ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์œ ๋„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

55% percent of phishes reported

๊ณ„์ • ํƒˆ์ทจ์— ๋Œ€ํ•œ ์™„๋ฒฝํ•œ ํƒ์ง€ ๋ฐ ๋Œ€์‘

Proofpoint๋Š” ๊ณ„์ • ํƒˆ์ทจ๊ฐ€ ๋ฐœ์ƒํ•  ๊ฒฝ์šฐ ์ฆ‰์‹œ ์•Œ๋ ค์ค๋‹ˆ๋‹ค. Proofpoint๋Š” ์˜์‹ฌ์Šค๋Ÿฌ์šด ๋กœ๊ทธ์ธ ๋ฐ ๊ณ„์ • ํ™œ๋™์„ ์ด๋ฉ”์ผ ์œ„ํ˜‘๊ณผ ์—ฐ๊ณ„ ๋ถ„์„ํ•จ์œผ๋กœ์จ, ์†์ƒ๋œ ๊ณ„์ •์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ •ํ™•ํ•˜๊ฒŒ ํƒ์ง€ํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ • ์นจํ•ด ์ „ํ›„์˜ ๊ด‘๋ฒ”์œ„ํ•œ ์˜์‹ฌ์Šค๋Ÿฌ์šด ํ™œ๋™์— ๋Œ€ํ•œ ์ค‘์•™ ์ง‘์ค‘์‹ ๊ฐ€์‹œ์„ฑ์„ ํ†ตํ•ด, ์†”๋ฃจ์…˜์€ ๊ณต๊ฒฉ์ž์˜ ์ฒด๋ฅ˜ ์‹œ๊ฐ„์„ ์ตœ์†Œํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์ž๋™์œผ๋กœ ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

TAP Account Takeover

๋‹ค์ค‘ ํ”Œ๋žซํผ์—์„œ ์•…์˜์  URL ์ฐจ๋‹จ

Microsoft Teams, Slack, Zoom๊ณผ ๊ฐ™์€ ํ˜‘์—… ๋„๊ตฌ๋ฅผ ํ†ตํ•ด ์ „๋‹ฌ๋˜๋Š” ์•…์˜์  ๋งํฌ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž๋ฅผ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค. ์—…๊ณ„ ์ตœ๊ณ ์˜ Nexus Threat Intelligence๋กœ ๊ตฌ๋™๋˜๋Š” ๋‹น์‚ฌ ์†”๋ฃจ์…˜์€ URL์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๋ถ„์„ํ•˜๊ณ  ์•…์˜์ ์ธ์œผ๋กœ ํŒ๋ณ„๋œ ๋งํฌ๋ฅผ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค. ํ•ด๋‹น ์†”๋ฃจ์…˜์€ ์œ ํ•ด ์›น์‚ฌ์ดํŠธ ๋ฐ ์ฝ˜ํ…์ธ ์— ๋Œ€ํ•œ ์ ‘๊ทผ์„ ์ฐจ๋‹จํ•จ์œผ๋กœ์จ ์‚ฌ์šฉ์ž๋ฅผ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค.

์ ์‘ํ˜• ์ œ์–ด๋ฅผ ํ†ตํ•œ ์œ„ํ—˜ ๊ฐ์†Œ

๋‹ค์–‘ํ•œ ์œ„ํ—˜ ํ”„๋กœํ•„์„ ๊ฐ€์ง„ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋งž๋Š” ์ ์‘ํ˜• ๋ณด์•ˆ ์ œ์–ด๋ฅผ ์‰ฝ๊ฒŒ ์ ์šฉํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ œ์–ด ๊ธฐ๋Šฅ์—๋Š” ํ‘œ์ ํ™”๋œ ์œ„ํ˜‘์— ๊ธฐ๋ฐ˜ํ•œ ์ถ”๊ฐ€ ๋ณด์•ˆ ๊ต์œก ์ž๋™ ๋“ฑ๋ก ๋ฐ ์—„๊ฒฉํ•œ ์กฐ์น˜ ์ •์ฑ… ์ž๋™ ์ ์šฉ์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ํƒ€์‚ฌ ์•ฑ์— ๋Œ€ํ•œ ์•ก์„ธ์Šค ๊ถŒํ•œ ์ทจ์†Œ, ์•”ํ˜ธ ์žฌ์„ค์ •, ์•…์˜์  ๋ฉ”์ผํ•จ ๊ทœ์น™ ๋ณ€๊ฒฝ ๋ณต๊ตฌ ๋“ฑ์˜ ์กฐ์น˜๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค.

์ฐธ๊ณ  ์ž๋ฃŒ

ํ†ตํ•ฉ ํ”Œ๋žซํผ์€ ๊ฐ•๋ ฅํ•œ ๊ธฐ์ˆ ์  ์†”๋ฃจ์…˜๊ณผ ํ–ฅ์ƒ๋œ ์œ„ํ—˜ ๊ฐ์†Œ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

IXOM

๋ฆฌ์†Œ์Šค

์‚ฌ์šฉ์ž ๋ณดํ˜ธ์— ๋Œ€ํ•œ ์ตœ์‹  ๊ฐœ๋ฐœ ์‚ฌํ•ญ

Proofpoint Resources
์ž๋ฃŒ
Account Takeover โ€“ Bypassing Multifactor Authentication
Abstract_GriddedWaves
์ž๋ฃŒ
Beyond Awareness Training
The Best Email Protection, Now via API
์ž๋ฃŒ
Why Upgrade to Proofpoint Collaboration Security Prime
์ œํ’ˆ

๊ฐ•๋ ฅํ•œ ์ œํ’ˆ

ํŒจํ‚ค์ง€ ์†”๋ฃจ์…˜์„ ๊ฐ•ํ™”ํ•˜๋Š” ์ œํ’ˆ์— ๋Œ€ํ•ด ์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

Proofpoint ZenGuide

์‚ฌ์šฉ์ž ํ–‰๋™ ๋ณ€ํ™”๋ฅผ ์ฃผ๋„ํ•˜๊ณ  ์ƒˆ๋กœ์šด ์œ„ํ˜‘์— ๋Œ€ํ•œ ์‚ฌ์šฉ์ž ํƒ„๋ ฅ์„ฑ์„ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

Proofpoint Collab Protection

๋ฉ”์‹œ์ง• ๋ฐ ํ˜‘์—… ํ”Œ๋žซํผ์„ ํ†ตํ•ด ์ „์†ก๋˜๋Š” ์•…์˜์  URL์„ ์ฐจ๋‹จํ•จ์œผ๋กœ์จ ํ”ผ์‹ฑ ๋ฐฉ์ง€ ๋ฒ”์œ„๋ฅผ ์ด๋ฉ”์ผ ์™ธ๋ถ€๋กœ ํ™•์žฅํ•ฉ๋‹ˆ๋‹ค.

Proofpoint Account Takeover Protection

ํ™œ์„ฑ ๊ณ„์ • ํƒˆ์ทจ ๊ณต๊ฒฉ์„ ์‹ ์†ํžˆ ํƒ์ง€, ์กฐ์‚ฌ ๋ฐ ๋Œ€์‘ํ•ฉ๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž์˜ ์ด๋™์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„ ์•Œ๋ฆผ์„ ๋ฐ›๊ณ  ํด๋ฆญ ํ•œ ๋ฒˆ์œผ๋กœ ์œ ํ•ดํ•œ ๋ณ€๊ฒฝ ์‚ฌํ•ญ์„ ๋˜๋Œ๋ฆด ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.