Cyber Criminal

New Innovations That Help You to Better Defend Data and Mitigate Insider Risk

Share with your network!

Proofpoint Information Protection helps organisations protect against data loss caused by careless, malicious, and compromised users. By combining content and context to gain visibility into risky behaviour, Proofpoint helps customers modernise their information protection programme with a human-centric approach. As a result, organisations can defend their data, minimise financial and reputational risk, and achieve operational efficiencies.

Benefits of our latest innovations

The new product and service capabilities in Proofpoint Information Protection help you address top use cases and accelerate investigations.

Unify email DLP triage with other DLP channels in Canada

Proofpoint has data centres in multiple regions to help you meet data privacy and residency requirements. In addition to data centres in the United States, Europe, Australia, and Japan, a data centre is also available in Canada. Email Data Loss Prevention (DLP) alerts can now be stored in the unified console in Canada, in addition to Endpoint DLP and Insider Threat Management (ITM).

Our solution’s tenants in data centres across the globe ensure strong data sovereignty is enforced when you select your region within the console. There are also attribute-based access controls to manage data residency requirements.

Streamline quarantine workflows for Cloud DLP

File remediations and workflows for Microsoft 365 and Google Workspace have been streamlined and updated. When a file is quarantined, it will now be copied or moved to the unified quarantine space. Admin access can be granted or revoked to the quarantine space automatically via access policies or manually.

Once in the quarantine space, files can be reviewed or restored with one click. This centralised space hosts all quarantined or shadow-copied files in SharePoint or Google Drive.

Prevent data loss at the endpoint with expanded controls

Sensitive data can be exfiltrated by users across a variety of different endpoint channels – USB, printers, cloud sync folders, websites, and more. Proofpoint has expanded this coverage to include detection for print, SD cards, and Airdrop. So, when a careless or malicious user tries to exfiltrate sensitive data across one of these channels, an alert will be triggered.

Proactively identify risky users with dynamic policies

Security teams typically build manual policies to monitor users for unusual or risky behaviour based on predefined characteristics. But this approach has drawbacks. Namely, the security team must identify risky users ahead of time – and that’s challenging to do.

With dynamic policies, a user’s monitoring policy can automatically change in real time if they trigger an alert. Dynamic policies allow security teams to:

  • Collect forensics data. Before and after an alert, the endpoint agent policy will switch from metadata-only to screenshot mode for a specified timeframe.
  • Ensure privacy. Screenshots are only captured when a user’s risky behaviour triggers an alert. This protects user privacy.
  • Scale policies. Teams can define when visibility and control policies are scaled up or down on the endpoint.

Accelerate DLP maturity with the Information Protection framework

A human-centric and omnichannel DLP solution provides critical visibility into data and user behaviour that goes far beyond the siloed approach that’s typical of legacy DLP. But technology is only one component of a successful DLP programme – you also need people and processes.

Proofpoint Premium Services and our certified partners can help you accelerate your DLP programme by leveraging people, process and technology. We can assist with deploying and managing end-to-end, human-centric information protection programmes that are governed by the Proofpoint NIST-inspired information protection framework.

Learn more

To get deeper insights into what’s new with Proofpoint Information Protection, listen to our Innovations event.

Contact us to learn more about the information protection framework. Find out how we can help you design and execute a modern, mature programme that seamlessly blends people, process, and technology.