Proofpoint Threat Protection

Overview

ADVANCED THREAT PROTECTION

Attackers are constantly changing their tactics and developing ever more advanced threats.  Now more than ever, organizations need full lifecycle protection against targeted attacks and advanced persistent threats. Proofpoint combines its industry leading secure e-mail gateway with sophisticated dynamic malware analysis, real-time threat intelligence and automated threat response. The cutting-edge combination enables organizations to more effectively detect and block targeted attacks, then quickly respond when a potential compromise has been detected.

 

Threat Protection Needs Choices

Today's Challenges

Block Known Threats

Malware, viruses, phish, and spam.

Detect Unknown Threats

Zero-day exploits and advanced targeted attacks.

Harden Against Loss

Track sensitive content and remediate risk.

Respond to Incidents

Single pane of glass for your threat data.

Threat Protection Needs

Threat Protection Needs


The goal:
Identify and stop threats before they enter your organization.

The problem:
The vast majority of threats targeting organizations are threats that have already been identified, yet many organizations still fall victim to these attacks due to existing protection systems failing to block these known threats.

The solution:
Proofpoint’s Enterprise Protection solution uses a combination of advanced technologies to identify more known threats and block them. These technologies leverage big data, machine learning and our unique position in the email stream of a large percentage of the Internet’s overall enterprise email traffic to provide industry leading threat identification and blocking. That’s why Gartner ranked Enterprise Protection as the leader in the Magic Quadrant for Secure Email Gateways.  

The result:
Better blocking of common attacks and malicious emails before they reach your network.

read more >


The goal:
Find advanced threats faster—before users get infected.

The problem:
Attackers frequently modify malware to avoid detection by traditional antivirus and blocking solutions. These polymorphic threats, along with new threats known as zero-day exploits, are very challenging to detect.

The solution:
Proofpoint’s Targeted Attack Protection (TAP) solution delivers advanced malware detection for both URL-based attacks and attachment attacks. Advanced analysis technologies like statistical analysis (big data), pre-exploit indicator detection, advanced sandboxing and static analysis are just some of the techniques employed by TAP to detect advanced threats.

The result:
High detection ratios for even the most elusive threats and targeted attacks.

read more >


Respond to Incidents

Data Sheet Threat Response

The goal:
Verify and respond to detected threats faster resulting in reduced data exposure.

The problem:
Security teams are receiving a barrage of security alerts about threats that may, or may not, be real. Precious time is lost while analysts switch between different systems to review these threats and try to confirm whether or not users have actually been infected.

The solution:
Proofpoint’s Threat Response solution provides a single pane of glass for security teams to review and investigate detected threats. With support for a variety of detection vendors, including malware sandboxing solutions and SIEM, analysts can focus their time on assessing the threat and impact rather than collecting data to review. Built-in workflows support rapid containment activities like blocking CNC traffic and isolating infected machines off the network.

The result:
Rapidly respond to detected threats with higher confidence in the actions that need to be taken.

read more >


The goal:
Find the sensitive data, like credit card numbers, PII and SSN, in your network and cloud services—and monitor that sensitive data for unauthorized access or distribution.

The problem:
As data becomes more distributed, often spread across user systems, servers and now hosted in the cloud, locating sensitive data is increasingly difficult. This distribution of data also increases the challenge of monitoring it and detecting unauthorized access.

The solution:
Proofpoint’s Enterprise Privacy solution includes Content Control for data discovery and Data Loss Prevention for detecting policy violations for sensitive data.

The result:
Locate your sensitive data across the network and put policies in place to monitor for appropriate access.

read more >