November 01, 2018
Cloud reflection on building surface

Proofpoint Cloud App Security Broker protects Microsoft Office 365, Google’s G Suite, and additional cloud application users from advanced threats, accidental sensitive data sharing, and compliance risks

Sunnyvale, Calif.—November 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced it has been positioned by Gartner, Inc. in the Visionaries quadrant of the 2018 Magic Quadrant for Cloud Access Security Brokers (CASB). The report provides a detailed overview of the CASB market and evaluates vendors based on completeness of vision and ability to execute.

“As organizations have moved their critical applications, their users, and their data to the cloud, the threats have quickly followed,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. “We believe our positioning as a Visionary in the Gartner Magic Quadrant is the result of our cloud-first, people-centric security commitment to innovative cloud app protection and integrations, including data loss prevention (DLP) and pioneering capabilities to detect compromised accounts and other critical cloud risks.”

With a single compromised cloud account, cybercriminals can launch internal and external phishing attacks, set email forwarding rules, broaden file sharing permissions, upload malware, and access an entire organization’s most sensitive data. Proofpoint Cloud App Security Broker protects organizations against cyberattacks that leverage corporate cloud applications as an attack vector.

Proofpoint combines advanced threat protection, access control, DLP, third-party apps governance, and multi-factor authentication to help organizations secure application suites. Despite the popularity of third-party cloud applications across industries, these applications often contain shadow IT risks that go undetected by IT teams. Proofpoint’s powerful behavior analytics and strong authentication capabilities enable organizations to verify user identity and ensure employees have the correct access levels. IT teams also gain the ability to put policies in place to revoke applications based on granular and targeted permission levels, spanning across application type, category, specific apps, scope category, and severity.

Additionally, Proofpoint draws on insight from Proofpoint Nexus Threat Intelligence and provides organizations with granular visibility into users and data at risk. This intelligence correlates attack campaigns across diverse industries and geographies and creates individual user risk profiles for each employee within an organization. Once determined, Proofpoint automates responses to mitigate risk, effectively discovers and controls cloud-based activity across all access interfaces, and protects the data that matters most to an organization.

Please visit https://www.proofpoint.com/us/resources/analyst-reports/gartner-magic-quadrant-report-cloud-access-security-brokers to download Gartner’s 2018 Magic Quadrant for Cloud Access Security Brokers. For more information about Proofpoint’s Proofpoint Cloud App Security Broker, please visit https://www.proofpoint.com/us/products/cloud-app-security-broker.

Gartner, Magic Quadrant for Cloud Access Security Brokers, Craig Lawson, Steve Riley, 29 October 2018

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

About Proofpoint, Inc.

Proofpoint Inc. (NASDAQ: PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media, mobile, and cloud applications, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. More information is available at www.proofpoint.com

Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+

###

Proofpoint is a registered trademark or tradename of Proofpoint, Inc. in the U.S. and/or other countries. All other trademarks contained herein are the property of their respective owners.