Targeted Attack Protection

Advanced Threat Protection

More than 90% of targeted attacks start with email—and these threats are always evolving. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs. And zero-day threats, polymorphic malware, weaponized documents and phishing attacks. TAP provides adaptive controls to isolate the riskiest URL clicks. TAP also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.

Defend Against URL, Attachment and Cloud-Based Threats

Targeted Attack Protection (TAP) is built on our next-generation email security and cloud platforms. This gives you a unique architectural advantage. TAP uses static and dynamic techniques to continually adapt and detect new cyber-attack patterns. We analyze potential threats using multiple approaches to examine behavior, code and protocol. This enables us to detect threats early in the attack chain. This includes cyber-attacks that use malicious attachments and URLs to install malware or trick your users into sharing passwords and sensitive information. This sandboxing and analysis take place in virtual environments, bare-metal hardware, and they leverage analyst-assisted execution to maximize detection and intelligence extraction. TAP also detects threats and risks in cloud apps and connects email attacks related to credential theft or other attacks. Our technology doesn't just detect threats and ransomware—it also applies machine learning to observe the patterns, behaviors, and techniques used in each attack. Armed with that insight, TAP learns and adapts. This makes the next attack easier to catch.

Watch the Demo

TAP URL Defense

  • Protection against URL-based email threats including malware-based threats and credential phishing
  • Predictive analysis that preemptively identifies and sandboxes suspicious URLs based on email traffic pattern
  • URLs are rewritten to protect users on any device or network as well as provide real-time sandboxing on every click

TAP Attachment Defense

  • Protection against known malicious documents
  • Unknown attachments are analyzed and sandboxed
  • Includes sandboxing and analyses of numerous file types, password protect documents, attachments with embedded URLs and zip files

TAP SaaS Defense

  • Surface suspicious log-in activity
  • Gain visibility into broad file sharing
  • Detect critical and high severity third-party applications

Gain Deep Insight into the Threats Targeting and Attacking Your People

Only Proofpoint provides threat intelligence that spans email, cloud, network, mobile and social media. Our threat graph of community-based intelligence contains more than a trillion data points that correlate cyber-attack campaigns across diverse industries and geographies. You can easily leverage this insight through the Targeted Attack Protection (TAP) Threat Dashboard as well as other unique insights at the organization and user level.

Very Attacked People™ (VAPs)

  • Your security teams need to know who your most attacked people, or VAPs, are in order to protect them against the threats and ransomware that target them. The Proofpoint Attack Index helps identify these VAPs. This index is a weighted composite score of all threats sent to an individual in your organization. It scores threats on a scale of 0-1000 based on four factors: threat actor sophistication, spread and focus of attack targeting, type of attack, overall attack volume. By better understanding your VAPs, you can then prioritize the most effective ways to resolve threats.
Very Attacked People VAPs

Company-Level Attack Index

  • The Company-Level Attack Index includes two reports. They are the Industry Comparison report and the Historical Attack Index Trending report. These are both executive-level reports that can help you understand and communicate company-level risk based on the severity of the threats attacking your organization. You also get visibility into how your monthly Company Attack Index changes over time. This allows you to surface tactical insights on how the threat landscape has been shifting. You can also leverage our proprietary Proofpoint data. With it, you can compare your Company Attack Index to your peer group (by industry, for example). This enhances and extends your visibility into the threat landscape.
Proofpoint TAP Industry Comparison Breakdown
Proofpoint TAP Industry Attack Index

Threat Insight Dashboard

  • The TAP Threat Insight Dashboard provides detailed information on threats and campaigns in real time. You gain visibility into both widespread and targeted attacks. It gives you details around the threat itself from impacted users, attack screenshots, and very in-depth forensics.
Proofpoint Threat Insight Dashboard

Superior Intel and Visibility

Only Proofpoint provides threat intelligence that spans email, cloud, network, mobile apps and social media. Our threat graph of community-based intelligence contains more than 600 billion data points that correlate attack campaigns across diverse industries and geographies. You can easily leverage this insight through the TAP Threat Dashboard. The TAP Threat Dashboard:

  • Can be accessed through a web browser. Get visibility into the threats entering your organization. See who is attacking, how they're attacking and what they're after.
  • Provides ransomware protection data at organization, threat and user level. This helps you prioritize alerts and act on them.
  • Highlights broad attack campaigns and targeted ransomware threats. You can see attacks directed at your executive leadership and other high-value employees.
  • Surfaces account compromises connected to email attacks.
  • Highlights brute-force attacks and suspicious user behavior.
  • Provides detailed forensic information on threats and campaigns in real time. You get downloadable reports and can integrate with other tools through application programming interfaces (APIs).

Protection Beyond the Network

To protect your people, your defenses must work where they do—at the pace they do. With TAP, you can:

  • Protect users on any network, on any device and in any location where they check their email. TAP works on internal or external networks (both public and private) on mobile devices, desktop PCs and the web.
  • Deploy quickly and derive value immediately. You can protect hundreds of thousands of users in days—not weeks or months. TAP can be easily configured as an add-on module to the Proofpoint Protection Server, which can be deployed as a virtual appliance, hardware appliance or cloud service.
  • Surface file-based threats in your SaaS file stores and detect account compromise.
  • Stay ahead of attackers with frequent, daily updates to our cloud analysis services.
  • Enhance the security of any email platform—even for Microsoft Office 365 or hybrid Exchange environments.

Learn More About our Office 365 Solutions

Adaptive Security Controls

The security capabilities of Targeted Attack Protection (TAP) are now extended further by being integrated with Proofpoint Browser Isolation. It does this by enabling risk-based isolation for URL clicks within corporate emails. With our unique approach to protecting people, we can highlight your most attacked people and determine the riskiest URLs that get into your users’ inboxes. By doing this, we can isolate risky URL clicks to help prevent threats and credential phish from impacting your organization. This integration between TAP and Browser and Email isolation provides you with:

  • Adaptive controls to isolate URL clicks based on risk
  • Secure use of cloud collaboration tools, such as SharePoint and Dropbox
  • Phishing detection within seconds to limit user input on a page deemed suspicious
  • The ability for users to exit the isolated session of the URL they clicked within corporate email once it’s deemed safe by deep threat scans

Ready to give Proofpoint a try?

Start with a free Proofpoint trial