Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric...

Post on 21-Aug-2020

2 views 0 download

Transcript of Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric...

Proofpoint Product PortfolioReducing Risk with People-Centric Security

Roberto MainaSystem Engineer – Exclusive Networksrmaina@exclusive-networks.com

1

AGENDA

• Proofpoint Overview• Email Protection Server• Targeted Attack Prevention (TAP)• Threat Response Auto-Pull (TRAP)• Essentials for SMB• P-SAT (Security Awareness Training)• P-CASB (Cloud Access Security Broker)• Q&A

Proofpoint Overview

OverviewThe leader in protecting people from advanced threats and compliance risk

Magic Quadrant leadership across:

The most trusted partner to protect the leading threat vector

Most deployed solution for the Fortune 100

Seamless integration with other next gen

leadersglobal cybersecuritycompany in revenue

and market cap

Secure Email Gateway

Information Archiving

Security Awareness Training

Top 10

the only one focused on protecting people

Leading visionary

Leader for 7consecutive years

Leader for 6consecutive years

Leader for 7consecutive years

#1

Most deployed solution for the Global 2000

#1Most deployed solution

for the Fortune 1000

#1

Cloud Access Security Broker

Attacks increasingly target people, not infrastructure

$26.2B+

166,349Incidents worldwide

Direct losses worldwide(June 2016 – July 2019)

Source: FBI.

99%+Malware attacks rely on user to run malicious code

Source: Proofpoint Threat Data.

THREATS USE SOCIAL ENGINEERING, NOT VULNERABILITIES

Source: Proofpoint Threat Data.

Orgs exposed to targeted password attacks

85%Orgs detected successful account compromise

45%

Account takeover of cloud apps is a growing problem

SHIFT TO CLOUD CREATES NEW THREAT VECTORS, DATA EXPOSURE

EMAIL FRAUD IS ABOARD-LEVEL ISSUE

300%+Increase in corporate credential phishing

Active accounts in orgs targeted by attacks0.6%

$12.5B+

78,617Incidents worldwide

Direct losses worldwide(Oct 2013–May 2018)

Defenders Don’t Focus on People, Attackers Do

Source: 2019 Verizon DBIR

Source: Gartner Information Security, Worldwide 2017-2023, 2Q 2019 update (2019 forecast)

Network59%

Endpoint19%

Email10%

Web 12%

96%of breaches start

with attacks targeting people

SECURITY SPENDING BREACHES

Defensive strategy needs to counter attacker tactics

Who are your VAPs?

8

Attack

Vulnerability Privilege

VAPs Who Represents Risk to the Organization?

Who is Likely to Fall for those Threats?

Who Gets Targeted by Serious Threats?

Receive highly targeted, very sophisticated, or

high volumes of attacks

Clicks on malicious content, fails awareness

training, or uses risky devices or cloud services

Can access critical systems or sensitive data, or can be a vector for lateral movement

The Proofpoint People-Centric Protection

© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary

Spoofing/BECPhish

MalwareDelayed action URLs

Targeted password attacksData Exfiltration

Email Protection Server

The Billion Dollar Problem

Payload free

Socially Manipulative

Highly targetedAttacks

Targeted AttackProtection

Email Fraud Defense

EmailProtection

Information Protection

Proofpoint Advanced Email Security

Bulk Spam, DDOS Attacks

Email Classification

Virus Scanning

Dynamic Reputation

Composite Learning Engine

Anti-Virus

File-Based Threat Protection

Malicious URL Protection

Attachment Defense URL Defense

Email arrives

Encrypt communications Identify sensitive data

Email Encryption Email DLP

Email leaves

BEC Attacks Consumer Phishing

Email Authentication & Visibility

Continuity

TRAP

DomainDiscover

**

Targeted Attack Protection (TAP)

HOW you are being attacked

WHEN you might be compromised

WHEN you are being attacked

File URL

HOW targeted is the attack

Phish

Malware

Impostor

Impostor

Highlighted

Who are your VAPs & how are they being attacked?

Threat Response Auto-Pull (TRAP)

Proofpoint Essentials for SMB

EmailProtection

Email Archiving

InformationProtection

Advanced ThreatProtection

EmailContinuity

Proofpoint Cloud

24x7 Support

SMB Focused

Proofpoint Essentials

Key Differences in Essentials

• Much simpler interface• More ‘best practice’ functionality built in• Less customization around mail

routing/policies• Multi-tenant, cloud only• Simplistic reporting• Much quicker to deploy• POCs managed easily

Key Similarities

• Threat Intelligence• Spam and Threat Detection Engines• BEC Impostor Detection Engine• F-Secure AV & Clam AV• URL rewriting and Sandboxing• Attachment Sandboxing• Data Centre Locations• Threat Research team

Solution Comparison – Essentials vs. Enterprise

© 2019 Proofpoint. All rights reserved

© 2019 Proofpoint. All rights reserved

© 2019 Proofpoint. All rights reserved

Proofpoint Security Awareness Training (PSAT)

WOMBAT ACQUISITION AND BIRTH OF P-SAT

Proofpoint offers Security Solutions aiming atmodifying end-user behavior

• A company leader in behavior changing• Leader for 4 consecutive years in Gartner Magic

Quadrant• Born from a research of Carnegie Mellon

University in 2008• Global customers including most Fortune 500

companies• Acquired by Proofpoint in March 2018

Continuous Training Methodology

Analyze and

Repeat

Knowledge assessmentsMock attacks

Interactive training modules & games

Reporting attacks, videos, posters, articles

Detailed reports show progress

Proofpoint Cloud Access Security Broker (P-CASB)

Employees

Partners

Customers

Vendors

Managed

Unmanaged

Mass migration to the cloud

On-Network Off-Network

East-West Traffic

North-South Traffic

© 2020 Proofpoint. All rights reserved

• Adaptive access controls• Risk based authentication

• Unified DLP across cloud apps, email and on-premises file repositories

• Consistent data classification• Microsoft AIP support

Agentless Architecture with Access Control

• Extend People-Centric Threat Protection

• Compromised accountsdetection and remediation

• Malware protection

• Shadow IT visibility• OAuth based third-

party apps protection

Proofpoint CASB

Data Security

© 2020 Proofpoint. All rights reserved

Threat Protection

Cloud Governance

© 2019 Proofpoint. All rights reserved

Q&A

GRAZIE

rmaina@exclusive-networks.comggiordano@exclusive-networks.com