SPANISH Proofpoint Commercial and Technical shortDemo2018 · Hacking attacks follow a phishing...
Transcript of SPANISH Proofpoint Commercial and Technical shortDemo2018 · Hacking attacks follow a phishing...
1 © 2017 Proofpoint, Inc.
Carolina Cayaffa –Enterprise Account Executive, LATAM Marco De la Garza – Sr. Sales Engineer, LATAM March 2018
PROOFPOINT :PROTECT YOUR PEOPLE,YOUR DATA, YOUR BRAND
2 © 2017 Proofpoint, Inc.
Industry Is Not Aligned with the Threats
Network62%
Endpoint18%
Email 8%
Web 12%
Source: Gartner (2017 forecast)
IT Security Industry
90%+Start through
Source: Verizon DBIR, Trend Micro, FEYE, etc.
Other
Attack Vectors
3 © 2017 Proofpoint, Inc.
Attacks Increasingly Target Individuals, Not Infrastructure
Threats use social engineering, not vulnerabilities
Ransomware BEC/impostor email fraud becomes
board-level issue
$5.3B
40,292Organizations victimized in the
US alone
Direct losses since January 2015, up 2,000% year over year
Source: FBI
90%+Hacking attacks follow a phishing
30X Growth in variants since December 2015
Source: Verizon, Trend Micro
4 © 2017 Proofpoint, Inc.
Who we are
5 © 2017 Proofpoint, Inc.
Leaders in Gartner’s for 7 years in a rowMagic Quadrant for Secure Email GatewaysJune 29, 2015
§ “Proofpoint continues to lead the market with R&D investments in innovative features and corporate acquisitions to complement its enterprise capability.”
§ “It clearly has the sharpest focus on email security issues…“§ “Spam and malware accuracy has always been a
consistent Proofpoint strength...The company continues to invest in new, innovative techniques for spam detection, and gets high marks in this capacity from reference customers.”
§ “Proofpoint's Targeted Attack Protection service provides time-of-click URL protection and Attachment Defense.”
§ “The Web-based management interface continues to be one of the best…”
§ “DLP features are very strong, and include numerous prebuilt policies, dictionaries, number identifiers and integrated policy-based encryption.”
§ Read the full report at: www.proofpoint.com/mq
ProofpointataGlance
~50%of the
Fortune 100
5000+enterprisecustomers
90%+renewal
rate
20B+messages
processed daily
8straight years of MQ leadership
50M+mobile apps
scanned
300K+daily malware
samples
100+threat ops and research team
strategic ecosystem integrations
~20%revenue invested
in R&D
LEADING CUSTOMERS
DEEP SECURITY DNA
800B+ node threat
graph
UNIQUE VISIBILITY
ENTERPRISE CLASS
7 © 2017 Proofpoint, Inc.
IDC– Worldwide Messaging Security 2015 Snapshot
8 © 2017 Proofpoint, Inc.
Some Proofpoint Clients
9 © 2017 Proofpoint, Inc.
Solving the Entire Email Problem
Email Protection
TAP
EFD
TRAP
Domain DiscoverPersonal Email Defense
SaaS Defense
10 © 2017 Proofpoint, Inc.
Targeted AttackProtection (TAP)
Email Fraud Defense
EmailProtection
Information Protection
Next Generation Email Security
Bulk Spam, DDOS
Attacks
Email Classification
Virus Scanning
Dynamic Reputation
Composite Learning Engine
Anti-Virus
File-Based Threat
Protection
Malicious URL Protection
Attachment Defense URL Defense
Email arrives
Encrypt communications
Identify sensitive data
Email Encryption Email DLP
Email leavesBEC Attacks Consumer Phishing
Email Authentication & Visibility
Mobile Defense
Social Media Protection
TRAP – Threat Response Auto-Pull
Continuity
Enterprise Archiving
TAP SaaS Defense
11 © 2017 Proofpoint, Inc.
Protecting Against Advanced Attacks:Unparalleled Visibility Only Proofpoint:
• Provides analyst-curated content about the campaigns and threats targeting you
• Delivers the deepest visibility into mail flow, including message tracing and search
WHO is at risk
WHO is impacted
WHAT is the risk
WHO is targeted
HOW you are being attacked
12 © 2017 Proofpoint, Inc.
Stop Advanced Attacks: Malware
Only Proofpoint:
§ Uses multiple detection techniques built by our own engineers, adapting as rapidly as threats, backed up with 100+ threat team
• Consistently demonstrates the highest effectiveness vs. EOP and ATP in customer environments
• Coverage for SharePoint Online, OneDrive, and non-Microsoft cloud applications
Customized attachment name and hash
Malware inside a Word document inside another doc
Compromised sender with good reputation
Correct name, phone, and address for targeted company in fake legal
claim
13 © 2017 Proofpoint, Inc.
Claims to be secure
Link to hijacked site with good reputation
Sent from lookalike domain
Stop Advanced Attacks: Credential Phishing
Only Proofpoint:
§ Has unique capabilities specifically developed for phishing pages, blocking millions of O365 phishing messages
§ Leverages Threat Operations team to complement automated detection
§ Provides Domain Discover tool to proactively detect and protect against lookalike domains
14 © 2017 Proofpoint, Inc.
Even the best solutions miss some percentage of malicious
URL threats often go bad post-delivery
Only Proofpoint:
§ Provides automated response to clean up malicious and unwanted messages in users’ inboxes
§ Removes the need for PowerShell scripts and manual effort, saving your team time
§ Looks for forwarded emails to prevent internal outbreaks
Respond When Things Go Wrong: Automated Message Removal
15 © 2017 Proofpoint, Inc.
Q&A