proofpoint product portfolio · proofpoint product portfolio reducing risk with people-centric...
TRANSCRIPT
![Page 1: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/1.jpg)
Proofpoint Product PortfolioReducing Risk with People-Centric Security
Roberto MainaSystem Engineer – Exclusive [email protected]
1
![Page 2: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/2.jpg)
AGENDA
• Proofpoint Overview• Email Protection Server• Targeted Attack Prevention (TAP)• Threat Response Auto-Pull (TRAP)• Essentials for SMB• P-SAT (Security Awareness Training)• P-CASB (Cloud Access Security Broker)• Q&A
![Page 3: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/3.jpg)
Proofpoint Overview
![Page 4: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/4.jpg)
OverviewThe leader in protecting people from advanced threats and compliance risk
Magic Quadrant leadership across:
The most trusted partner to protect the leading threat vector
Most deployed solution for the Fortune 100
Seamless integration with other next gen
leadersglobal cybersecuritycompany in revenue
and market cap
Secure Email Gateway
Information Archiving
Security Awareness Training
Top 10
the only one focused on protecting people
Leading visionary
Leader for 7consecutive years
Leader for 6consecutive years
Leader for 7consecutive years
#1
Most deployed solution for the Global 2000
#1Most deployed solution
for the Fortune 1000
#1
Cloud Access Security Broker
![Page 5: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/5.jpg)
Attacks increasingly target people, not infrastructure
$26.2B+
166,349Incidents worldwide
Direct losses worldwide(June 2016 – July 2019)
Source: FBI.
99%+Malware attacks rely on user to run malicious code
Source: Proofpoint Threat Data.
THREATS USE SOCIAL ENGINEERING, NOT VULNERABILITIES
Source: Proofpoint Threat Data.
Orgs exposed to targeted password attacks
85%Orgs detected successful account compromise
45%
Account takeover of cloud apps is a growing problem
SHIFT TO CLOUD CREATES NEW THREAT VECTORS, DATA EXPOSURE
EMAIL FRAUD IS ABOARD-LEVEL ISSUE
300%+Increase in corporate credential phishing
Active accounts in orgs targeted by attacks0.6%
$12.5B+
78,617Incidents worldwide
Direct losses worldwide(Oct 2013–May 2018)
![Page 6: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/6.jpg)
Defenders Don’t Focus on People, Attackers Do
Source: 2019 Verizon DBIR
Source: Gartner Information Security, Worldwide 2017-2023, 2Q 2019 update (2019 forecast)
Network59%
Endpoint19%
Email10%
Web 12%
96%of breaches start
with attacks targeting people
SECURITY SPENDING BREACHES
![Page 7: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/7.jpg)
Defensive strategy needs to counter attacker tactics
![Page 8: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/8.jpg)
Who are your VAPs?
8
Attack
Vulnerability Privilege
VAPs Who Represents Risk to the Organization?
Who is Likely to Fall for those Threats?
Who Gets Targeted by Serious Threats?
Receive highly targeted, very sophisticated, or
high volumes of attacks
Clicks on malicious content, fails awareness
training, or uses risky devices or cloud services
Can access critical systems or sensitive data, or can be a vector for lateral movement
![Page 9: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/9.jpg)
The Proofpoint People-Centric Protection
© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary
Spoofing/BECPhish
MalwareDelayed action URLs
Targeted password attacksData Exfiltration
![Page 10: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/10.jpg)
Email Protection Server
![Page 11: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/11.jpg)
The Billion Dollar Problem
Payload free
Socially Manipulative
Highly targetedAttacks
![Page 12: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/12.jpg)
Targeted AttackProtection
Email Fraud Defense
EmailProtection
Information Protection
Proofpoint Advanced Email Security
Bulk Spam, DDOS Attacks
Email Classification
Virus Scanning
Dynamic Reputation
Composite Learning Engine
Anti-Virus
File-Based Threat Protection
Malicious URL Protection
Attachment Defense URL Defense
Email arrives
Encrypt communications Identify sensitive data
Email Encryption Email DLP
Email leaves
BEC Attacks Consumer Phishing
Email Authentication & Visibility
Continuity
TRAP
DomainDiscover
**
![Page 13: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/13.jpg)
![Page 14: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/14.jpg)
![Page 15: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/15.jpg)
![Page 16: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/16.jpg)
![Page 17: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/17.jpg)
Targeted Attack Protection (TAP)
![Page 18: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/18.jpg)
HOW you are being attacked
WHEN you might be compromised
WHEN you are being attacked
File URL
HOW targeted is the attack
Phish
Malware
Impostor
Impostor
Highlighted
![Page 19: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/19.jpg)
Who are your VAPs & how are they being attacked?
![Page 20: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/20.jpg)
Threat Response Auto-Pull (TRAP)
![Page 21: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/21.jpg)
![Page 22: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/22.jpg)
![Page 23: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/23.jpg)
Proofpoint Essentials for SMB
![Page 24: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/24.jpg)
EmailProtection
Email Archiving
InformationProtection
Advanced ThreatProtection
EmailContinuity
Proofpoint Cloud
24x7 Support
SMB Focused
Proofpoint Essentials
![Page 25: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/25.jpg)
Key Differences in Essentials
• Much simpler interface• More ‘best practice’ functionality built in• Less customization around mail
routing/policies• Multi-tenant, cloud only• Simplistic reporting• Much quicker to deploy• POCs managed easily
Key Similarities
• Threat Intelligence• Spam and Threat Detection Engines• BEC Impostor Detection Engine• F-Secure AV & Clam AV• URL rewriting and Sandboxing• Attachment Sandboxing• Data Centre Locations• Threat Research team
Solution Comparison – Essentials vs. Enterprise
![Page 26: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/26.jpg)
© 2019 Proofpoint. All rights reserved
![Page 27: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/27.jpg)
© 2019 Proofpoint. All rights reserved
![Page 28: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/28.jpg)
© 2019 Proofpoint. All rights reserved
![Page 29: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/29.jpg)
Proofpoint Security Awareness Training (PSAT)
![Page 30: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/30.jpg)
WOMBAT ACQUISITION AND BIRTH OF P-SAT
Proofpoint offers Security Solutions aiming atmodifying end-user behavior
• A company leader in behavior changing• Leader for 4 consecutive years in Gartner Magic
Quadrant• Born from a research of Carnegie Mellon
University in 2008• Global customers including most Fortune 500
companies• Acquired by Proofpoint in March 2018
![Page 31: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/31.jpg)
Continuous Training Methodology
Analyze and
Repeat
Knowledge assessmentsMock attacks
Interactive training modules & games
Reporting attacks, videos, posters, articles
Detailed reports show progress
![Page 32: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/32.jpg)
![Page 33: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/33.jpg)
Proofpoint Cloud Access Security Broker (P-CASB)
![Page 34: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/34.jpg)
Employees
Partners
Customers
Vendors
Managed
Unmanaged
Mass migration to the cloud
On-Network Off-Network
East-West Traffic
North-South Traffic
© 2020 Proofpoint. All rights reserved
![Page 35: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/35.jpg)
• Adaptive access controls• Risk based authentication
• Unified DLP across cloud apps, email and on-premises file repositories
• Consistent data classification• Microsoft AIP support
Agentless Architecture with Access Control
• Extend People-Centric Threat Protection
• Compromised accountsdetection and remediation
• Malware protection
• Shadow IT visibility• OAuth based third-
party apps protection
Proofpoint CASB
Data Security
© 2020 Proofpoint. All rights reserved
Threat Protection
Cloud Governance
![Page 36: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/36.jpg)
© 2019 Proofpoint. All rights reserved
![Page 37: Proofpoint Product Portfolio · Proofpoint Product Portfolio Reducing Risk with People-Centric Security ... Information Protection ProofpointAdvanced Email Security Bulk Spam, DDOS](https://reader035.vdocuments.site/reader035/viewer/2022063013/5fcccac29b1d522eb95c4bc4/html5/thumbnails/37.jpg)
Q&A