Proofpoint Launches Three People-centric Cybersecurity Innovations: TAP Isolation, Enhanced Threat Detection, and Threat Response Python Scripting

August 07 12:05 2018 Print This Article

Cybersecurity leader boosts advanced attack protection to safeguard how people work today across personal/corporate email, social media, and cloud applications

LAS VEGAS, Aug. 08, 2018 (GLOBE NEWSWIRE) — Black Hat USA – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced three people-centric security innovations, including Targeted Attack Protection (TAP) Isolation for personal webmail and browsing defense, enhanced threat detection, and new Threat Response python scripting.

“Exceptional effectiveness in threat protection requires constant innovation—and today Proofpoint has increased its lead,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. “Technologically, these people-centric innovations are an important step forward for Proofpoint and our customers. We help security teams proactively defend their organizations from today’s most advanced threats at scale, embrace new devices, and safely empower employees to use personal email and browse the web.”

Years in the making, these latest innovations underscore the importance Proofpoint places on staying ahead of today’s attackers.

Proofpoint’s TAP Isolation Secures Personal Webmail and Browsing

Attackers are relentless when pursuing their victims. When they can’t reach targets through their corporate email accounts, they go after the second most popular threat vector, personal email accounts. For this reason, employee personal web use has historically introduced significant security, productivity, and privacy challenges to an organization’s security posture.

TAP Isolation separates web content to provide corporate users with safe and anonymous access to webmail and internet browsing while protecting the endpoint and the corporate network. Powered through Proofpoint’s cloud service, it’s simple for IT to deploy, manage, and support, while simultaneously improving user satisfaction. These capabilities also meet compliance needs by enabling employers to establish a filtered, proxied, anonymous, and secure internet service for personal webmail and browsing use as required by GDPR.

Enhanced Threat Detection Boosts Credential Phishing and Advanced Malware Detection

This latest TAP threat detection innovation builds on Proofpoint’s industry-leading threat platform to deliver the best possible detection rates across all threat types: URLs, attachments, malware, and phishing. Proofpoint’s “ensemble” approach within TAP, which combines machine learning, static, behavioral, and network/protocol analysis, maximizes both the effectiveness and visibility provided to customers.

New TAP sandbox environments feature enhanced phishing detection capabilities that catch a wider variety of phishing attacks combined with faster scanning and release times. On the malware detection front, it integrates new memory inspection capabilities and improves machine learning to deepen malware detection and stop targeted attacks.

Proofpoint Threat Response Features New Python Scripting

To help organizations rapidly expand and efficiently support orchestration and automation across a broad ecosystem of devices, Proofpoint Threat Response users can now build their own connectors in a python scripting environment. This allows security teams to connect any network device with an API to Proofpoint Threat Response system for analysis. In addition, a new Threat Response auto-pull quarantine dashboard provides users with details of all actions taken and insight into the email, sender, and more.

For more information on Proofpoint’s advanced threat protection, please visit https://www.proofpoint.com/us/product-family/advanced-threat-protection.

About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media, mobile, and cloud applications, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. More information is available at www.proofpoint.com

Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+

Proofpoint is a registered trademark or tradename of Proofpoint, Inc. in the U.S. and/or other countries. All other trademarks contained herein are the property of their respective owners.

PROOFPOINT MEDIA CONTACT:
Patricia Hogan
Proofpoint, Inc.
(408) 763-3863
[email protected]

  Categories:
view more articles

About Article Author

Jonathan Yaniv
Jonathan Yaniv

Jonathan is the founder and editor-in-chief of TrustedNerd.com. Covering major tech shows such as CES, Jonathan is always there for the latest tech news. Want your gadget to be reviewed or have a release you'd like to be considered for publishing? Send Jonathan an email, jonathan [at] trustednerd.com

View More Articles
0 comments