Proofpoint Cloud App Security Broker (Proofpoint CASB)

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Proofpoint
Websitehttps://www.proofpoint.com/us
Company size (employees)1,000 to 4,999
Type of solutionCloud/SaaS

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

● Proofpoint CASB differentiates from competitors with people-centric and high-efficacy security analytics that excel at protecting users from threats, such as account compromise, malicious files, malicious apps, abuse of third-party OAuth app access, abuse of IaaS resources and initial access and preparation of ransomware attacks. Competitors fall short in the following areas: shallow depth in detecting account compromise, inability to correlate compromise with post-compromise activity that dramatically slows down security response and incomplete account takeover remediation capabilities across Microsoft, Google and Okta federated applications

● Data loss originates with people. They can be negligent, compromised, or malicious. Understanding user intent enables you to apply the appropriate DLP response to mitigate risk. Proofpoint is the only vendor that brings together the telemetry of content, user-behavior and threats across the most critical DLP channels – cloud (SaaS and IaaS storage), email, endpoint and web. Competitors fall short in either their inability to bring together the DLP channels into one console for triage and response or cant correlate threat and user behavior to the data movement.

● With Proofpoint CASB, you can govern SaaS apps and IaaS services in a centralized management console with prioritized context into the apps with the most app vulnerabilities, the most attacked or abused and contain the most sensitive data or accessed by the privileged users. This includes first-party cloud apps (such as Microsoft OneDrive and Salesforce) as well as third-party (such as those created within Google Workspace, Microsoft appStore or federated through OAuth tokens). Competitors fall short by either missing the context of which apps are most abused or attacked in the real-world or lack the depth of detection capabilities in third-party apps such as OAuth authenticated apps.

Brief Overview

Data doesn’t lose itself. A new people-centric approach to DLP is needed to effectively respond to data loss because data loss originates with people. They can be negligent, compromised by an external threat actor, or be malicious for financial or personal gain. Understanding user intent enables you to apply the appropriate DLP response to mitigate risk. For example, user training for negligent users, open a SOC ticket for compromised users, or involve HR or legal for a malicious user.

Proofpoint is the only vendor that brings together the telemetry of Content, User-Behavior and Threats across the most critical DLP channels – email, cloud services, endpoint, on-premises file repositories and web. Built on a scalable, modern cloud backend, the common incident management, data classification, robust policy templates, workflows and reports delivers consistency and simplified day-to-day operations, minimizing DLP complexity for optimal manageability for small team or limited resources.

Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and app governance. Proofpoint CASB protects you from account compromise, oversharing of data and compliance risks in the cloud. Our multi-mode solution combines:

● Compromised account detection and automated response
● Protection against malicious files uploaded or created within cloud apps
● Data security including real-time DLP
● Cloud and third-party apps governance including third-party OAuth apps
● IaaS protection
● Real-time detection of malicious files
● Adaptive access controls
● Controls over it-approved and tolerated cloud apps that are used in the browser or within native clients

We secure Microsoft 365, Google Workspace, Salesforce, Box, Slack, AWS, Azure, Okta and many other IT-approved and tolerated cloud apps. People-centric visibility to email and cloud threats helps organizations identify at-risk users and protect their accounts and data.