Proofpoint Email Security
Promote this Nomination
Proofpoint Email Security
|Company (that provides the nominated product / solution / service)||Proofpoint|
|Company size (employees)||1,000 to 4,999|
|Type of solution||Cloud/SaaS|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
• Stop More Threats, Faster: Proofpoint leads the way in new detection techniques that stop various types of email threats, including credential phishing, multi-stage malware, email fraud, and account compromise. Our effectiveness is powered by the Nexus Threat Graph, which is built on billions of emails per day, millions of cloud account and thousands of malware samples per day from over half of the Fortune 1000, and by NexusAI, our dynamic, multi-layered threat detection engines that continuously learn from the threats we analyze. We continuously update our detection engines to address changes in the threat landscape. Through product evaluations against other vendors, Proofpoint always identifies a host of malicious contents and payload-less threats evading existing systems.
• Unmatched Visibility: Proofpoint provides actionable visibility into the human attack surface, revealing VAPs and peer group comparisons to help organizations assess, prioritize, and mitigate risk. We automatically identify supplier risk, providing insights into threats posed by suppliers. We offer detailed forensics including insight into threats, campaigns, and threat actors, enabling organizations to understand how they are targeted and how to prevent them.
Our unique VAP insights also allow organizations to implement various adaptive risk-based controls to minimize risk. Organizations can dynamically isolate URL clicks in corporate email for their VAPs; assign additional security awareness training; apply control to block the login from a risky IP address for VAPs. Our recent integration with Okta lets joint customers apply enhanced authentication policies for risky users.
• Improve Operational Effectiveness:
Proofpoint provides an integrated, end-to-end solution to comprehensively prevent and remediate both malware and malware-less email threats. It delivers actionable visibility into Very Attacked People (VAPs) and detailed forensics; protects VAPs against various threats with adaptive controls; trains end-user to spot identity deception tactics; automates threat investigation and remediation.
Proofpoint utilizes a combination of dynamic, static and protocol analysis techniques to inspect the full attack chain. Powered by Nexus Threat Graph that aggregates and correlates over a trillion threat data points across email, cloud, network and social media, Proofpoint Email Security delivers visibility into the everchanging threat landscape and provides unparalleled threat detection and response. It also uses NexusAI, our proprietary machine-learning technology that learns in real time, to accurately classify different types of email threats, including phishing, impostor, malware, spam and more.
To effectively mitigate risk of email attacks, Proofpoint enables organizations to apply numerous risk-based adaptive controls, including email isolation, predictive sandboxing, and security awareness training to risky users. It dynamically isolates URL clicks based on the risk profile of the recipient and provides real-time anti-phishing scan. It preemptively sandboxes file sharing URLs before users click rather than relying solely on reputation, successfully addressing collaboration platform phishing where attackers host and deliver malicious payloads via legitimate filesharing sites. It also allows security professionals to safely assess how users would engage with impostors by simulating real-world phishing attacks and to auto-enroll those who require additional training.
With automated threat response capabilities, Proofpoint enables organizations to quickly remove phishing emails containing URLs poisoned post-delivery, even if they’re forwarded or received by others. It also streamlines abuse mailbox, enabling end-users to report suspicious emails with one click via email warning tag. User reported messages are automatically analyzed and quarantined if found to be malicious, significantly reducing manual work and IT overhead.