Proofpoint, Inc. has just announced two people-centric innovations that enhance how organizations protect their most attacked people from malicious URLs, while increasing the effectiveness of security awareness training content.
Proofpoint’s newly announced adaptive security controls can dynamically isolate URL clicks in corporate email and cloud collaboration URLs based on the risk profile of the recipient, as well as the riskiness of the URL itself. These security controls are integrated with Proofpoint’s Targeted Attack Protection (TAP) intelligence.
Also recently announced are new Proofpoint security awareness training customization features that enable security teams to more effectively educate end users and change behavior by tailoring their interactive training modules based on Learning Science Principles and training best practices.
“Cybercriminals relentlessly target the people who will provide the most lucrative payout and that’s why we are committed to delivering innovative people-centric security and training solutions that ensure an organization’s most attacked people are protected,” said Ryan Kalember, executive vice president of Cybersecurity Strategy for Proofpoint and continues:
“Targeted email attacks with malicious links continue to dominate the threat landscape, with malicious links outnumbering malicious attachments more than five to one. Proofpoint is the only security company that can isolate URLs based on a user’s risk profile, allowing security teams to leverage the power of isolation where it’s most needed, while still delivering a great end user experience.”
Proofpoint isolation integrates with TAP
These people-centric innovations are featured in both Proofpoint Email Isolation, which isolates both links in corporate email and personal webmail, and Proofpoint Browser Isolation, which isolates risky browsing behavior on corporate devices for all websites.
Both products leverage Proofpoint isolation technology, which fetches content and executes it within Proofpoint’s cloud, while allowing the user to view a safely mirrored image of the site, assuming zero trust of all content.
Each solution also enables isolated use of cloud collaboration tools such as Dropbox and Microsoft SharePoint to help dramatically lower an organization’s attack surface.
Both Proofpoint browser isolation and email isolation integrate critical Proofpoint Targeted Attack Protection intelligence to help security teams detect, mitigate, and block advanced threats that target users through email.
In addition to blocking attacks that leverage malicious attachments and URLs, TAP also detects threats and risks in cloud applications. The Proofpoint Attack Index within TAP provides organizations with visibility into their most targeted users based on four factors: threat actor sophistication, spread and focus of attack targeting, type of attack, and overall attack volume.
New security awareness training
In addition to URL isolation innovation, Proofpoint has also released people-centric enhancements to its Security Education Platform. These features allow security teams to more effectively educate end users and change behavior by personalizing their training with customized content.
Guided by a learning science evaluator, each module in the self-service Proofpoint customization center can be customized to meet the specific needs of individual departments, roles, and regions.
Administrators can now alter training module text, including quiz questions and text across all supported locales. All edited content is automatically reviewed by the Learning Science Evaluator, which digitally assesses content alterations and alerts administrators when training does not follow principles designed for maximum learning retention.
This solution enables customers to quickly and easily modify and assign content within minutes. Proofpoint’s on-demand customization functionality is available at no additional charge to Security Education Platform customers across North America, Europe, and Asia-Pacific.
For more information on Proofpoint Browser Isolation and Proofpoint Email Isolation, please visit https://www.proofpoint.com/us/products/browser-isolation and https://www.proofpoint.com/us/products/email-isolation. For more information on Proofpoint’s Security Awareness Training solutions, please visit https://www.proofpoint.com/us/product-family/security-awareness-training.
Be the first to comment