Professional Documents
Culture Documents
Endpoint
Network
18%
Email 8%
93%
62% all breaches are attacks
Web targeting people,
12% 96% via email
High Privilege
Users
High Risk
People
Highly Highly
Attacked Vulnerable
Users Users
Top 20 Very Attacked People: Financial Institution
(Ranked by Attack Index)
Executives
Branch Managers
VP of IT
Mortgage Processing
Administrative
Assistant
People-Centric Visibility Drives Better Protection
VAP Scores
VULNERABILITY ATTACK PRIVILEGE
MEDIUM HIGH HIGH
lbream@bank.co
Phish Simulation
Max threat: 850 VIP: yes
test: no action
(top 10%) Sensitive data:
Risky device /
30 day total: 9,143 yes, CASB DLP
network use: yes
(top 5%) AD Score: High
MFA: inconsistent
9
Policy Layers for Email Security
IP Address
Sender Content
Relationship
2
1 Journal internal mail to Internal IMD inspects
Mail Defense (IMD) messages offline
IMD
Cloud Service
Exchange On-prem
4 Auto-pull and
quarantine
messages
3
Proofpoint Threat Response
Auto-Pull (TRAP) polls IMD
for bad messages
Proofpoint TRAP
(On-prem)
Email Protection:
Continued Leadership and Innovation
Visibility to Global Advanced Machine Learning Granular Filtering, Custom Rich Reporting, Visualization
Threat Campaigns at with Content, Context, Configuration and Control and Ecosystem Integration
F1000 Companies Behavior Analysis
Targeted Attack Protection
Industry’s most effective detection
Multi-Platform
Malware Sandboxes TAP Ops Analyst-Assisted Customer-Initiated
Execution Research (PTIS)
NON-MALWARE
SaaS TAP Ops Threat Ops
Classifiers Credential Phish
(Phishing, BEC) Sandbox
20
TAP Attachment Defense architecture
21
TAP URL Defense Architecture
Clicked
Reputation
Proofpoint
Protection
URI Blacklist
Server (PPS)
Unknown/Clean
Threat Integrated threat Unknown/Clean
Threat
Check reputation. intelligence
Quarantine known Redirector
threats
Sandbox (urldefense.
proofpoint.com)
URL Defense If Unknown If Unknown
Module
Malware Behavior Code Protocol
Predictive
Rewrite URLs Defense
Threat Graph
90 Day Search
Window Filters
Threat Severity
Very Attacked People
(VAP)
23
TAP SaaS Defense
Malicious
files
uploaded
to cloud file
shares
Suspicious
logins’
severity
levels
Cloud
activity
People-
centric
threat view
24
Targeted Attack Protection:
Pulling Ahead With Industry Leading Solution
Discern Broad Campaigns Identify Targeted, Impacted Inspect All Attachments, Detailed Forensics Insights
and Targeted Attacks and At-Risk Users URLs at Delivery and at Click and Reporting
Email DLP
26
Best of Breed DLP
Drivers for DLP Our Capabilities
Accuracy in Detection
Regulation and 1
• Document fingerprinting
Compliance • Smart ID
• Dictionaries
• Contextual Data matching
Employee 2
• Header, Attachment metadata tagging
monitoring • EDM
• Encryption
• Quarantine
Forensics and • Block 4
Investigation • Rescan
• Allow w/ conditions
Proofpoint DLP – Quickest time to value
24-48 Hours
quickly secure IP and critical
Protect
data
Classify Classify
Dictionaries and Smart-ids
f
Low False Analysis and
Positives Granular classification
Prioritization for of Corporate
IT efficiency Sensitive data
Exact Data Matching
PEOPLE-CENTRIC
Proofpoint Information Protection – A Unique Approach
… which includes not only
Proofpoint DATA
data, but access/behavior and
Security threat is better
Awareness
Training
PEOPLE-CENTRIC
ACCESS/
THREATS
BEHAVIOR
MODERN
DLP
Email DLP – Response and Visibility
Accurately Detect Exfiltration Deploy Quickly with a Rich Pre-built Rules Achieve Compliance for
of Full Files or Data Fragments Cloud-native Solution and Dictionaries HIPAA, GDPR etc.
GDPR
Email Encryption
Integrated Encryption
All encrypted
Send encrypted
emails in a
message as
single inbox
attachment
No Prying Eyes Protect with No Weak Links Full Life Cycle Solution Expire Simplified Key Management
Strong Encryption with Policy-based Automation Emails, Keys via Policies Service by Proofpoint
Email Continuity
41
Ensure Uninterrupted Access To Email
Emergency Mailbox
30-day rolling email view
Automated Failover
Always-on, just like your business
Automated Restoration
No-touch primary mail recovery
Outlook Integration
Email continuity Simple end-user access
Archive storage