Proofpoint has announced the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection. In addition, to help organizations combat advanced cyberattacks that use both email and cloud vectors, Proofpoint also announced multiple Proofpoint Cloud App Security Broker (CASB) innovations to safeguard the cloud applications employees access every day, such as Amazon Web Services, Box, Google G Suite, Microsoft Office 365, and Slack.
“BEC and EAC attacks have cost companies over $26 billion worldwide and have been responsible for more cyber insurance claims than any other threat, including ransomware. Our new integrated solutions are the first in the market to address the problem with an end-to-end approach that counters the full range of attacker tactics,” said Ryan Kalember, executive vice president of Cybersecurity Strategy for Proofpoint. “Ninety-four percent of data breaches start with attacks targeting people via email. Advanced threats are now combining both email and cloud vectors whereby a single malicious email can lead to an infiltrated cloud account, which in turn can lead to phishing or email fraud attacks internally and throughout supply chains. We monitor millions of users in the cloud and our multiple CASB advancements—coupled with our new BEC/EAC integrated solutions– will help our customers ensure their organizations have comprehensive, people-centric protection against these costly attacks.”
The latest Proofpoint’s CASB innovations include:
New automated detection and remediation of malicious third-party applications in Microsoft Office 365 and Google G Suite. This innovation will help stop attacks that may start by email and launch third-party applications that provide attackers with persistent system permissions and access
Expanded suspicious file activity detection for Microsoft Office 365 through integration with Proofpoint threat intelligence
Two risk-based access enhancements that detect if a user device is unmanaged and restricting access—and the ability to determine risk levels during login and respond with adaptive controls, such as multi-factor authentication
Increased shadow IT visibility into 46,000 applications with more than 50 attributes per application
Enhanced real-time data loss prevention (DLP) for approved apps through an integration with Proofpoint Browser Isolation.