There were 1,718 press releases posted in the last 24 hours and 402,180 in the last 365 days.

Proofpoint Launches Industry-First Business Email Compromise (BEC) and Email Account Compromise (EAC) Integrated Solutions; Delivers Multiple Cloud Security Innovations

Leading cybersecurity company safeguards millions of users worldwide from increasingly blended attacks that combine the cloud and email channels

SUNNYVALE, Calif., Feb. 25, 2020 (GLOBE NEWSWIRE) -- Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection. In addition, to help organizations combat advanced cyberattacks that use both email and cloud vectors, Proofpoint also announced multiple Proofpoint Cloud App Security Broker (CASB) innovations to safeguard the cloud applications employees access every day, such as Amazon Web Services, Box, Google G Suite, Microsoft Office 365, and Slack.

“BEC and EAC attacks have cost companies over $26 billion worldwide, and have been responsible for more cyber insurance claims than any other threat, including ransomware.1 Our new integrated solutions are the first in the market to address the problem with an end-to-end approach that counters the full range of attacker tactics,” said Ryan Kalember, executive vice president of Cybersecurity Strategy for Proofpoint. “Ninety-four percent of data breaches start with attacks targeting people via email.2 Advanced threats are now combining both email and cloud vectors whereby a single malicious email can lead to an infiltrated cloud account, which in turn can lead to phishing or email fraud attacks internally and throughout supply chains. We monitor millions of users in the cloud and our multiple CASB advancements—coupled with our new BEC/EAC integrated solutions– will help our customers ensure their organizations have comprehensive, people-centric protection against these costly attacks.”

Stopping BEC and EAC attacks is top of mind for organizations as cybercriminals continue targeting individuals via email with highly personalized social engineering messages. Those messages can take the form of BEC impostor emails that work to trick people into sending money and data to fake accounts and recipients. In the case of EAC, fraudsters work to compromise email accounts via credential phishing, password spraying, and/or malicious third party applications to maintain persistence and profile business activity such as new business partnerships or regular wire transfers to partners or vendors. Armed with this insight, attackers can craft and send convincing and timely emails masquerading as a real employee with what appears to be a legitimate financial request, and can lead to significant financial loss.

Cybercriminals are increasingly blending their attacks to span email and cloud vectors, which means organizations need solutions that combine security across all channels. Organizations worldwide look to Proofpoint Cloud App Security Broker (Proofpoint CASB) to help secure applications such as Amazon Web Services, Box, Google G Suite, Microsoft Office 365, Slack, and more. The solution provides a unique risk-aware, people-centered approach that gives organizations visibility and control over cloud applications while allowing security teams to deploy cloud services with confidence.

The latest Proofpoint’s CASB innovations include:

  • New automated detection and remediation of malicious third-party applications in Microsoft Office 365 and Google G Suite. This innovation will help stop attacks that may start by email and launch third-party applications that provide attackers with persistent system permissions and access
     
  • Expanded suspicious file activity detection for Microsoft Office 365 through integration with Proofpoint threat intelligence
     
  • Two risk-based access enhancements that detect if a user device is unmanaged and restricting access—and the ability to determine risk levels during login and respond with adaptive controls, such as multi-factor authentication
     
  • Increased shadow IT visibility into 46,000 applications with more than 50 attributes per application
     
  • Enhanced real-time data loss prevention (DLP) for approved apps through an integration with Proofpoint Browser Isolation

For more information on Proofpoint’s industry-first BEC and EAC bundles, please visit: https://www.proofpoint.com/us/solutions/bundles. For additional information on Proofpoint Cloud App Security Broker (CASB), please visit: https://www.proofpoint.com/us/products/cloud-app-security/cloud-app-security-broker.

1FBI, Business Email Compromise The $26 Billion Scam; AIG, Cyber Claims: GDPR and business email compromise drive greater frequencies
2 Verizon, 2019 Data Breach Investigations Report

About Proofpoint, Inc.

Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint’s people-centric security and compliance solutions to mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.

Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube

Proofpoint is a registered trademark or tradename of Proofpoint, Inc. in the U.S. and/or other countries. All other trademarks contained herein are the property of their respective owners.

PROOFPOINT MEDIA CONTACT:
Kristy Campbell
Proofpoint, Inc.
(408) 850-4142
kcampbell@proofpoint.com


Primary Logo