Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Proofpoint Launches Industry’s First Instagram Security Solution

by The Gurus
June 5, 2020
in Editor's News
Share on FacebookShare on Twitter

Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation cybersecurity company, today announced the first solution that automatically identifies Instagram security threats, compliance violations and inappropriate content for removal. Proofpoint SocialPatrol™ performs advanced analysis of images, text and text embedded within images, enabling brands and compliance-aware organizations to monitor and eliminate posts and comments.
“Proofpoint SocialPatrol helped us control high levels of spam and inappropriate comments on our Instagram accounts,” said Jeff Hagen, director of Global Customer Relations for General Mills. “Without the Proofpoint SocialPatrol technology, our only recourse would have been a costly expansion of our manual moderation or risk losing followers.”
Proofpoint SocialPatrol scans all Instagram images, captions and comments on brand or corporate-owned accounts for pornographic, malicious or otherwise inappropriate content and notifies account owners. Once identified, social media marketers can easily remove inappropriate posts made by cybercriminals, spammers and rogue employees.
“Eighty five percent of top brands are using Instagram to connect with consumers—and with more than 400 million monthly active users, brands need a way to more safely engage,” said Devin Redmond, vice president and general manager of Proofpoint Social Media Security and Compliance. “Proofpoint SocialPatrol for Instagram allows companies across all verticals that may have hesitated to invest in Instagram, to adopt it more rapidly and effectively with compliance and security built-in. We are the first company to adapt security to this new phase of visual-based social communication by providing automated security scanning for both images and text within Instagram.”
Keyword and text-only security compliance solutions are blind to images on Instagram and generate too many false detections. Proofpoint SocialPatrol analyzes text and images and compares them to more than 100 algorithmic classifiers. This analysis allows brand managers to protect their brands by quickly identifying non-compliant, inappropriate and malicious posts and comments. Proofpoint SocialPatrol complements Proofpoint SocialDiscover™ which allows brands to find, track and audit branded Instagram accounts.
In addition to Instagram, the Proofpoint suite of social media solutions provides advanced tracking and protection for branded social media accounts across all major social networks, including Facebook, Twitter, LinkedIn, Google+ and YouTube. Top brands use its patent-pending technology to find their social accounts, report fraudulent accounts, stop hackers from defacing pages, remove malicious or inappropriate content, prevent unauthorized publishing workflow, and address compliance requirements.

FacebookTweetLinkedIn
ShareTweet
Previous Post

MWR InfoSecurity Suggests 2016 will be Dramatically Impacted by Smart Technology

Next Post

2015 saw the number of cryptolocker attacks double

Recent News

Google bins inactive accounts

Google bins inactive accounts

December 1, 2023
Laptop, phone, hands

40% of Cybersecurity Departments Want More Budget to Upskill Employees

November 24, 2023
AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement

AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement

November 24, 2023
Half of Cybersecurity Professionals Kept Awake By Workload Worries

Half of Cybersecurity Professionals Kept Awake By Workload Worries

November 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information