Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Proofpoint Launches Digital Risk Defense

by The Gurus
February 15, 2017
in Editor's News
Share on FacebookShare on Twitter

Proofpoint has announced the industry’s first unified social, mobile, web, and email fraud and phishing detection and protection solution to provide visibility and address threats outside of the traditional security infrastructure of companies. This growing arena of digital risks targets more than the employees of a company. Cybercriminals leverage a variety of channels, including fraudulent social accounts, fraudulent mobile apps, and fraudulent email domains for both consumer and business email compromise (BEC) phishing. Leveraging shared risk visibility across Proofpoint’s Nexus threat intelligence platform, Proofpoint Digital Risk Defense protects organizations from cybercriminals exploiting the company brand to fraudulently phish their customers, partners and vendors.
Social media phishing attacks alone were up 500 percent over the course of 20161, highlighting that cybercriminals have modernized their techniques in order to take advantage of the gap between the adoption of digital technology and the adoption of effective security controls. Legacy protection technologies and approaches are not designed to cover the key digital channels of social, mobile, email, and web and lack the modern detection capabilities and cross-channel context to keep up with the attacks, which creates greater risk for companies expanding their digital footprint.
“Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events,” wrote Forrester Research analyst, Nick Hayes in The Forrester Wave™: Digital Risk Monitoring, Q3 2016. Later in the same report, he wrote: “Proofpoint stands above the rest of the pack with its strong portfolio of patents related to digital risk monitoring, including capabilities to automatically lock down brand-owned social media accounts when malicious activity is detected.”
Proofpoint is delivering an omnichannel digital risk suite to combat this new wave of digital fraud and phishing to provide unique coverage for modern digital risks, such as:

  • Angler Phishing on social media customer care accounts
  • Social engineering and visual spoofing in fraudulent web domains, social accounts, and emails making fakes appear as the genuine brand
  • Fraudulent web domains in social and email phishing campaigns
  • Fake branded mobile apps designed for phishing brand customers

“Strategic mitigation and response for phishing and brand exploitation need to be incorporated into every organization’s cybersecurity plan,” said Devin Redmond, general manager and vice president of Digital Risk & Compliance Solutions for Proofpoint. “Proofpoint Digital Risk Defense is the only unified social, mobile, web, and email fraud and phishing detection and protection solution that looks beyond the traditional communication perimeter and addresses the growing danger of digital risks in real time across all of the primary customer engagement channels. Our unified visibility into active digital consumer phishing campaigns across email, social, mobile, and the web, combined with our patented protection capabilities allows organizations to confidentially engage customers and partners digitally while helping reduce their risk.”
In addition to more complete visibility, context, and coverage, Proofpoint brings patented and patent-pending capabilities for assessing and remediating risks in real time on or from social accounts, mobile apps, phishing emails, web domains, and websites delivering this unified coverage and product suite with the following modules:

  • Fraudulent Social Account, Mobile App and Web Domain Discovery – Automatically find, track, assess risk, and report phishing and fraudulently branded: social media accounts, web domains (including visual spoofing), consumer email campaigns, and mobile apps (across more than 500 stores)
  • Correlated Conviction Across Channels— Proofpoint Social, Mobile, and Web Discover modules can detect and classify fraudulent brand presence automatically while working in unison to further convict the entire attack chain involved in Angler Phishing or consumer email phishing by correlating the fake social accounts, mobile apps, web domains, and brand emails being used
  • Automated, Real-time Remediation and Blocking – Proofpoint delivers the only patented capabilities for automatically removing phishing content on social media along with the ability to block phishing campaigns, and phishing accounts as well as provide takedown reporting for fraudulent brand presence across digital channels

Additional functionality includes deep visibility, reporting and ecosystem intelligence sharing:

  • Unified Digital Risk Dashboard – View all digital risk activity across all four channels, view trends and risk scores over time, drill into detailed incident views, see remediation and takedown results while setting up automated reports by role, and more
  • Ecosystem Intelligence Sharing – Consume and view all digital risk activity in leading security operations center (SOC) solutions, like Splunk, as well as validate and share content risk assessment with other leading security infrastructures, including Palo Alto Networks Wildfire

For more information about Proofpoint Digital Risk Protection, please visit www.proofpoint.com/digital-risk. RSA Conference 2017 attendees please visit Proofpoint booth 3327 in the North Expo: www.proofpoint.com/rsa.

FacebookTweetLinkedIn
Tags: Cyber Securityinformation securitymobile app securityPhishingproofpointsocial enginerring
ShareTweetShare
Previous Post

Imperva Detects and Protects Against Ransomware with the Introduction of SecureSphere V12

Next Post

FireMon previews its Intelligence Security Management (ISM) platform at RSA Conference 2017

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 30, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information