Source |
ProofPoint |
Identifiant |
8533380 |
Date de publication |
2024-07-09 06:00:54 (vue: 2024-07-09 10:07:27) |
Titre |
Prendre Microsoft à l'école: Pourquoi une université de haut niveau a choisi la défense en profondeur avec Proofpoint Taking Microsoft to School: Why a Top University Chose Defense-in-Depth with Proofpoint |
Texte |
Today more than ever, companies across the country are facing tighter budgets and resource constraints. Universities and schools are no exception. For many, maintaining suboptimal IT tools to save money isn\'t just a matter of prudence-it\'s a necessity. So, why would a top university brave the long and complex educational procurement process just to augment their existing Microsoft email security?
This is what one of our newest customers did. Their story echoes those of thousands of Microsoft customers of all sizes, who in the last year augmented their Microsoft security with Proofpoint to create a defense-in-depth approach. While keeping their identity anonymous, we wanted to share their story and the insights they learned along the way.
Redefining acceptable risks
As part of a larger agreement with Microsoft, the university had spent years using their native email security to protect more than 40,000 mailboxes belonging to students and staff. For much of that time, the university\'s security team dealt with multiple obstacles. Microsoft\'s lack of integrations, its inflexible email controls and its highly manual incident analysis were just a few.
The security team recognized that as attacks grew more serious, they needed more layers of security to capture missed threats. The university was already grappling with increasing amounts of internally directed business email compromise (BEC) messages. These emails came from accounts that were compromised by malicious phishing emails that had been delivered to users\' inboxes.
On top of that, students and faculty were receiving thousands of additional advanced attacks per week. And the security team had to triage all of them manually. They experienced:
Advanced social engineering threats
Multi-layered phishing messages
Multifactor authentication (MFA) bypass attacks
Telephone-oriented attack delivery (TOAD) attacks
Without consistent quarantine controls, in-depth threat intelligence and automated remediation, the team could not contain their expanding attack surface. Their threat visibility and productivity were further undermined by subpar reporting and integrations between other tools, such as SIEM and endpoint protection. When these issues were raised with Microsoft, its support team was slow to respond and follow up.
It was clear that Microsoft could not stop these escalating attacks. So, the university turned to Proofpoint.
Why Augment: Comparing Microsoft and Proofpoint
With many years of Microsoft experience, the university had high expectations of Proofpoint to prove its business value. They wanted to be sure that Proofpoint would be a worthwhile addition to the school\'s existing security program. What follows are three key areas in which Proofpoint improved their security posture during the evaluation period.
Continuous Detection and Superior Efficacy: Proofpoint Wins
Unlike Proofpoint, Microsoft can\'t detect many modern email threats like BEC and advanced phishing attacks. Our data shows that more than 63% of the threats missed by Microsoft-but detected by Proofpoint-are credential phishing.
This is largely due to Microsoft\'s restricted URL-detection capabilities, which limit the sandboxing for links to post-delivery, payload-only threats. This means a user must click on a link to trigger Microsoft\'s dynamic analysis. In the case of our customer, this puts the university and students at significant risk and frequently leads to compromised accounts.
Phishing links are one of the fastest-growing threat tactics. That is why Proofpoint offers continuous detection for URL threats throughout the email lifecycle. Eighty percent of the URL threats we condemn are stopped before users can interact with them.
Our predictive URL analysis and new, industry-first predelivery URL hold and sandboxing make this possible. Together, they greatly reduce the chances that a user might acti |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
000 100 24/7 365 510 650 ability about acceptable accessible accident accounts accuracy accurate across activate actually add added addition additional administrators advanced afford after against agreement alerts all allows alone along already alto amounts analysis analyzes anonymized anonymous approach are areas artificial attack attacked attacks attacks attacks augment augment: augmented authentication automate automated automates automatically average averaged banners bec because becomes been before behavioral being belonging best better between bidirectional billion blind both brave brief browsing budgets business businesses but by: bypass came campaign can capabilities capture captured captures case cases catch caught centric chances chose clear click clicked closes combining comes companies comparing comparison complex comprehensive compromise compromised condemn condemned confirmed consider consistent consistently constraints contain content context continuous controls convinced correlate cost costly could country create creating credential critical cross crowdstrike customer customers cyberattacks cybersecurity daily damage dark data days dealt dedicated defender defense delivered delivery depth designed detect detected detection did didn difference digest directed directly disruptions distribution does doesn done driven due during dynamic easily easy echoes educational effective efficacy efficacy: efficiencies: efficiency efforts eighty email emails employees enables end endpoint engineering engines enhance enough” entire equivalent escalating evaluating evaluation evaluations even ever every evolving example exception executive existing expanding expectations experience experienced: extends extra facing fact faculty fastest features feedback fill financial finite first follow follows forensics fortifying fortune forwarded found fraction free frequently from full further gained gaps generate get get: give global good grappling greatest greatly grew growing habits had have helping high highest highly hold how human hundred identification identity immediate impact impactful important improve improved inbox inboxes incident incidents includes including increase increased increasing indispensable individual industry inflexible information inside insights insights: integrations intelligence intensive intent interact internally investigations investment isn isolated issues its just keeping key know labor lack landscape language large largely larger last latest layered layers leads learn learned leaves left less level lifecycle lightens like limit limited link links lists llms load long loop losses mailboxes maintaining make makes malicious malware manage management manual manually many matter means message messages messages mfa microsoft might missed models modern money more most much multi multifactor multilayered multiple must narrow native necessity need needed networks new newest not now observations obstacles offer offers one only ons opening optimize options oriented other others otherwise over overburdened overhead overseeing overviews palo part party pay payload people people™ per percent period phishing platform poor possible post posture potentially predelivery predictive prevent proactive proactively process procurement productivity program projects proofpoint proofpoint proofpoint: protect protection prove providers provides prudence purpose puts quarantine quickly raised ranging read real receive received receiving recipients recognized redefining reduce reduced reinforce rely relying remaining remediate remediating remediation removal remove report reported reporting reports resource resources respond responsive restricted result results reveals rewriting risk risks role sandboxing save saved saw school school: schools scope seamless secure security security see semantic serious session several share sharing shift shows siem significant sizes slow snowballed social solution solutions spe |
Tags |
Malware
Tool
Threat
Technical
|
Stories |
|
Move |
|