One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8566849
Date de publication 2024-08-30 12:42:42 (vue: 2024-08-30 13:17:40)
Titre Comparaison des points de preuve et une sécurité anormale: le fabricant de nourriture n'en comprend qu'une seule dans leur recette de succès
Comparing Proofpoint and Abnormal Security: Food Manufacturer Includes Only One in their Recipe for Success
Texte As modern global supply chains expand, food processors, manufacturers and agriculture service providers are faced with an impossible security task. Not only are they responsible for feeding families worldwide, but they must also be hyper-vigilant about cyber threats that increasingly target them. And they must do all this despite shrinking budgets and higher constraints on their resources.   For these reasons, the success of their security strategy often depends on their ability to:   Continuously detect threats that target their people  Ease the growing burden on their IT teams  Decrease their reliance on ineffective native security tools   We learned this from one of our customers in the food manufacturing industry who recently compared Proofpoint Threat Protection to Abnormal Security\'s point product. We have anonymized their story in order to share their experiences and lessons learned. The following blog offers insights into how the food industry can build a better people-centric defense.  A slow descent into message madness  Spurred by progressively deceptive attacks from threat actors, the manufacturer had seen a gradual decline in the threat efficacy of its email security built on Microsoft. Microsoft\'s native security has historically struggled against the types of advanced email attacks the customer observed.   The security team saw an influx of employee-reported malicious messages which primarily used impersonation and social engineering techniques. These attacks included:  Invoicing fraud and CEO spoofing through business email compromise (BEC)    Malware from compromised supplier accounts  Telephone-oriented attack delivery (TOAD)  The backlog in their abuse mailbox that contained user-reported emails grew by the day. The team needed to manually investigate and remediate each of these threats while trying to control the inflow of new ones. This put their already stretched thin security team under unsustainable pressure. The company worried about jeopardizing their place in the international food chain and their mission to feed communities.  After a near miss with an email containing ransomware, the manufacturer decided it was time for a change. Enter Proofpoint and Abnormal Security.  Comparing Proofpoint and Abnormal side-by-side  The food manufacturer ran concurrent evaluations with Proofpoint and Abnormal Security to find the best solution to protect their more than 7,000 employees, countless customers, suppliers and third-party partners. This comparison process revealed the differences between the two offerings.   Each company has a different approach. Proofpoint provides a comprehensive platform. It detects threats continuously to protect people throughout the entire email delivery life cycle. In contrast, Abnormal focuses on limited post-delivery detection and remediation.  The team began its selection process with very clear decision criteria. It was determined to find the right partner to augment the company\'s native Microsoft email security and defend its 100-year-old heritage brand. Below are the key areas where the customer compared Proofpoint and Abnormal.   End-to-end detection capabilities-Proofpoint wins  Abnormal\'s restrictive structure only allows malicious messages to be detected after they are delivered to a user\'s inbox. It has a 0% pre-delivery efficacy rate, meaning all email attacks must be retracted from users\' inboxes. This puts users at undue risk. Proofpoint threat research found that 1-in-7 clicks on malicious links occur within 60 seconds of a message\'s delivery. And one-third of replies to BEC messages happen in less than five minutes.   Proofpoint Threat Research results.   The customer recalled that Abnormal relies too heavily on behavioral AI and lacks sandboxing capabilities. They shared concerns that this would expose their company to never-before-seen links and attachments. &nbs
Notes ★★
Envoyé Oui
Condensat 000 100 2023 ability abnormal about abuse access according accounts  accuracy accuracy  accurately across act activated activity actors adaptive additional administrative administrators advanced advancements affected after against agreed agriculture all allows alone already also analysis analysts analytics analyze anchored annualizing annually anonymized anyone api apis approach architecture are areas arguably attachments attack attacker attackers attacks attacks  augment automated automatic average averaged backlog bad base basic beaten bec because been before began behavioral being below benchmarks benefits benign best better between blog both brand brief browsing budgets build built burden business but call can capabilities capture captured catch catches centric ceo chain chains challenged change choice circle claims clear click clicks closely cohesive combined comes communities companies company compared comparing comparison complement complete completed comprehensive compromise compromised concentration concerns concluded conclusion concurrent conduct consistently consoles constraints consuming contained containing context continued continues continuously contrast control controls cost could countless creates credential criteria customer customers cyber cyberattacks cycle daily dangerous data day deceptive decided decision decline decrease defend defense define delivered delivery dependance dependency depending depends depth descent desire despite detect detected detection detects determined did differences different directly disrupted disruptions dominates don door downstream driven due during each ease easier easy effective effectiveness efficacy efficiency efforts eliminates else email emails embedded emerging employee employees end engine engineering enter entire environments equivalent evaluate evaluation evaluations every example excessively existing expand experience experiences exploit expose faced fact failsafe failure fall false families faster feasible features feed feeding find first five focus focuses following food fortune forward found fraud frequently from front frustrating full get given global gradual grew growing had half handle handled happen has have hazardous heavily helps heritage hesitant higher highly historically hold how human hundreds hyper identified identifies identify impersonation impossible improvements improving inbox inboxes included:  includes increase increasingly independent industry ineffective inflow influx informs innovate insight insights integrate intelligence intent international introduced introduces investigate investment invoicing involve isolated its jeopardizing key kinds lacks layers leader learn learned learning leaving led less lessen lessons level license life lifecycle like limited links long machine made madness  mailbox maintenance making malicious malware manage management manager manually manufacturer manufacturers manufacturing many marked may mean meaning means measures message messages microsoft microsoft  microsoft   might million minutes miss missed misses missing mission modern money more most multilayered multiple must native natural nature near need needed negatives never new newest next not noted number observed obvious occur occurs offer offerings offers often old one ones only operational operations opinion order organization oriented other out outage outlined overall overhead overlook ownership painful partner partners party past patchwork payloads people people  per percent phishing place platform point points positive positives post pre predelivery predictive pressure primarily process processors product productivity products progressively proofpoint proofpoint: protect protected protecting protection providers provides put puts question ran ransomware rate reaching reasons recalled recently recipe recognized reduce reduces reducing release relentless reliance relies rely relying remediate remediating remediation removal remove replies report reported requests required research resources responsible r
Tags Ransomware Spam Malware Tool Threat
Stories Heritage
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: