Source |
ProofPoint |
Identifiant |
8573956 |
Date de publication |
2024-09-10 09:46:13 (vue: 2024-09-10 15:17:20) |
Titre |
Présentation du Nexus de preuanpoint: alimenter la sécurité centrée sur l'homme Introducing Proofpoint Nexus: Powering Human-Centric Security |
Texte |
Reducing the risks that people create for their organizations is not a simple task. Every day, users lose their credentials, download and run malware, fall for social engineering attacks and inadvertently put data at risk. What\'s more, users create these risks across the very applications that organizations depend on: email, collaboration tools, cloud apps and the web.
Enter Proofpoint Nexus. With Nexus, security teams now have access to an integrated platform that uses multiple model types trained by trillions of email, web and cloud interactions. We power Nexus with all the right capabilities, from advanced semantic and behavioral AI to threat research-driven detections. This ensures it can solve advanced human-centric cybersecurity challenges so that organizations can protect their people and defend their data.
Nexus delivers insights to help with 4 areas
Proofpoint Nexus transforms massive amounts of raw data into meaningful insights that support our innovative products:
Threat Defense
Information Protection
Security Guide
App & Identity Posture
Proofpoint insights are unmatched.
With the launch of Nexus, Proofpoint is focusing on threat defense. Cybercriminals target every step in the attack chain. And they do this across email, collaboration tools and cloud platforms.
Proofpoint Nexus combines semantic and behavioral AI, machine learning (ML), and curated threat intelligence from researchers to create a multi-layered defense. This helps us identify, stop and analyze evolving threats in real time, like MFA phishing, cloud account takeovers, ransomware and business email compromise (BEC).
Detection technology that drives human-centric security
Today\'s threats are constantly changing. That\'s why a single layer of defense won\'t cut it. Each part of Proofpoint Nexus serves a unique role. It processes vast amounts of data from email, cloud platforms, and collaboration tools to secure all points of communication and interaction. Its modular design covers everything, from stopping threats before they reach users to monitoring risks after delivery.
Here is an overview of its five models.
1: Nexus Language Model (LM) for BEC
This model uses the power of advanced AI language models to combat BEC. It carefully examines email content to detect common elements found in BEC threats, like transactional language or urgency. By recognizing subtle linguistic patterns and behavioral cues, Nexus LM for BEC identifies suspicious emails before they can cause harm.
Highlights
Because it has an LM core, Nexus LM can analyze message intent and context. This enables it to find subtle malicious patterns that might evade traditional detections.
Nexus LM can detect hidden threats within email, collaboration tools and messaging platforms.
Nexus LM does not analyze baseline language characteristics on a per-user basis.
Nexus in action
Nexus LM adds a critical layer of defense against advanced email-based attacks. During a BEC attack, a threat actor might impersonate a CEO and request a wire transfer. While the attacker\'s message lacks traditional phishing markers, Nexus can still interpret its underlying intent. It understands that there\'s an attempt at financial fraud and so it triggers a security alert.
2: Nexus Threat Intelligence (TI)
To stay ahead of threats, you need real-time intelligence that predicts attackers\' tactics. Nexus TI integrates vast amounts of threat data to ensure that Proofpoint solutions are constantly ahead of evolving cyberthreats. This model not only enhances the detection capabilities of all Proofpoint products, but it also provides real-time updates on emerging threats, attacker tactics and system vulnerabilities.
With its focus on advanced threat intelligence, Nexus TI ensures that Proofpoint products can proactively detect and defend against attacks. This system is critical to maintaining a res |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
able access account accounts accuracy across action actionable actions activity actor actors adapts addressing adds advanced after against agile ahead alert alerted alerts all also altered amounts analytics analyze analyzes anomaly any app applications applies approach apps are areas areas assess attachment attachments attack attacker attackers attacks attempt attempts atypical authorities bad based baseline basis bec bec because become before began behavior behavioral behaviors beyond block bolster both business businesses but bypass campaign can capabilities carefully cause caused centric ceo chain challenges change changes changing characteristics cloud codes collaboration combat combines common communication complex compliance compromise compromised computer confidence confidently consider constantly contact content context continuous continuously core covers create credentials critical cues curated cut cybercriminals cybersecurity cyberthreats damage dangerous data day deceptions defend defense defense defenses delivers delivery demo depend design detect detected detection detections detects deviations direct discover documents does done download downloads driven drives during each easily elements email emails embedded emerging employee enable enabled enables engage engineering enhance enhances ensemble ensure ensures enter evade every everything evolves evolving examines example exfiltration external face fall false fast financial find five flags focus focusing fortify found fraud from fuels global graph graphical greater guide harm has have help helps here hidden highlights his hours how human identified identifies identify identity images imitate impersonate inadvertently inappropriate indicate indicators information ingests innovative insider insights institutions integrated integrates intelligence intelligent intent interaction interactions internal interpret introducing involving issues its lacks language large launch layer layered leads learning like linguistic live lose machine maintaining malicious malware management manages manipulated markers marketing massive may meaningful measures message messaging methods mfa might minimizes mitigate model models modern modular monitor monitoring monitors more move multi multiple must need network neutralize neutralizes new nexus nexus nexus: normal not novel now off on: only organization organizations other overview part past patterns people per personalized phishing platform platforms play points policy positives posture posture potential power powerful powering predicts preemptively prevent prevention previously proactive proactively processes products products: proofpoint protect protection protection provide provides providing put range ransomware rapid raw reach real recently recognizing records reducing regulatory reinforces relationship request research researchers resilience resilient respond response result right risk risks risky robust role rule run scalable scenarios seamlessly secure security security see semantic serves short simple single sites slip social solutions solve spoofed spots stay step stop stopping strengthen subtle suddenly supervised support suspicious system systems tactics takeovers target targeted task tax team teams techniques technology text that them then there these threat threats through tied time today together tomorrow too tools traditional traffic trained transactional transfer transforms trigger triggers trillions turn type types underlying understands unique unknown unmatched unsupervised unusual updates urgency urls use user users uses using usual vast vectors very violations vision visual visually volumes vulnerabilities web websites what when who why wide wire within won work world your yourself |
Tags |
Ransomware
Malware
Tool
Vulnerability
Threat
Cloud
|
Stories |
|
Move |
|