One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8573958
Date de publication 2024-09-10 08:09:31 (vue: 2024-09-10 15:17:20)
Titre Protéger 2024: Proofpoint établit une nouvelle norme pour la sécurité centrée sur l'homme
Protect 2024: Proofpoint Sets New Standard for Human-Centric Security
Texte Threat actors no longer rely on exploiting network ports, instead they target humans. Data doesn\'t walk out by itself, it\'s people who leak it. Identities and apps are everywhere and humans create them. All this makes human-centric security essential and critical. Unlike networks and hosts, you can\'t really lock down people. People work in different ways, with different tools, and in different places. They rely on email, collaboration tools, and an ever-growing array of applications and cloud services. On top of this, threat actors are continuously developing new techniques to target and exploit human vulnerabilities. Proofpoint Human-Centric Security Platform In my keynote at our annual Protect conference today, I unveiled our expanded human-centric security platform, designed to empower enterprises to defend against every type of human-centric threat, in every way a user may encounter it. Our human-centric security platform delivers comprehensive solutions to four key areas that every organization must address. At Protect, we introduced new offerings and major enhancements to each of these four solution areas. Stopping sophisticated targeted threats Earlier this year, I talked about our approach to detecting sophisticated targeted threats via our ensemble of models, called Proofpoint Nexus. And we launched our inline Nexus LM (Language Model) that can detect the intent behind threat actors issuing a BEC attack. We have had tremendous success with our customers adopting this new model. At Protect, we launched Nexus LM for Phishing which will make the best threat protection solution in the market even better. In addition, we announced a new offering Proofpoint Collab Protection, expanding our threat protection from email to all forms of collaboration including SMS, WhatsApp, social media and more. Our customers can easily extend Proofpoint\'s email protection to protecting the entire collaboration landscape leveraging the benefit of our Nexus models for defending against most comprehensive threats. Preventing data loss and containing insider threat proactively Our DLP Transform and Insider Threat products have had tremendous adoption by customers; a majority of Fortune 100 customers are now using our information protection solution and our endpoint DLP protection has grown over 75% year-over-year. All of this is due to our human-centric approach that takes into account users\' activity and intent while protecting the information from leaking across all channels that users may be using. At Protect, we showcased exciting new capability of intent-based information protection for GenAI tools. This new capability helps organizations enable GenAI use while protecting both structured and unstructured organizational data from being shared. It educates end users, and guides behavior to align with acceptable use of AI within our customer environments.   Proofpoint\'s new Digital Communications Governance offering provides unified security and compliance risk management that helps organizations centralize all communications content. It enforces proactive, adaptive data controls and streamlines e-discovery and supervision, leveraging Proofpoint\'s AI engine to create contextualized insights covering every channel and facet of communications data. This maximizes the efficacy of review by 84% or more when compared to alternatives. Reacting to Account Takeover and Reversing Posture Drift The ever-growing universe of cloud applications continues to expand the risk surface to an organization. This exposure applies not only to corporate approved applications like M365, but also to unapproved apps such as cloud file sharing services that employees may have signed up for using corporate credentials.    To help organizations counter account takeover, last year we introduced Proofpoint ATO Protection. Built on top of Proofpoint\'s Nexus TI (Threat Intelligence) and Nexus RG (Relationship Graph), security teams can use Proofpoint ATO Protection to detect compromised cloud accounts in minutes, and immedi
Notes ★★★
Envoyé Oui
Condensat 100 2024: ability about acceptable access account accounts across act action activity actor actors acts adaptive addition address addresses adopt adopting adoption against agent alerts align aligned all also alternatives analysis angel” announced annual anomalous anxiety any apis app application applications applies apply approach approved apps architecture are areas array assistance ato attack automate automation awareness based baseline bec because been behavior behaviors behind being below benefit best better beyond big bit bold both bringing broad broadest browser browsers build built but called can capability centralize centric champions channel channel; channels choice click cloud coaches collab collaboration come common communications compared complete completely compliance comprehensive compromised computer conference configs connect connections containing content context contextualized continues continuing continuously control controls core corporate cost counter covering create credentials critical customer customers customers; cyber data defend defending deliver delivers described designed desired desktop detect detecting develop developing devices different digital discovery dlp doesn done down drift driven drowning due each earlier easier easily ecosystem educates education effective efficacy email employees empower empowers enable enables enabling encounter end endpoint enforces enforcing engine enhancements ensemble ensure enterprises entire entrust environments envision essential established even ever every everyone everywhere excited exciting expand expanded expanding expansion exploit exploiting exposure extend extension faced facet feeding file forms fortune forward four from fully further future gateway gather genai getting give gives giving goal governance graph graphs grouped growing grown guide guides had has have help helps hosts human humans identities identity idp immediately impossible improving including individual information inline insider insights instead integrated intelligence intelligent intent interventions introduced involved island issuing itself key keynote know knowledge landscape language last launched leadership leading leak leaking lean learning leverage leveraging light like lock longer look loss lot lower m365 major majority make makes management manner market maximizes may means media methods mfa minutes mission: mobile mode model models modern modules modules/apps more most move must need network networks never new nexus not now nudge nudges nudging offer offering offerings offers often only operate operational organization organizational organizations out outlook over overall part partner passive paths people personalized phishing pick place places platform please plugins plugs point points policies ports possible posture powerful powers practices preventing principles privilege proactive proactively product products professionals profile programs proofpoint protect protecting protection proudly provide provides providing quickly range reacting real realized really receive reduce relationship relevant rely remediate required responsibility responsible reusing reverses reversing review right risk risks risky role saas safeguard sase scale sea seamless securing security serenity seriously services set sets shared sharing shoulder showcased signed simple single site sms social solution solutions sophisticated specific stack standard step stopping streamlines structured struggle success such supervision surface symmetric take taken takeover takes talked target targeted teams techniques technologies technologies: technology that them these threat threats through time today together tools top traditional trained training transform tremendous trust type unapproved uncertainty understanding unified unique universe unlike unsanctioned unstructured unveiled upon upon; use user users uses using variability variety very vision visit vulnerabilities walk way ways web weight what whatsapp when which who wide will within work works world xdr year years your zen zenconnectors zenguide zen
Tags Tool Vulnerability Threat Mobile Cloud Conference
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: