Source |
ProofPoint |
Identifiant |
8573959 |
Date de publication |
2024-09-10 07:46:32 (vue: 2024-09-10 15:17:20) |
Titre |
Cyberark and Proofpoint: approfondir la collaboration pour mieux sécuriser les identités et la navigation sur le Web CyberArk and Proofpoint: Deepening Collaboration to Better Secure Identities and Web Browsing |
Texte |
It\'s an epic challenge to provide comprehensive, affordable and manageable security for today\'s businesses. Why is this the case? And why does it seem to be getting harder? One reason is that the applications, infrastructure, data and people that need to be protected are in a steady state of flux. At the same time, the technical security controls that vendors provide are often still siloed. So, they tend not to play well together. This adds complexity and increases management costs.
And finally, there are cybercriminals-whom we think of as “security control gap seekers.” They are always looking for chinks in the security defenses of their targets. One weak spot in the defense of many companies is their identity security.
Proofpoint and CyberArk recently announced that we\'ve deepened our partnership to help businesses strengthen their identity defenses. In this blog post, we\'ll discuss into how our collaboration and product integrations can help you close your security gaps.
Identities are a top target for threat actors
Increasingly, threat actors target people and their digital identities to get inside targets and get to where they want to go. We see this repeatedly in individual public breaches. It has also been consistently validated on a macro level in Verizon\'s Data Breach Investigation Reports. Credential loss is the No. 1 reported way that attackers get in year after year. That figure hit about 40% in the latest Verizon report.
This problem is made even worse due to the exploding number of digital identities for people, machines and services. Plus, long-used systems for identity management at most organizations, like Active Directory, are littered with identity vulnerabilities and misconfigurations that are just waiting to be exploited.
These are big problems that aren\'t easy to solve. But giving up and taking our security ball home is not an option. Vendors with adjacent and complementary security controls need to work together more closely to deliver better combined solutions for our customers.
That is what Matt Cohen and Sumit Dhawan, the CEOs of CyberArk and Proofpoint, respectively, talked about during today\'s keynote at Proofpoint Protect 2024 NYC. They discussed:
Why it\'s so important to put identity protection at the center of human-centric security rather than rely on traditional endpoint or network-based controls
Why security innovators need to collaborate more closely and connect their security domain expertise to yield better customer outcomes
Which complementary and integrated solutions from Proofpoint and CyberArk are currently available that bring together identity risk discovery, threat protection, privileged account management, and detection and response controls for better identity security
The upcoming integration of Proofpoint threat intelligence and ZenWeb Browser Extension solutions into the CyberArk Secure Browser to detect and block malicious URLs
Planned integrations between the Proofpoint Threat Protection and Identity Protection solutions and CyberArk\'s adaptive controls to deliver smarter and more automated defense-in-depth
Who are Proofpoint and CyberArk?
Proofpoint is a leading cybersecurity company. We protect companies\' greatest assets and biggest target-their people. Our integrated suite of cloud-based solutions help you to:
Stop human-targeted threats
Protect your data
Find and eliminate identity risks proactively
Detect and stop active threats
Make your people more resistant to cyberattacks
CyberArk is the global leader in identity security. It provides the most comprehensive security offering for any identity-human or machine-across business applications, distributed workforces and hybrid cloud environments and throughout the DevOps life cycle. CyberArk does this through its focus on intelligent privilege controls.
As partners, Proofpoint and CyberArk work to:
S |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
119 2024 524 able about access account accounts across actions active actively actors actors adaptive adds adjacent administrators advances affordable after against also always amounts announced any applications apps are aren assets assigns attacked attackers attacks automate automated automatically available backdrop ball based because become been before being best better between beyond big biggest block blog breach breaches brief bring browser browser browsers browsing business businesses but can cannot capability case center centric ceos challenge channels check chinks click close closely cloud cohen collaborate collaborated collaboration combined common communicate companies company complementary complexity comprehensive comprehensively connect consistently contractors control controls controls corporate costs credential credentials current currently customer customers cyberark cyberattacks cybercriminals cybersecurity cyberthreats cycle dangerous data data deepened deepening defend defense defenses deliver delivered delivery deploy depth designed detect detection developing development: devops dhawan digital direct directory discovery discuss discussed: distributed does domain download due during dynamic easy efficient eliminate email employees enables end endpoint endpoints enforcement engineering enhance ensure ensures enterprise environment environments epic establish even exfiltration exist expanded expertise exploding exploit exploited extends extension fake figure finally find flux focus forms from gap gaps get getting giving global granular greatest harder harvest has have help helps hit home how human hybrid identified identifies identify identities identity important improve incident include: including increase increases increasingly individual industry information informs infrastructure initiatives innovators inside insights integrated integration integrations intellectual intelligence intelligent investigation its joint just keynote latest launch leader leading learn level levels life like linkedin littered local login long looking loss machine machines macro made make malicious malware manageable management manipulate many matt media message messaging misconfigurations money monitoring more most need network new not number nyc observed offer offering often one option organizations out outcomes over pages partners partnership past payloads people personal phishing planned platform platforms play plus points policies policy post powered prevention privacy privilege privileged proactively proactively problem problems processes product project proofpoint proofpoint: property protect protected protection protects provide provides providing public put rather reach real reason recently reduce relationships rely remediate repeatedly report reported reports research resistant respectively respond response response responses reveal revealing right risk risks risky safety same secure secured security security see seekers seem seen sensitive services session set sham should significantly siloed sites slack smarter smishing social solution solutions solve sophisticated spot state steady steal stop streamline strengthen suite sumit systems tactics taking talked target targeted targets teamed teams technical technique tend than them these think threat threats threats three through throughout time to: today together top traditional transferring transformation tremendous unauthorized upcoming uploaded url urls urls use used user users users uses validated various vault vaulting vendors verizon vulnerabilities vulnerable waiting want way weak web well what when where which who whom whopping why will work workforces worse year years yield your zenweb zoom “security |
Tags |
Data Breach
Malware
Vulnerability
Threat
Legislation
Cloud
Technical
|
Stories |
|
Move |
|