One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8617920
Date de publication 2024-11-26 14:46:13 (vue: 2024-11-26 18:08:09)
Titre House Call: Why the World\\'s Largest Home Services Company Chose Proofpoint Over Abnormal Security
Texte Finding a good plumber, electrician or appliance repairman is like finding a needle in a haystack. Once you find a good one, though, they\'re worth keeping on speed dial. This is where our customer comes into play. They provide a network of reliable, locally operated repair franchises that homeowners can access with an app, which can be used to request and schedule appointments. The business operates across the United States, Canada and Europe.   In this blog, we share why the world\'s largest home services company selected Proofpoint over Abnormal Security. While this company is a Proofpoint customer, they have asked for anonymity so that they could share their story and experiences openly.   Rapid growth fuels new security challenges   During the last five years, the company has experienced significant growth. Today it has more than 30 brands and 5,500 franchises globally with sales topping $4 billion last year. Unfortunately, all this success comes with new security challenges.   Namely, as a business that uses a franchise model it has a decentralized structure, which opens it up to multiple attack vectors. This situation is made worse by the franchises themselves, which typically lack cybersecurity expertise, resources and training. As a result, our customer struggled to protect its headquarters and its global franchises from email-borne threats.   Here are just a few cybersecurity threats that they faced daily:    Advanced phishing. In these highly sophisticated attacks, bad actors try to trick people into handing over their login credentials, financial information or personal data. Typical examples include spear phishing and business email compromise (BEC).   Malware attacks. Malware is malicious software or code that bad actors use to disrupt, damage or access networks, systems and devices. Examples include ransomware, rootkits and botnets.   Social engineering. People can be easy to manipulate. With these attacks bad actors use emotion (usually fear and urgency) to trick people into performing an action. This might be sending the attacker money or handing over their sensitive customer data or credentials. Pre-texting, vishing and impersonation are examples.    Building a defense-in-depth foundation   Before becoming a Proofpoint customer, the company relied on Microsoft 365 E3 native email security to stop threats. This was problematic. Microsoft E3 is good at identifying commoditized threats, which are launched by unskilled bad actors using prepackaged cybercrime tools. However, it struggles to identify advanced email threats that are on the rise, like malicious URLs, payload-less phishing and BEC attacks.  The security and IT teams understood that something needed to be done and agreed that a defense-in-depth approach was needed to fortify the company\'s defenses. So, they decided to take a test drive of Abnormal Security and Proofpoint, doing a proof-of-concept (POC) of each to see which one worked best.   There were several key requirements for these POCs:  Effectiveness at stopping threats pre-delivery  Visibility and insights into threats   Platform scalability   Pre-delivery efficacy: Proofpoint wins    Both the security and IT teams were not confident that Microsoft could stop email threats pre-delivery. That\'s why enhancing this capability was a POC priority. Unlike Proofpoint, Abnormal does not offer any pre-delivery detection or analysis-it has a 0% pre-delivery detection efficacy rate.   Compare that to Proofpoint. Our solution has a 99.99% pre-delivery detection efficacy rate and identifies and stops threats before they are delivered to user\'s inboxes. That means users can\'t engage with threats at all, which reduces the downstream burden on security teams.    Proofpoint uses a multilayered detection stack to accurately identify the widest array of both known and emerging threats. Our br
Notes ★★
Envoyé Oui
Condensat  additionally 365 500 ability abnormal about access accurate accurately achieve across action actor actors adaptive advance advanced advantages affected after against agreed ai/ml all alone also always amounts analysis analytics analyze anonymity any app appeal appeared appliance apply appointments approach are array asked attached attachment attachments attack attacked attacker attacks authentication automated awareness bad based basic bec became because becoming before behavioral being besides best better billion blind blog borne both botnets brands brief broad browser building built burden business businesses but call: came can canada cannot capabilities capability centric challenges challenges   changing choose chose clear click clicked code codes combining comes commoditized company compare compared comparison complement complexities comprehensive compromise concept concluded conclusions condemned confident consider context continually continued continuous controls convinced cost costs could couldn credentials customer cybercrime cybersecurity daily:    damage dangerous data decentralized decided decision    deeper defeat defense defenses delivered delivery delivery  depends depth detailed detect detecting detection devices dial did didn digest disrupt does doesn doing done download downstream drive driven drives during each early easy economical effective effectiveness efficacy efficacy: efficient efforts electrician email emails emerging emotion end engage engine engineering enhanced enhancing ensure ensured ensures entire europe ever evolution: evolving example examples executive exist existing experience experienced experiences expertise explain extra faced factors fades falling false fear fewer files financial find finding first five focused fortify forward found foundation   franchise franchises from fuels get gives global globally going good growth had handing has have haystack headquarters helped here hidden high highly hit hold home homeowners house how however human identifies identify identifying impersonation impressed inboxes include includes including incoming incredibly ineffective information informed insights insights: intelligence intent isolation its job jumps just keep keeping key knowledge known lack landscape language large largest last launched learn learning less level license lifecycle like limitations limited list locally login looking machine made maintenance major malicious malware manipulate mark match means message messages microsoft might mind model models modern money more moved multilayered multiple namely native need needed needle network networks new next nexus not noted number observed offenders offer once one only openly opens operated operates operations opportunities organizations organization” or telemetry other over overall overviews overwhelming ownership payload payloads people people™ per performing personal phishing platform play plumber plus poc pocs:  point points poor positives post practices pre prepackaged prevent priority privileges proactively problematic proof proofpoint proofpoint: protect protection provide provided provides providing purchase purchased put quickly range ransomware rapid rate receive reduces reference reliable relied remediation removed repair repairman repeat request required requirements research resources result reveal richer right rise risk risks robust rootkits safe said sales sandbox sandboxing scalability scalability   scalability: scale schedule secure security security   see selected semantic sending sense sensitive services set several share shows significant simple simply situation social software solely solution some something soon sophisticated spam spear specific speed spot stack starts states stay step stop stopping stops story strategy structure struggled struggles success such superior supplement support surface suspected suspicious system systems tactics take targeted targeting teams technique techniques technology test texting than thank
Tags Ransomware Spam Malware Tool Threat
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: