Source |
ProofPoint |
Identifiant |
8643446 |
Date de publication |
2025-01-27 02:08:30 (vue: 2025-01-27 19:08:30) |
Titre |
A Chemical Company Had a Microsoft Data Security Problem-Here\\'s How Proofpoint Fixed It |
Texte |
This blog post is part of a three-part series that explores why companies are choosing Proofpoint Data Security solutions. It focuses on the unique challenges of various industries when it comes to keeping data safe.
It\'s vital for organizations to protect their intellectual property. This is especially true in industries where innovation and proprietary knowledge are a competitive advantage. For one multinational chemical company that was preparing to split into three independent businesses, it became a critical mission to gain control of its sensitive data.
This blog post explores how this company overcame its Microsoft data security challenges and strengthened its data protection strategy with Proofpoint.
The challenge: managing data amid a complex spin-off
As this Fortune 500 company planned to split off into three publicly traded entities, the CISO faced the pressing task of mitigating insider data loss risks. Because it already had a Microsoft E5 license, the company initially used Microsoft Purview for data loss prevention (DLP). After all, Purview was included with their license at no extra cost. So why invest in another DLP tool?
But within the first six months the CISO\'s team found that Purview had numerous, critical shortcomings. They included:
Operational inefficiencies. To analyze data, Purview needed to have predefined written policies-a rigidity that made it labor-intensive.
Inadequate alerting. Purview\'s alert options were not flexible. This was particularly true when it came to detecting insider threats. For the company to get customized alerts, it needed to integrate Purview with Microsoft Sentinel, which carried significant operational costs.
Disjointed platforms. To manage insider data loss, its team had to navigate multiple Microsoft consoles. This complicated the team\'s workflows and wasted valuable time.
Fallback to manual processes. Frustrated by these limitations, the team resorted to building a custom tool to extract data from Purview and using Excel spreadsheets to manage insider threats-a far cry from an optimal solution.
In the words of the company\'s cybersecurity leader, “If I use Microsoft as the primary platform for data protection, I\'m putting my company at risk for data loss.”
Immediate results with Proofpoint
By selecting Proofpoint Enterprise Data Loss Prevention (DLP), the company achieved immediate, tangible improvements. During the proof of concept (POC), Proofpoint revealed critical vulnerabilities that Microsoft missed, such as:
Unprotected Microsoft SharePoint Online. Documents were accessible to anyone with a link
Unauthorized data sharing. Employees were found sharing sensitive data via personal email accounts.
Undetected account takeovers. The company had no visibility into account takeovers.
Once Proofpoint was fully deployed, the results were striking:
Dramatic reduction in data loss. The company reduced data loss from 2,000 GB (or 200,000 files) per month to blocking 4,000 high-risk events monthly.
Streamlined operations. Our unified console significantly enhanced operational efficiency. Not only did Proofpoint make it easier to triage alerts across cloud, endpoint and email systems, but our console also sped up investigations and responses.
Simplified exclusion management. Writing exclusions in Purview took 30 minutes and could take up to a day to deploy. With Proofpoint, exclusions were written in 10 minutes and rolled out to users within 20 minutes.
Accurate alerting and investigation. Proofpoint delivered zero false positives, 100% accuracy and investigations that were seamless-all within a single dashboard.
Why Proofpoint: efficiency, time to value and visibility
Ultimately, the company chose to complement Purview with Proofpoint in their environment. The reasons for its decision came down to three factors.
1. Operational efficiency
Our human-centric approach provides deep insights into user intent as well as patterns around data a |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
what 000 100 200 500 able access accessible account accounts accuracy accurate accurately achieved across advantage after agent alert alerting alerts all already also although always amid analyst analysts analyze another any anyone applications approach are around as: assisted based became because been blocking blog box building businesses but came can capabilities carried case cases centric challenge: challenges chemical choosing chose ciso clear cloud comes companies company compare competitive complement complex complicated complimentary concept configurations console consoles content context control cost costs could creation critical cry custom customized cybersecurity dashboard dashboards data day decision deep delivered demystifying deploy deployed deploying design designed detected detecting did disjointed dlp documents doesn down download dramatic dual during easier effectively efficiency efficiency email employees enables end endpoint endpoints enhanced ensure enterprise entities environment especially events excel exclusion exclusions explores extra extract faced factors fallback false far files find first fixed flexible focuses fortune found free from frustrated fully gain gartner® get global good had has have helped her here high how human immediate improve improvements inadequate incidents included included: independent industries inefficiencies information initially innovation insider insights integrate integrated integrations intellectual intensive intent interpret invest investigation investigations investing involvement irm isn itm its keeping key knowledge labor leader learn led level license licensing limitations link loss made make manage management managing manual match mean meet microsoft minimized minutes missed mission mitigate mitigating mitigation money month monthly months more multinational multiple navigate needed needs negatives not numerous off off offered once one online only operational operations optimal options organizations other out over overcame part particularly patterns per personal planned platform platforms poc point policies policy positive positives post predefined preparing pressing prevention primary problem process processes program proof proofpoint proofpoint proofpoint: property proprietary protect protection provide provides publicly purpose purview putting quickly read realized really reasons recordings reduced reduction report requires resorted responses result results revealed right rigidity risk risks risky rolled rules safe said save saves screen seamless security selecting sensitive sentinel separate series series: services sharepoint sharing she shortcomings showing significant significantly simplified simplifies simply single sink six solution solutions some specific sped spending spin split spreadsheets straightforward strategy streamlined strengthened striking: struggling such systems take takeovers tangible task team telemetry them these thing threat threats three time took tool trackable traded triage true ultimately unable unauthorized undetected unified unifies unique unprotected use used user users using valuable value value various view visibility visibility vital vulnerabilities wasted well what when where which why within words workflows writing written zero “free “free” “if “proofpoint ” |
Tags |
Tool
Vulnerability
Threat
Cloud
|
Stories |
|
Move |
|