One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8644314
Date de publication 2025-01-29 03:03:50 (vue: 2025-01-29 14:08:06)
Titre Proofpoint Partners with Intel to Deliver Leading-Edge AI-Powered Information Protection
Texte Digital transformation has produced a tidal wave of data in recent years. At the same time, intellectual property and sensitive business information has become more vulnerable due to work-from-home policies as well as the proliferation of devices. SecOps and IT departments struggle to identify critical data on managed endpoints in an efficient and scalable way. Not only must they classify various types of intellectual property (IP), but they also need to understand and anticipate user intent across many data exfiltration scenarios. With Proofpoint, organizations can be sure their data stays safe. We recently partnered with Intel to deliver advanced information protection tools that work faster and more efficiently than ever. Here\'s a rundown of some of the ways that Proofpoint is using Intel\'s latest technology to accelerate some of our most advanced data loss prevention (DLP) use cases. New Intel processors are a game changer Launched at CES 2025, Intel\'s AI PCs are now running Core Ultra 200V series processors. These processors feature an integrated neural processing unit (NPU) for AI acceleration. As a result, they are set to revolutionize the industry with dramatic performance gains and enhanced efficiency. Proofpoint\'s suite of cybersecurity tools leverages AI PCs for user behavior analysis, data classification and threat contextualization. With AI PCs powered by Intel Core Ultra processors, Proofpoint Information Protection can offload key AI and security workloads to the NPU on the endpoint. This enables the solution to run more efficiently, manage complexity better and scale to whatever you need. Inline, live classification To protect sensitive data DLP systems need to know what data needs to be protected. That\'s why classifying data is so important. The challenge is that businesses create a massive amount of data every day which is spread across different systems. Proofpoint Information Protection features inline, live data classification. This enables it to automatically tag data as it moves through business networks, ensuring that DLP systems know which data to protect. We use large language models (LLMs) to analyze documents that are difficult to classify, such as intellectual property, that don\'t fit into obvious patterns. We also give you the tools so that you can gain visibility into the classification of the documents. Then, you can decide in real time whether to block their exfiltration. Classifying data in real time requires considerable computing power. With Intel AI PCs, Proofpoint DLP can now offload most of the LLM workloads to the endpoint. Intel\'s advanced processors enable Proofpoint to scan large amounts of data and classify it faster. GenAI protection with user intent controls As a productivity tool, generative AI (GenAI) opens the door to insider risks by careless, compromised or malicious users.  Careless insiders. These users may input sensitive data-like customer data, proprietary algorithms or internal strategies-into GenAI tools. Or they may use them to create content that does not align with a company\'s legal or regulatory standards, like documents with discriminatory language or images with inappropriate visuals. Compromised insiders. Access to these tools can be compromised by threat actors. Attackers use this access to extract, generate or share sensitive data with external parties.   Malicious insiders. Some insiders actively want to cause harm. So, they might intentionally leak sensitive data into public GenAI tools. Or, if they have access to proprietary models or datasets, they might use these tools to create competing products. They could also use GenAI to create or alter records to make it difficult for auditors to identify non-compliance.   To mitigate these risks, companies need to be able to monitor AI usage and data access. Proofpoint has developed GenAI protection with user intent controls to help organizations address these risks. Proofpoint uses LLMs to monitor all the prompts that us
Notes ★★★
Envoyé Oui
Condensat  generative  some  these 200v 2025 able about accelerate acceleration access across actions actively actors address advanced against algorithms align aligns all also alter amount amounts analysis analyze anticipate are assets assures attackers auditors automatically based because become behavior better block breaches business businesses but can careless cases categorization cause ces chains challenge changer chips classification classify classifying companies company competing complexity compliance compromised computing considerable consumption content contextualization controls core could create critical customer cybersecurity data datasets day decide deliver departments detect developed device devices different difficult digital discriminatory dlp documents does don door dramatic due edge efficiency efficient efficiently element enable enables endpoint endpoints enhanced ensures ensuring even ever every everything exfiltration external extract faster feature features fit flexible fortify from gain gains game genai genai tools generate generated give goals harm has have help helping helps here hogging home human identify images important inappropriate industry information inline input insider insiders insight integrated intel intellectual intelligent intent intentionally internal keep keeping kept key know language large latest launched leading leak learn legal leverages like link little live llm llms loss make malicious manage managed many massive may memory might mistakes mitigate models monitor monitor ai usage more most moves must need needs networks neural new non not now npu npus obvious offload only opens organizations parties partnered partners patterns pcs performance place policies power powered prevent prevention privacy processing processors produced productivity products proliferation prompts proofpoint property proprietary protect protected protection public real recent recently records reduces regulatory requires resource result revolutionize right risk risks run rundown running safe same scalable scale scan scenarios secops security sensitive series set share short simple sizes solution some spread standards stays strategies struggle submit such suite sure systems tag takes technology than that them then there these threat through tidal time tool tools transformation types ultra understand unit use user users uses using various very video visibility visuals vulnerable want watch wave way ways weakest websites well what whatever whether which why work workloads write years your     access  they
Tags Tool Threat
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: