Proofpoint Email Protection Presentation
Proofpoint Email Protection Presentation
Endpoint
Network
19%
Email 8%
93%
61% all breaches are attacks
Web targeting people,
12% 96% via email
10
Who represents risk to your organization?
PROBABILITY
© 2021 Proofpoint. All rights reserved. | Proofpoint, Inc. – Confidential and Proprietary 12
Email Protection
13
Proofpoint Advanced Threat Protection
SaaS, VM (Esxi), HW
Targeted Attack
Detect Protection (TAP)
Detects email with suspicious
URLs and attachments.
Provides forensic details and
visibility into attacks
16
Unique visibility drives efficacy, powers ML/AI models
8,000+ ENTERPRISE CUSTOMERS 156,000+ SMB CUSTOMERS 120+ WORLD’S LARGEST ISPS
© 2022 Proofpoint. All rights reserved. | Proofpoint, Inc. – Confidential and Proprietary 17
Proofpoint Detection Ensemble New Capability (2018) New Capability (2019) New Capability (2020-21)
Allow / Deliver
ACTION the Good
Block / Remediate the Bad
© 2022 Proofpoint. All rights reserved. | Proofpoint, Inc. – Confidential and Proprietary 18
Supernova- New Threat Detection Platform
Powering Advanced BEC Defense
Supernova
Stateful/Behavioral Analytics
Threat Classification/Labeling 23
Advanced BEC Defense powered by Supernova
Combining world class threat intelligence with over 20 years of ML experience
Sender/ Recipient
Relationship
Basic
Header Analysis
Sender In-depth
Behavioral Header Analysis
Insights
Sender
Reputation
Invoice & Supplier Internal Account Invoice & Supplier Internal Account
Payroll Fraud Compromise Compromise Payroll Fraud Compromise Compromise
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 25
Smart Search
Swiftly trace where the emails come from and go to
27
Granular Policy Control
Flexibility to create any security and mail routing policies
29
Unified Outlook Add-ins
Enhance both admin and end user experience
30
Email Warning Tag
• Reduce risk of potential compromise
by enabling end-users to make more
informed decisions
Visibility to Global Advanced Machine Learning Granular Filtering, Custom Rich Reporting, Visualization
Threat Campaigns at with Content, Context, Configuration and Control and Ecosystem Integration
F1000 Companies Behavior Analysis
Targeted Attack Protection
Industry’s most effective detection
Multi-Platform
Malware Sandboxes TAP Ops Analyst-Assisted Customer-Initiated
Execution Research (PTIS)
NON-MALWARE
SaaS TAP Ops Threat Ops
Classifiers Credential Phish
(Phishing, BEC) Sandbox
35
TAP Attachment Defense architecture
36
Layered Detection for the Modern Threat Landscape
Reputation Analysis
Ecosystem Partnerships
ML Feedback Loop
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 37
TAP URL Defense Architecture
Clicked
Reputation
Proofpoint
Protection
URI Blacklist
Server (PPS)
Threat
Unknown/Clean Integrated threat Unknown/Clean
Threat
Check reputation. intelligence
Quarantine known Redirector
threats
Sandbox (urldefense.
proofpoint.com)
URL Defense If Unknown If Unknown
Module
Malware Behavior Code Protocol
Predictive
Rewrite URLs Defense
Threat Graph
Reputation Analysis
Browser Isolation
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 39
The Attacker’s POV
Executives
Branch Managers
VP of IT
Mortgage Processing
Administrative
Assistant
Proofpoint Attack Index
Attack Index
Threat Severity
Understand the risk your users
face & prioritize the most effective
Actor Sophistication compensating controls
Attack Targeting
Type of Attack
Volume of Attacks • 0-1000 score per threat sent
Receive reporting & metrics
on the threats your users
• Weighted composite score face
People-Centric Visibility Drives Better Protection
VAP Scores
VULNERABILITY ATTACK PRIVILEGE
MEDIUM HIGH HIGH
[email protected]
Phish Simulation
Max threat: 850 VIP: yes
test: no action
(top 10%) Sensitive data:
Risky device /
30 day total: 9,143 yes, CASB DLP
network use: yes
(top 5%) AD Score: High
MFA: inconsistent
Discern Broad Campaigns Identify Targeted, Impacted Inspect All Attachments, Detailed Forensics Insights
and Targeted Attacks and At-Risk Users URLs at Delivery and at Click and Reporting
Solving your phishing and remediation problems
Typical Results: a month of analyzing O365 email at a large global consulting firm customer
Proofpoint Protection Gateway Targeted Attack Protection Organization
Inbound Email
Reputation Content Attachment URL Mail Store
Threat Response
Auto-Pull
80%
Fewer incidents
Known Threats Targeted Threats for SOC
• Automatically quarantine
and remediate malicious
messages from end-
user's inbox
© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 48
Agility to keep up with the threat landscape FEATURE RELEASE
PRODUCT INTEGRATIONS
ECOSYSTEM INTEGRATION
Palo Alto
URL Defense Networks Impostor Security VMware
and Visibility Emerging Partnership Classifier Email Carbon Black Nexus People
Awareness VAP Threat Guided
(Q2 2012)
Threats (Q1 2016) (Q2 2016) Warning Partnership Risk Explorer
Attachment (Q1 2018) Visibility Training
(Q1 2015) (Q4 2018) Tags (Q1 2021) (Q2 2021)
Defense CASB Domain (Q2 2020) (Q4 2020)
(Q1 2014) CyberArk (Q4 2016)
Discover
SOAR Partnership CLEAR CrowdStrike Supplier Risk
(Q3 2017)
(Q2 2014) (Q2 2016) (Q3 2018) Partnership SailPoint Explorer
Browser (Q3 2019) Partnership (Q4 2020)
Advanced BEC
Inbound DMARC and Email Okta (Q3 2020) Defense
DMARC Authentication
(Q1 2016) (Q3 2016)
Isolation Partnership Verified Isolation (Q2 2021)
(Q4 2017) (Q3 2018)
DMARC for VAPs
(Q2 2020) (Q4 2020)
© 2022 Proofpoint. All rights reserved. | Proofpoint, Inc. – Confidential and Proprietary 49
Email Security Feature Comparison
Microsoft Proofpoint
Features / Tools / Products
Connection Filter √ √
Attachment Reputation √ √
✓ Threat & Campaign
Attachment Sandboxing √ √ Correlation
URL Rewrite √ √
Advanced Comprehensive URL Sandboxing √ ✓ Forensics / IOC Details
Threats
Manual Message Remediation √ √
✓ Threat Attacker Analytics
Automatic Message Remediation (URLs & Attachment) √ √
Gateway
Inbo Click
x
Protection + TAP TAP + TRAP TAP Isolation
TAP URL Defense + Isolation = TAP URL Isolation
Redirector
1. Check Isolation Policy
2. Make Decision to
Clicked Isolate (Risky URL or
VAP)
Proofpoint
Protection
Server (PPS) Redirect
Check reputation
Quarantine known
threats
URL Defense
Module
Clicked
Isolation Environment
All Users URL Defense (Click-time) + Risky URL’s
Isolation Policy
Clicked
Isolation Environment
URL Defense (Click-time) +
VAP
Isolation Policy All URL’s
Threat Response
The Need for an Incident Response Solution is Growing
Source: Garner Market Guide for Security Orchestration, Automation, and Response Solutions
56
Top Incident Response Use Cases
Updates to Firewalls,
IPS/IDS, Web Gateway Custom Responses
Enforcement Controls
Out-of-the-box Security Orchestration, Automation and
Response
JSON Event
Firewall
URL Filter
Extend and Customize Your Threat Response
Malicious/Phishing
Employees Message
Analyst
60
Measure Incident Response KPIs & Risks
• Dashboards
– Incident Summary
– Threat Summary
• Reports – KPIs
– Incident Timeline (trend)
– Incidents by Assignment
– Incident Age by Severity
– Incident by Team
– Incidents – Time to Review
– Incidents – Time to Assignment
– Incidents – Time to Close
• Reports – Risks
– Threat Summary
– Impacted Users – Incident Volume
– Top Campaigns
– Top Malware Families
– Incidents by LDAP Attributes (Dept., Address, Group, ...)
Threat Response Benefits
• Focus time on high priority incidents • Establish reliable & consistent IR workflow • Respond faster to threats
• Automate repetitive tasks • Increase analyst productivity • Gain visibility into trends, KPIs
• Achieve situational awareness in • Track analyst workload • Increase efficiency for better
minutes • Measure performance metrics ROI
• Verify endpoint infections • Eliminate alert fatigue & increased • Leverage existing SOC
• Collaborate and share notes with others coverage investments
Customer Quotes
“Automated integration of Threat
“Saves us hours of work for each “Very happy, we use it every day…” Response and TAP is big improvement
issue we investigate” for our defenses. Thank you from all of
us in IT Security.”
Leading Media Company Leading Food Distribution Leading Healthcare Provider in Texas
Company
The Results at a Typical Organization
60+
minutes
45
minutes
4.5 75%
minutes
30
seconds
Before After Before After
Authentication
Analyst Accolades as the Email Security Leader
20% or 2x industry
avg investment into
R&D