Developers: | Proofpoint |
Date of the premiere of the system: | May, 2012 |
Last Release Date: | 2014/02/25 |
Technology: | Cloud Computing, Firewall |
Content |
Proofpoint Targeted Attack Protection is based on advanced technologies, such as analysis of Big Data, interception of URL and use of sandboxes mechanisms for the malware of the program. The solution provides unprecedented protection of users where they would be - out of the corporate firewall, outside corporate network, at use of mobile devices or use of public terminals.
"The modern purposeful attacks - one of those questions which especially concerns security experts – is many times more difficult to detect them, than normal threats, as well as to recover after them normal functioning of a system", - Patty Krivitzky, the senior specialist of support systems of Alticor, Amway parent company says. - "If at least one user once falls a victim of a phishing, it can turn back accident; date leak can yield millions of dollars of a loss, in the form of compensation of damage and costs, not to mention damage of reputation of a trademark. Proofpoint was our solution on security for many years. Targeted Attack Protection™ is one more example of how Proofpoint implements the innovation approaches for the solution of the most pressing problems in the field of security".
Functionality of Proofpoint Targeted Attack Protection.
The solution Proofpoint Targeted Attack Protection integrates technologies of the analysis of Big Data for protection of e-mail with mechanisms of identification Web of threats. Possibilities of Proofpoint Targeted Attack Protection:
Identification of the suspicious attacks
In the solution absolutely new approach to identification of the atypical attacks – a method of the analysis of Big Data using which it is possible to define and apply additional security measures to suspicious messages is used.
Proofpoint Anomalytics considers hundreds of variables in real time, including properties of messages and history of mail traffic of each receiver to define his "regulation" and to reveal anomalies which may contain threats for security.
Reliable protection against harmful URL
Investments and links in the revealed suspicious messages are exposed to additional check.
Proofpoint Targeted Attack Protection changes the addresses of links (URL) so that the browser automatically and imperceptibly redirects the user through Proofpoint cloud for the analysis of contents and identification of a malicious code every time when the user follows these links. If URL were initially harmless, and then were changed to harmful (standard tactics of phishing attacks), users will remain are still protected (irrespective of work location – in a corporate or home network, from the mobile device or a public service network).
Visibility, reaction and warning of the attacks
The solution Proofpoint Targeted Attack Protection provides unprecedented understanding and visibility of the arising threats, thanks to unique opportunities of Threat Insight Service.
The service Threat Insight Service represents a web panel which displays the current situation in real timepoint. It has the configured notifications for the instant notification of administrators and security experts on the possible targeted attacks (in scales of the industry or a separate campaign), providing necessary data on the purposes and the scene of the attack, its character (the malware, a phishing, etc.), and remedial measures if like those are necessary.
2014: New release of Proofpoint Targeted Attack Protection
On February 25, 2014 the Proofpoint company announced release of new release of the product Proofpoint Targeted Attack Protection.
As a part of a new solution: possibilities of intellectual protection, the new module of protection of investments (Attachment Defense), the updated control panel threats in real time.
Targeted Attack Protection has potential of the analysis of the malicious software, placing in "sandbox" and blocking the threats connected with URL or investments in e-mail before the user follows the malicious URL or will open a suspicious investment.
The Predictive Defense technology from Proofpoint uses the analysis of "Big Data" and the advanced statistical modeling for active dynamic analysis of malware on existence of potentially suspicious web addresses and investments of e-mail before users click the links or open investments.
The Targeted Attack Protection control panel in real time and protection of "follow-me" also provide permanent visibility and protection against these attacks. Everything provides pro-active protection of users of the organization, minimization of computer threats within the enterprise and also reduces time of response to incidents, efforts and costs.
According to the statement of developers, results of testing of Predictive Defense in the mode of the beta yielded good result. Predictive Defense effectively reveals and blocks these attacks before users appear under the threat even if transmitted data are ciphered.
For February 25, 2014 the software solution Targeted Attack Protection from Proofpoint is available.