Story image

Proofpoint launches email analysis and phishing remediation solution

06 Sep 2018

Cybersecurity and compliance company Proofpoint today announced the availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences.

Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, reducing an organisation’s typical threat triage time from days to minutes without requiring additional work from human analysts.

Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security.

“Email fraud and phishing have cost organisations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with one click,” says Proofpoint Wombat Security product division general manager Joe Ferrara. 

“Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defence against targeted phishing attempts when attackers get past the perimeter.

“Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organisation.”

Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organisations a short path from reporting to remediation of phishing attacks that slip past perimeter defences.

Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.

CLEAR’s security automation and orchestration capabilities also minimise alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

Once reported, PhishAlarm Analyser prioritises and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyses messages against multiple intelligence and reputation systems and shares this information with messaging and security responders.

This replaces the uncertainty of ignoring messages with a positive feedback loop.

With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.

To further assist security teams, CLEAR provides organisations with metrics for measuring the effectiveness of security awareness programs.

These metrics go beyond the percentage of users that fall for a simulated phishing attack.

Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process.

This information provides a comprehensive review of an organisation’s responsiveness to targeted phishing attacks.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.