sb-nz logo
Story image

Gartner names Proofpoint leader in security training

29 Jul 2019

Cybersecurity and compliance company Proofpoint announced it has been positioned by Gartner in the Leaders quadrant of the 2019 Magic Quadrant for Security Awareness Computer-Based Training for the sixth consecutive year.

The report provides a detailed overview of the security awareness computer-based training market and evaluates vendors based on completeness of vision and ability to execute.

“Nearly all targeted attacks require human interaction to succeed and continuous security awareness training, that delivers the right education to the right people at the right time, is one of the most effective ways to reduce risk,” says Proofpoint cybersecurity strategy executive vice president Ryan Kalember.

“We aim to deliver curated content that allows our customers to educate their most attacked people and enable them to be both a strong last line of defence and a key source of threat intelligence.”

The larger threat landscape has shifted as cybercriminals have moved from targeting infrastructure to targeting users directly.

To help organisations approach security from a people-centric perspective, Proofpoint Security Awareness Training aims to identify areas of employee susceptibility, delivers targeted training when and where it’s most needed and provides detailed business intelligence about end-user knowledge and behaviour.

The interactive training modules are built with learning science principles and include self-service customisation, which improves efficacy and ensures longer-term retention of training.

Available in more than 35 languages with translated and localised regional content, Proofpoint Security Awareness Training solutions educate end-users against real-world cyber-attacks based on industry-leading threat intelligence and empowers them to take action. 

The integrated Closed-Loop Email Analysis and Response (CLEAR) solution allows employees to report suspicious emails which are then prioritised using Proofpoint threat intelligence and can be automatically remediated, reducing the time needed to neutralise an active threat from days to minutes.

Last month, Forrester Wave named Proofpoint a leader in enterprise email security in its quarterly report.

Proofpoint received the highest rating in the current offering category, which measures criteria including email filtering, threat intelligence, cloud integration, incident response, and support and customer success.

The report also noted that “customers praised Proofpoint for its technology leadership, overall performance, and [data loss prevention] (DLP) capabilities.” 

Kalember said, “This validates our holistic people-centric security approach that integrates email security with cloud security, data security, and security awareness training."

Story image
VMware reveals plans to acquire Octarine, going all in for Kubernetes
VMware says once the acquisition is completed, Octarine’s integration will provide new security features for containerized applications running in Kubernetes, and will enable security capabilities as part of the fabric of the existing IT and DevOps ecosystems.More
Story image
ThreatQuotient extends professional services for security intelligence
ThreatQuotient’s global Professional Services team was first launched in 2017 and provides core capabilities to assess, design and build a threat-centric security operations function. More
Story image
Report: Tech industry most attacked sector
"The current global crisis has shown us that cyber criminals will always take advantage of any situation and organisations must be ready for anything."More
Story image
Interview: Thriving in lockdown - how a coding school in Vietnam beat the odds
It's March 10 2020, and CoderSchool in Ho Chi Minh just went entirely online. A success story followed - here's how a lockdown helped a school thrive.More
Story image
Shadow of ransomware looms over healthcare sector
“Hackers will continue to target vulnerable systems as long as there are profits to be made: from selling the stolen patient’s data to holding the healthcare systems hostage until the criminals’ demands are met.”More
Story image
Five wine-tasting tips that should be applied to network security
What does network visibility really mean? Much like a blind wine tasting, we need to keep an open mind and trust what data is telling us without being biased by previous results.More