sb-nz logo
Story image

Proofpoint spends $284m to acquire email security leader

20 Feb 2018

Proofpoint will hand over US$225 million (AU$284 million) as part of a deal that will help the company continue its journey into the phishing prevention sector.

Earlier this month the company agreed to acquire Wombat Security Technologies, a company that was founded on research into phishing attacks.

According to Proofpoint, the acquisition will ultimately benefit customers who will be able to use data from current phishing campaigns and gain access to cybersecurity education for end users.

“As cyber criminals increasingly target companies through their employees, enterprises need to ensure they have the most effective security in place to enable employees to identify and avoid attacks that blend in with the way people work today,” the company says in a statement.

Proofpoint will work to launch an integrated solution for corporate email, SaaS applications and other communication forms in the first half of 2018.

Proofpoint CEO Gary Steele adds that threat actors will target employees because they are the weakest link. As a result, organisations must continuously train their employees and provide real-time threat data.

“The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric cyberattacks, as cybercriminals look for new ways to exploit the human factor. We are thrilled to welcome Wombat’s employees to the Proofpoint team,” he explains.

Proofpoint will also leverage Wombat’s PhishAlarm solution by collecting user-reported phishing threat data. The company believes this method will amplify its intelligence by including data from non-Proofpoint customers and providing broader visibility.

“Cybercriminals didn’t slow down in 2017. In fact, they showed us how tactical and targeted they can be. The continued proliferation of phishing and malware, new attacks via SaaS platforms, and the significant rise in damaging email fraud attacks all underscore the need to educate and empower end users,” explains Wombat Security CEO Joe Ferrara.

As part of its 2018 security predictions, Wombat noted that email phishing attacks will remain the most common attack vectors. Although the volume of phishing emails may decrease, their sophisticated nature will still claim uneducated users.

In Wombat’s 2017 State of the Phish Report, 61 percent of infosec professionals reported experiencing spear phishing attacks. 

Ferrara says that the company looks forward to continuing its work with Proofpoint.

Proofpoint expects the Wombat acquisition will add between US$30-32 million to its revenue range and will increase the free cashflow range by $2 million.

The transaction is expected to close in the first quarter of 2018.

Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
Essential tools for managing user identity and how they impact your bottom line
Customer identity and access management (CIAM) is how companies give their end-users access to their digital properties, as well as how they govern, collect, analyse, and securely store data for those users.More
Story image
NZTech calls for Govt to fund cybersecurity education as risk ramps up
NZTech says it's time for the Government to put funding into educating Kiwis about how to avoid being a victim of cyber crime, just as it does for road safety.More
Story image
Veeam reports growth as demand for modern data protection increases
“Even with the unforeseen challenges and circumstances that began in early 2020, Veeam continued its rapid growth with its second consecutive year of bookings over $1 billion."More
Story image
Jetstack's new flagship product brings security to cloud native platforms
“With Jetstack Secure our customers can see a detailed view of each cluster and an instant visual status of all workload certificates, including their association with Kubernetes resources."More
Story image
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.More