Proofpoint
Proofpoint's portfolio includes products that stop both traditional cyber attacks (delivered via malicious attachments and URLs) and socially targeted attacks - such as Business E-Mail Comprises (BEC) and Credential Phishing - that do not use malware themselves. Proofpoint uses a mix of sandbox analysis, reputation analysis, and up-to-date threat data for analysis. The e-mail security area uses algorithms that specifically evaluate the risk for the mail recipient and uses attributes such as the sender-recipient relationship, header structure, header content, etc. to identify potential threats. Automated encryption, data loss, and forensics (triage) tools are designed to support and automate the response of an SOC team to incidents to minimize damage and cost of all threats.
Partner since:
1999Partner status:
Gold Partner