Proofpoint Launches Innovative Cloud Account Defense Resolution for Detect and Be affected by Compro
نوشته شده توسط : jiajiasnow

Proofpoint, Inc., (PFPT), a leading cybersecurity and compliance company, today announced the method of getting Proofpoint Cloud Account Defense (CAD) to detect and proactively protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss. Cybercriminals have pioneered a fabulous way to compromise corporate email systems, that time period by using brute force attacks to steal Microsoft Office 365 login credentials of corporate users following logging in as the imposter on the system. These new hacking techniques work the way in which company has deployed single sign on or multi-factor authentication (MFA) consist of their security system. As the hacker has logged in masquerading for a real employee, you will find there's wide spectrum of choices while operating very quickly corporation's email instance to cause financial harm and data loss. Available today, the recent Proofpoint CAD solution helps organizations detect, investigate, and remediate these Microsoft Office 365 compromises.

CAD provides comprehensive user-centric visibility important to detect and investigate compromised accounts and thwart email account compromise (EAC) credential theft tactics including credential reuse, brute force attacks, and credential-stealing malware. EAC tactics, when combined business email compromise (BEC) social engineering, are hallmarks of groups the same as the 70+ cybercriminals arrested within the recent Operation Wire Wire federal effort that recovered approximately $14 million in lost funds.

"It only takes one compromised Microsoft Office 365 account to unlock access for the virtual goldmine of confidential data and access-and we all have seen the increase in organizations losing both money and data to the attacks," said Ryan Kalember, senior vp of Cybersecurity Technique for Proofpoint. "Once an attacker compromises a good account, they'll read a user's email, check out their calendar, and launch internal phishing emails attempts with a trusted account. We've even seen these attackers stick to targets with multifactor authentication by exploiting interfaces that won't support strong authentication in every single deployments, such as Exchange Web Services and ActiveSync. Fortunately, CAD can detect these attacks simply by using our extensive intelligence, stopping them before they're cause damage."

Operating down the entire Microsoft Office 365 applications suite including email, SharePoint Online, and OneDrive, this new CAD solution protects users, data, and financial assets on any network or device. CAD empowers organizations to do a proactive approach when addressing risks involved with Office 365 that often evade other security detection methods. This is particularly critical on account of Microsoft Office 365's wide variety of integrated third-party applications. With CAD, security teams can:

Detect Compromised Accounts: CAD studies the attacker's footprint by combining contextual data like user location, device, and login time, with Proofpoint's rich threat intelligence to discover safe baseline behaviors, detect compromised accounts, and flag suspicious behavior.

Investigate Incidents with Granular Forensics: Organizations can investigate past activity and alerts through CAD's intuitive dashboard using granular transaction forensic data like for example user, date, time, IP, device, browser, location, threat, threat score, plus more !.

Defend Office 365 Accounts with Flexible Policies: With insights from CAD's detailed forensics, users can prioritize alerts in keeping with severity to prevent alert fatigue while building flexible policies dependent on multiple parameters including user, location, network, device, and suspicious activity.

Deploy Quickly in your Cloud: Proofpoint's cloud architecture and integration with Microsoft Office 365 APIs enable organizations to quickly deploy and derive value from CAD.

CAD builds upon Proofpoint's extensive cloud-enabled portfolio of solutions that let organizations to deploy and employ cloud applications with full confidence.





:: بازدید از این مطلب : 564
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : چهار شنبه 20 تير 1397 | نظرات ()
مطالب مرتبط با این پست
لیست
می توانید دیدگاه خود را بنویسید


نام
آدرس ایمیل
وب سایت/بلاگ
:) :( ;) :D
;)) :X :? :P
:* =(( :O };-
:B /:) =DD :S
-) :-(( :-| :-))
نظر خصوصی

 کد را وارد نمایید:

آپلود عکس دلخواه: