Story image

Proofpoint launches email analysis and phishing remediation solution

06 Sep 18

Cybersecurity and compliance company Proofpoint today announced the availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences.

Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, reducing an organisation’s typical threat triage time from days to minutes without requiring additional work from human analysts.

Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security.

“Email fraud and phishing have cost organisations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with one click,” says Proofpoint Wombat Security product division general manager Joe Ferrara. 

“Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defence against targeted phishing attempts when attackers get past the perimeter.

“Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organisation.”

Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organisations a short path from reporting to remediation of phishing attacks that slip past perimeter defences.

Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.

CLEAR’s security automation and orchestration capabilities also minimise alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

Once reported, PhishAlarm Analyser prioritises and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyses messages against multiple intelligence and reputation systems and shares this information with messaging and security responders.

This replaces the uncertainty of ignoring messages with a positive feedback loop.

With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.

To further assist security teams, CLEAR provides organisations with metrics for measuring the effectiveness of security awareness programs.

These metrics go beyond the percentage of users that fall for a simulated phishing attack.

Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process.

This information provides a comprehensive review of an organisation’s responsiveness to targeted phishing attacks.

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”