Story image

Proofpoint launches email analysis and phishing remediation solution

06 Sep 2018

Cybersecurity and compliance company Proofpoint today announced the availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences.

Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, reducing an organisation’s typical threat triage time from days to minutes without requiring additional work from human analysts.

Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security.

“Email fraud and phishing have cost organisations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with one click,” says Proofpoint Wombat Security product division general manager Joe Ferrara. 

“Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defence against targeted phishing attempts when attackers get past the perimeter.

“Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organisation.”

Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organisations a short path from reporting to remediation of phishing attacks that slip past perimeter defences.

Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.

CLEAR’s security automation and orchestration capabilities also minimise alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

Once reported, PhishAlarm Analyser prioritises and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyses messages against multiple intelligence and reputation systems and shares this information with messaging and security responders.

This replaces the uncertainty of ignoring messages with a positive feedback loop.

With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.

To further assist security teams, CLEAR provides organisations with metrics for measuring the effectiveness of security awareness programs.

These metrics go beyond the percentage of users that fall for a simulated phishing attack.

Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process.

This information provides a comprehensive review of an organisation’s responsiveness to targeted phishing attacks.

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.