Story image

Proofpoint launches email analysis and phishing remediation solution

06 Sep 18

Cybersecurity and compliance company Proofpoint today announced the availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences.

Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, reducing an organisation’s typical threat triage time from days to minutes without requiring additional work from human analysts.

Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security.

“Email fraud and phishing have cost organisations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with one click,” says Proofpoint Wombat Security product division general manager Joe Ferrara. 

“Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defence against targeted phishing attempts when attackers get past the perimeter.

“Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organisation.”

Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organisations a short path from reporting to remediation of phishing attacks that slip past perimeter defences.

Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.

CLEAR’s security automation and orchestration capabilities also minimise alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

Once reported, PhishAlarm Analyser prioritises and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyses messages against multiple intelligence and reputation systems and shares this information with messaging and security responders.

This replaces the uncertainty of ignoring messages with a positive feedback loop.

With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.

To further assist security teams, CLEAR provides organisations with metrics for measuring the effectiveness of security awareness programs.

These metrics go beyond the percentage of users that fall for a simulated phishing attack.

Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process.

This information provides a comprehensive review of an organisation’s responsiveness to targeted phishing attacks.

Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.