Proofpoint Launches Closed-Loop Email Analysis and Response Solution to Automate End User-Reported Phishing RemediationProofpoint Launches Closed-Loop Email Analysis and Response Solution to Automate End User-Reported Phishing Remediation
Reduces threat triage time of end user-reported malicious emails
September 7, 2018
Sunnyvale, Calif.—September 5, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced the availability of its Closed-Loop Email Analysis and Response (CLEAR) solution, a complete closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defenses. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes without requiring additional work from human analysts.
Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security, demonstrating Proofpoint’s commitment to continued development, innovation, and integration of acquired solutions.
“Email fraud and phishing have cost organizations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with just one click,” said Joe Ferrara, general manager of the Wombat Security product division of Proofpoint. “Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defense against targeted phishing attempts when attackers get past the perimeter. Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organization.”
Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organizations a short path from reporting to remediation of phishing attacks that slip past perimeter defenses. Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.
CLEAR’s security automation and orchestration capabilities also minimize alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritize their work. Once reported, PhishAlarm Analyzer prioritizes and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyzes messages against multiple intelligence and reputation systems and shares this information with messaging and security responders. This replaces the uncertainty of ignoring messages with a positive feedback loop. With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.
To further assist security teams, CLEAR provides organizations with relevant and timely metrics for measuring the effectiveness of security awareness programs. These metrics go beyond the percentage of users that fall for a simulated phishing attack. Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process. This information provides a comprehensive review of an organization’s responsiveness to targeted phishing attacks.
For more information on CLEAR, please visit https://www.proofpoint.com/us/products/threat-response-auto-pull. For more information on Proofpoint’s advanced threat protection, please visit https://www.proofpoint.com/us/product-family/advanced-threat-protection.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media, mobile, and cloud applications, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. More information is available at www.proofpoint.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Supply Chain Cyber Risk Management Whitepaper