Proofpoint Email Security

Supported OS Linux Windows Mac OS

marketplace
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Overview

The Proofpoint email security integration monitors and visualizes Proofpoint TAP, Proofpoint on Demand, and Proofpoint Isolation.

Proofpoint Targeted Attack Protection (TAP)

Proofpoint Targeted Attack Protection (TAP) is an advanced threat protection solution designed to safeguard organizations from targeted attacks in today’s evolving security landscape. TAP combines advanced technologies, threat intelligence, and real-time analysis to provide comprehensive protection against email-based threats, including advanced malware, phishing attacks, and social engineering techniques. It also helps detect, mitigate, and block advanced threats that target people through email. The solution detects attacks that use malicious attachments and URLs to install malware or trick users into sharing their passwords and other sensitive information.

Proofpoint on Demand

Proofpoint on Demand is a comprehensive cloud-based cybersecurity platform designed to safeguard businesses from various cyber threats. It offers a diverse array of services, such as email security, threat intelligence, information protection, and compliance solutions. It enables you to make informed decisions and take necessary steps to enhance your overall security posture. Additionally, the app provides insightful details about the encryption status of your communication, further enhancing your understanding of data protection measures.

Key features of Proofpoint on Demand

  • Email traffic monitoring: Monitor the flow of messages to proactively identify and prevent spam, phishing attempts, and other email-related threats.
  • Compliance monitoring: Monitor email communications to ensure adherence to internal policies and external regulations, such as Data Loss Prevention (DLP), Domain-based Message Authentication, Reporting, and Conformance (DMARC), and other applicable guidelines.
  • Incident investigation: Conduct thorough investigations of potential security incidents by leveraging email security and compliance data. This includes tracing the origins of security threats and assessing their impact.
  • User behavior monitoring: Keep a close eye on email-related behavior to detect any signs of insider threats or unauthorized access attempts.

Proofpoint Isolation

Proofpoint Isolation is designed to enhance cybersecurity by isolating and protecting users from potentially malicious content. The primary goal is to prevent users from interacting directly with harmful or suspicious content, thereby reducing the risk of cyber threats.

This integration monitors:

  • Messages Blocked and Delivered and Clicks Blocked and Permitted that are processed by Proofpoint TAP server.
  • Message type data using Proofpoint on Demand Log Service as the source and utilizes the secure WebSocket (WSS) protocol.
  • User’s web browsing and email activity by the Proofpoint Isolation Server.

Support

For support or feature requests, contact Crest Data through the following channels:


This application is made available through the Marketplace and is supported by a Datadog Technology Partner. Click Here to purchase this application.

PREVIEWING: esther/docs-8632-slo-blog-links