Story image

Proofpoint launches email analysis and phishing remediation solution

06 Sep 2018

Cybersecurity and compliance company Proofpoint today announced the availability of its closed-loop email analysis and response (CLEAR) solution, a closed-loop approach to instant end user email reporting, analysis, and remediation to stop potentially malicious emails that pass through perimeter defences.

Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, reducing an organisation’s typical threat triage time from days to minutes without requiring additional work from human analysts.

Proofpoint CLEAR is the first joint solution announcement following the acquisition of Wombat Security.

“Email fraud and phishing have cost organisations billions of dollars—and our new CLEAR solution empowers end users to stop active attacks with one click,” says Proofpoint Wombat Security product division general manager Joe Ferrara. 

“Cybersecurity is a company-wide initiative and a cybersecurity-savvy workforce is the last line of defence against targeted phishing attempts when attackers get past the perimeter.

“Proofpoint CLEAR boosts the visibility of phishing campaigns and automatically processes employee-reported malicious messages, underscoring the positive and direct impact that informed employees can have on improving the security posture of an organisation.”

Enriched with Proofpoint’s world-class threat intelligence, CLEAR offers organisations a short path from reporting to remediation of phishing attacks that slip past perimeter defences.

Rather than requiring employees to manually forward potential malicious messages to abuse mailboxes, which often results in incomplete information like missing headers or attachments, end users can easily report a suspicious message with a single click using an embedded PhishAlarm email reporting button.

CLEAR’s security automation and orchestration capabilities also minimise alerts with automatic filtering of whitelisted emails and simulated phish, enabling response teams to better prioritise their work.

Once reported, PhishAlarm Analyser prioritises and sends messages to Proofpoint Threat Response Auto Pull (TRAP) which automatically analyses messages against multiple intelligence and reputation systems and shares this information with messaging and security responders.

This replaces the uncertainty of ignoring messages with a positive feedback loop.

With this insight, security teams can either delete or quarantine verified threats from end user inboxes with a single click.

To further assist security teams, CLEAR provides organisations with metrics for measuring the effectiveness of security awareness programs.

These metrics go beyond the percentage of users that fall for a simulated phishing attack.

Security analysts can also receive an auditable history of actions taken within TRAP, including message ‘read’ status, list of forwarded messages, and dashboards of key indicators about the remediation process.

This information provides a comprehensive review of an organisation’s responsiveness to targeted phishing attacks.

Australians unsure of who is responsible for the safety of their information
According to a recent survey conducted by SOTI, Australians are increasingly concerned about the security of their health records.
Europol makes 61 arrests & nets €6.2 million in dark web crackdown
60 experts from 19 countries, Europol, and Eurojust were involved in hunting for activities including the illegal sale and signs of counterfeit goods and money, drugs, cybercrime, document fraud, non-cash payment fraud, trafficking in human beings and trafficking in firearms and explosives. 
The silver lining in Australia’s Government cloud strategy
Cloud has been a huge part of the ‘digital transformation’ conversation within Australian government during recent years.
Milestone: How video and IoT are finding their place in enterprise
Milestone Systems South Pacific country manager Jordan Cullis talks about three trends that will revolutionise the way video is viewed in 2019 and beyond.
Largest DDoS-for-hire websites responsible for 11% of attacks worldwide – Nexusguard
The FBI’s shutdown of the world’s 15 largest DDoS-for-hire “booter” websites in December resulted in 85% decrease in average attack sizes, year-over year.
Five things MSPs need to keep in mind in 2019
A Datto APAC channel exec outlines the most important factors for MSP to being paying attention to in the coming year.
Survey: IT pros nostalgic over on-prem data centre visibility
There are significant security and monitoring challenges faced by IT staff responsible for managing public and private cloud deployments.
61% of CIOs believe employees leak data maliciously
Egress conducted a survey to examine the root causes of employee-driven data breaches, their frequency, and impact.