sb-au logo
Story image

Proofpoint enhances security awareness training platform

Cybersecurity and compliance specialists Proofpoint have announced multiple people-centric innovations to its Proofpoint Security Awareness Training platform, in a bid to help organisations worldwide with security training and enhance user experience. 

Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence to make it easy for security teams to identify people-centric risk and assign training to targeted users while introducing new customisation functionality.

“Proofpoint is the only security awareness training provider that offers critical insight into an organisation’s most attacked and most vulnerable users coupled with true customisation to create a security-aware culture,” explains Alan LeFort, senior vice president and general manager of Security Awareness Training for Proofpoint. 

“We are proud that our solution can reduce successful phishing and malware infections by up to 90%," he says.

"Today’s Proofpoint Security Awareness Training innovations deliver deep visibility into the threats impacting an organisation, tight technical integration, and a wide scope of engaging content.”

Organisations worldwide can now integrate security awareness as part of an overall people-centric security program to drive increased effectiveness through highly-focused education. With the majority of office workers forced to operate remotely due to the COVID-19 pandemic, teaching end users on how to work safely from a new environment is essential. 

Proofpoint’s Security Awareness Training new enhancements include:

Threat Intelligence Integration: Utilising Proofpoint’s best-in-class threat intelligence, customers can identify people-centric risk and automatically import “Very Attacked People” and “Top Clickers” into the Security Awareness platform to assign appropriate training. The platform utilises lures from real attacks in ThreatSim phishing, SMS, and USB simulated attacks and offers short, attack-based content based off of trending threats seen by Proofpoint’s threat research team.

Enhanced User Message Reporting and Analysis: Proofpoint Security Awareness Training will allow users to report suspicious messages more easily on any device with in-line Email Warning Tag banners including PhishAlarm “Report Phish” functionality. PhishAlarm empowers users to report phishing emails and other suspicious messages with one click, while built in analysis allows administrators to understand if the message is malicious.

Advanced Customisation and Reporting: Enhanced self-service customisation of training content allows more flexibility when customising training for improved user relevance. Advanced reporting will provide more visibility into users' ability to identify and report suspicious messages. Proofpoint’s award-winning education approach provides focused, tailored experiences to change user behaviour and are available in 40 different languages that can be taken anytime, anywhere, on any connected device.

Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More