<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Proofpoint: Targeted Attack Protection

proofpoint tap

One of the most complex cyber-security protections provided by security firm Proofpoint is their Targeted Attack Protection (TAP) solution. Proofpoint TAP is aimed at protecting your systems against ransomware and other threats that usually penetrate your business systems through e-mail messages.

 

How Proofpoint TAP Works

The solution secures both your email platforms and files you store in the cloud since organizations increasingly use SaaS platforms to communicate, conduct business, collaborate and store files.

Proofpoint TAP detects and quarantines malicious attachments and URLs, which in turn prevents uses from clicking on a phishing link or opening an infected file. In addition, TAP features a cloud-based scanning service to which you can submit suspicious files for further analysis.

The TAP service takes advantage of another Proofpoint feature, URL Defense, to rewrite all embedded URLs, which in turn adds a further layer of protection for your e-mail messages. With this feature, you do not click on the actual URL, regardless of whether it looks legitimate or not, but open a re-written URL address that first passes through Proofpoint servers that determine whether the web address is safe to open or not.

Proofpoint TAP pro-actively blocks access to malicious URL addresses working in real time and without interfering with other URL-filtering applications in use.

 

How to Use Proofpoint TAP

The TAP Threat Dashboard enables you to access and get threat intelligence reports covering e-mail, cloud, network, mobile apps and social media threat reports and insights.

You can access the TAP Threat Dashboard from a web browser and look at detailed information about who is attempting attacks against your organization and what they are looking for. The threat data is organized at organization, threat and user level, which gives you a specific perspective in regard to cyber threats your organization is facing. This way, you can also see which of your top company executives are being targeted and act accordingly.

The TAP tool updates threat information in real time by providing in depth forensic information on threats and campaigns by bad actors. The Proofpoint Attack Index equips your cyber-security team with detailed info about the threats designed to reach an individual user in your organization. Then, you get a score from 0 to 1,000 that reflects the severity of the threat. The threat score is calculated on the basis of evaluating four different factors:

  • Threat actor complexity
  • Spread and focus of targeting
  • Type of attack
  • Overall attack volume

By taking insights from the Proofpoint Attack Index, you can prioritize certain cyber-security actions and adoption of measures to defend specific user accounts or business systems.

 

Conclusion

Proofpoint TAP is an efficient cyber-security solution that is able to protect users on both internal and external networks connecting desktop and mobile devices over public and private networks.

The service uses predictive analytics to identify suspicious URLs on the basis of analysis of e-mail traffic patterns. The combination of predictive analytics and adaptive cloud-based sandboxing enables you to detect new threats, attack tactics and targets within your corporate networks and business systems.

 

email security phishing

Topics from this Article

Proofpoint, Email Security, Phishing

Datashield
Datashield
Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

How to Deploy ExtraHop Reveal(x) on Amazon Web Services (AWS)

As business operations expand and move to the cloud, so does security. ExtraHop’s Reveal(x) platform can be deployed on a variety of cloud infrastructures. It makes sense for ExtraHop, leader in Network Detection and Response, to partner with tech giant Amazon Web Services (AWS).

ExtraHop Reveal(x) Integrations

ExtraHop is an industry leader in network detection and response (NDR), providing complete network visibility, real-time threat detection, and intelligent response at scale through their products.

ExtraHop Reveal(x) Enterprise

ExtraHop Reveal(x) Enterprise is the large-scale solution for network detection and response (NDR), providing complete east-west visibility, real-time threat detection inside the perimeter, and intelligent response at scale. For a full feature breakdown of the Reveal(x) platform, visit our feature review here.