Detect and block phishing, spear phishing, watering holes and other email-borne advanced threats during and after delivery


Next Generation Detection

Dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver banking Trojans, ransomware, and other malware.

Detect sophisticated malware attacks, including:

  • Polymorphic and zero-day malware
  • Malicious attachments
  • Other advanced exploits

In order to detect such advanced malware effectively—whether malware spread via spear-phishing emails containing a malicious attachment, watering hole URLs over email, or longline phishing campaigns — our malware analysis system technology uses a combination of sophisticated techniques to evaluate advance threats.

Predictive Defense

Leverage cloud-based Big Data analytics to predictively detect malicious URLs in unsolicited emails and block user clicks before they can lead to a compromise.

Proofpoint applies machine-learning heuristics to model email flow at a per-user level, and at a cloud-level across all traffic within Targeted Attack Protection™, in order to block URLs even before they host active malware, using a cloud-based process that incorporates Big Data techniques and a real-time scoring engine, including:

  • Anomalytics Service
  • Kill Chain Analysis and Preemptive Sandboxing

Together, these technologies provide the ability to predictively determine what could likely be malicious—and take preemptive steps before any user has a chance to click and have their machine compromised.


Follow Me Protection

Provide comprehensive security whenever or wherever the user clicks by following email and checking for the URL destination’s safety in real-time.

Leverage an agentless, cloud-based service with URL intelligence to protect users from malicious links in emails no matter when or where they click on that URL– while working remotely, BYOD, and more. A frequent tactic has been to send users socially engineered emails that are designed to entice the user to click a URL within the email. The URL web destination either automatically initiates a download, or tricks the user to enter sensitive or private information. Proofpoint research has shown that 20% of clicks by users on malicious emails occur off the corporate network, bypassing on premise security controls.


End-to-End Insight

Detect compromises and speed response and remediation of phishing and web compromise attacks by quickly identifying campaigns, targeted users, and potentially infected systems.

Obtain details of attacks, understand the size of the threat, identify specific users that were affected, and get real-time notifications for potential incidents that require investigation. Proofpoint provides a graphical, web-based threat analysis dashboard that offers data at an organizational, threat, and user levels, enabling you to take immediate action. Administrators, security professionals and incident response teams can:

  • Analyze how many and what types of email threats are currently being received by the organization, and its comparison to other organizations
  • Identify who has received malicious email threats, who has received malicious attachments, how many messages with the same malicious email threat were delivered, when they were received, which users have clicked, and which users were permitted to the malicious destination through click tracking
  • Extract malware forensics to determine the behavior that was involved in the targeted threat under question
    In addition, administrators and incident response teams can be notified in real-time when a threat is detected that requires user machine remediation.