sb-as logo
Story image

Proofpoint and CyberArk extend partnership to further safeguard high-risk users

Cybersecurity and compliance company Proofpoint has announced it is extending its partnership with CyberArk.

The enhanced integration of Proofpoint Targeted Attack Protection with CyberArk’s Privileged Access Security Solution will enable organisations to identify their very attacked people (VAPs), apply additional security policies to their high-risk users with privileged access, and remediate phishing attempts.  

“Threat actors are exceptionally adept at targeting individuals with privileged access to extremely sensitive data—and organisations need the ability to seamlessly protect those users, across their ecosystem of security solutions,” says Bhagwat Swaroop, executive vice president of Industry Solutions and Business Development for Proofpoint. 

“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats," he says.

"This is the latest example of our ongoing commitment to lasting partnerships with the industry’s leading security firms and to provide essential people-centric solutions to organisations worldwide.”

The Proofpoint and CyberArk partnership features a combination of layered defences designed to stop threats before they reach users and apply policies and controls that ensure privilege accuracy. 

Proofpoint prevents email attacks from accessing users and helps to identify the individuals that are targeted by the most sophisticated, highest impact threats. CyberArk takes this insight and applies adaptive controls and policies to ensure those privileged users are only able to access what they need and nothing more.

“Privileged users are just as vulnerable to email-based cyber attacks as anyone in an organisation, however the systems and environments they manage are so critical to the business that a breach can be devastating,” says Adam Bosnian, executive vice president of Global Business Development at CyberArk. 

“With Proofpoint Targeted Attack Prevention feeding information to CyberArk about ‘very attacked’ privileged users in an organisation, we can immediately—and automatically—apply remediation measures to help stop targeted threats before they can reach their intended destination.”

Organisations worldwide can now use a combination of Proofpoint Targeted Attack Protection (TAP) and CyberArk’s Privileged Access Security to:

  • Identify and Manage Privileged Access: Proofpoint TAP identifies VAPs within organisations and shares that information with CyberArk’s Privileged Access Security Solution to manage the access level of privileged users with a high level of threat severity.
  • Revoke Privileged Access for Potentially Compromised Users: Proofpoint TAP identifies malicious links within emails, rewrites each URL, and provides click-time sandboxing for every user. TAP insights are then delivered to CyberArk detailing privileged users that have clicked on malicious links. CyberArk then provides real-time remediation to automatically disable certain features, restrict the user completely, or force a real-time password change.
Story image
emt Distribution brings Netsparker security solutions to A/NZ and APAC market
emt Distribution has announced it will bring enterprise-level Netsparker dynamic application security testing solution to Australia, New Zealand and APAC businesses.More
Story image
With cyber-threats continuing to evolve, organisations need to remain in the fight in 2021
Teams can make improvements in 2021 by having a more comprehensive understanding of the threats that are out there and defining how they conduct operations to offer flexibility to adapt better.More
Story image
CyberArk launches Forescout and Phosphorus integration to aid with IoT security
“Through our integration with Forescout and Phosphorus, CyberArk dramatically improves security and compliance, and alleviates the burden on IT and security teams."More
Story image
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.More
Story image
Palo Alto Networks and PwC deliver MDR services to Hong Kong enterprises
“Together, PwC and Palo Alto Networks offer a service designed to address and solve customer cybersecurity pain points particularly as the market demands new ways to detect and respond to threats.”More
Story image
Secure Code Warrior launches offering to help developers adopt a security mindset
Secure Code Warrior, the secure coding company, has launched a new educational offering that simulates realistic situations to help developers extend their coding skills and preparedness.More