sb-as logo
Story image

Proofpoint enhances security awareness training platform

Cybersecurity and compliance specialists Proofpoint have announced multiple people-centric innovations to its Proofpoint Security Awareness Training platform, in a bid to help organisations worldwide with security training and enhance user experience. 

Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence to make it easy for security teams to identify people-centric risk and assign training to targeted users while introducing new customisation functionality.

“Proofpoint is the only security awareness training provider that offers critical insight into an organisation’s most attacked and most vulnerable users coupled with true customisation to create a security-aware culture,” explains Alan LeFort, senior vice president and general manager of Security Awareness Training for Proofpoint. 

“We are proud that our solution can reduce successful phishing and malware infections by up to 90%," he says.

"Today’s Proofpoint Security Awareness Training innovations deliver deep visibility into the threats impacting an organisation, tight technical integration, and a wide scope of engaging content.”

Organisations worldwide can now integrate security awareness as part of an overall people-centric security program to drive increased effectiveness through highly-focused education. With the majority of office workers forced to operate remotely due to the COVID-19 pandemic, teaching end users on how to work safely from a new environment is essential. 

Proofpoint’s Security Awareness Training new enhancements include:

Threat Intelligence Integration: Utilising Proofpoint’s best-in-class threat intelligence, customers can identify people-centric risk and automatically import “Very Attacked People” and “Top Clickers” into the Security Awareness platform to assign appropriate training. The platform utilises lures from real attacks in ThreatSim phishing, SMS, and USB simulated attacks and offers short, attack-based content based off of trending threats seen by Proofpoint’s threat research team.

Enhanced User Message Reporting and Analysis: Proofpoint Security Awareness Training will allow users to report suspicious messages more easily on any device with in-line Email Warning Tag banners including PhishAlarm “Report Phish” functionality. PhishAlarm empowers users to report phishing emails and other suspicious messages with one click, while built in analysis allows administrators to understand if the message is malicious.

Advanced Customisation and Reporting: Enhanced self-service customisation of training content allows more flexibility when customising training for improved user relevance. Advanced reporting will provide more visibility into users' ability to identify and report suspicious messages. Proofpoint’s award-winning education approach provides focused, tailored experiences to change user behaviour and are available in 40 different languages that can be taken anytime, anywhere, on any connected device.

Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More