Cyber Criminal

New Innovations That Help You to Defend Data and Mitigate Insider Risk

Share with your network!

Proofpoint Information Protection helps organizations protect against data loss caused by careless, malicious and compromised users. By combining content and context to gain visibility into risky behavior, Proofpoint helps customers modernize their information protection program with a human-centric approach. As a result, organizations can defend their data, minimize financial and reputational risk, and achieve operational efficiencies. 

Benefits of our latest innovations 

The new product and service capabilities in Proofpoint Information Protection help you address top use cases and accelerate investigations. 

Unify email DLP triage with other DLP channels in Canada 

Proofpoint has data centers in multiple regions to help you meet data privacy and residency requirements. In addition to data centers in the United States, Europe, Australia and Japan, a data center is also available in Canada. Email Data Loss Prevention (DLP) alerts can now be stored in the unified console in Canada, in addition to Endpoint DLP and Insider Threat Management (ITM).    

Our solution’s tenants in data centers across the globe ensure strong data sovereignty is enforced when you select your region within the console. There are also attribute-based access controls to manage data residency requirements. 

Streamline quarantine workflows for Cloud DLP 

File remediations and workflows for Microsoft 365 and Google Workspace have been streamlined and updated. When a file is quarantined, it will now be copied or moved to the unified quarantine space. Admin access can be granted or revoked to the quarantine space automatically via access policies or manually.  

Once in the quarantine space, files can be reviewed or restored with one click. This centralized space hosts all quarantined or shadow-copied files in SharePoint or Google Drive.   

Prevent data loss at the endpoint with expanded controls 

Sensitive data can be exfiltrated by users across a variety of different endpoint channels— USB, printers, cloud sync folders, websites and more. Proofpoint has expanded this coverage to include detection for print, SD cards and Airdrop. So, when a careless or malicious user tries to exfiltrate sensitive data across one of these channels, an alert will be triggered.  

Proactively identify risky users with dynamic policies  

Security teams typically build manual policies to monitor users for unusual or risky behavior based on predefined characteristics. But this approach has drawbacks. Namely, the security team must identify risky users ahead of time—and that’s challenging to do. 

 With dynamic policies, a user’s monitoring policy can automatically change in real time if they trigger an alert. Dynamic policies allow security teams to:  

  • Collect forensics data. Before and after an alert, the endpoint agent policy will switch from metadata-only to screenshot mode for a specified time frame.  
  • Ensure privacy. Screenshots are only captured when a user’s risky behavior triggers an alert. This protects user privacy. 
  • Scale policies. Teams can define when visibility and control policies are scaled up or down on the endpoint. 

Accelerate DLP maturity with the Information Protection framework 

A human-centric and omnichannel DLP solution provides critical visibility into data and user behavior that goes far beyond the siloed approach that’s typical of legacy DLP. But technology is only one component of a successful DLP program—you also need people and processes.  

Proofpoint Premium Services and our certified partners can help you accelerate your DLP program by leveraging people, process and technology. We can assist with deploying and managing end-to-end, human-centric information protection programs that are governed by the Proofpoint NIST-inspired information protection framework

Learn more 

To get deeper insights into what’s new with Proofpoint Information Protection, listen to our Innovations event.  

Contact us to learn more about the information protection framework. Find out how we can help you design and execute a modern, mature program that seamlessly blends people, process and technology.