Spotlight
Identity Threat Detection and Response
Proofpoint Spotlight helps automatically prevent identity threats and detect lateral movements.
When attackers first land on a host, it’s very rarely their end target. This means they need to escalate privilege and move laterally to achieve their objectives. It’s fast, easy, and effective for them to exploit privileged credentials. It’s also hard for organizations to detect. With Spotlight, you can detect these privilege escalations and lateral movements across your environments.
Features and Benefits
Discovery and remediation of privileged identity vulnerabilities and policy violations
Continuous discovery and inspection of AD
Spotlight continuously inspects Enterprise AD, Azure AD and PAM to discover and prioritize your identity vulnerabilities. With Spotlight you can detect:
- Enterprise AD and Azure AD misconfigurations
- Privilege Access Management (PAM) gaps
- Endpoint Exposures
- Privilege escalations and lateral movements
Getting started with Proofpoint Spotlight
Automatic risk remediation
Simplify the cleanup of identity vulnerabilities:
- Automatically purge risks from endpoints and servers
- Access the identity risk dashboard for full visibility and alerting of automatic risks remediated
- Easily harden your identity security posture
- Effectively assess the risks of newly acquired environments
Accurately detect and respond
Detect identity threats that evade traditional and non-traditional defenses.
- Deception deployment for fail-safe intruder detection
- Agentless detection and protection with 75+ deception techniques
- Visibility of the attack from the attacker’s perspective
- Automated deception customized to each endpoint
- Automated evidence collection across the entire attack chain for audits and compliance