The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.
Do You Manage Peer Insights at Proofpoint?
Access Vendor Portal to update and manage your profile.
1) Identity deception and honeytokens with high-fidelity Alerts:- I this we can plant fake credentials, honey accounts/ service principals, decoy shares and deceptive AD objects. Any usage of these signals active credential theft or lateral movement with very low false positives. 2) Actionable remediation workflows and automation:- It provides step-by-step remediation such as removing permissions, rotating credentials, fixing ACL's, disabling vulnerable SPN's and integrates with ticketing to execute changes or track them. 3) Low operational noise and lightweight footprint:- Deception-based detection reduces alert fatigue and sensors are relatively light. AD assessments are largely agentless, minimizing impact on endpoints and domain controllers. 4) Strong ecosystem integrations:- Connects with common EDR, SIEM, SOAR and IAM platforms to enrich investigations and trigger automated containment e.g host isolation, credential rotations, policy updates. 5) Incident response acceleration:- During an event, quickly highlights compromised identities, exposed paths for lateral movement, and priority containment actions to limit blast radius.
Microsoft Product integration, reporting, unified consoles
Very strong ID-focused threat detection, helps identify suspicious behaviour, privilege abuse; not a lot of noise, alerts are sensible, genuine and actionable; it integrates well with other identity and security solutions, and keeps up with the modern attack vectors.
1) Windows-first visibility; gaps for non-Windows endpoints:- Endpoint and lateral movement insights are strongest on Windows joined to AD. Linux/macOS segments and identity risks outside of AD aren't as richly mapped without extra tooling. 2) Pricing and ROI considerations:- It's not the cheapest category. The value is strong if you are actively reducing AD risk and using deception detection, but teams with limited AD footprint or no bandwidth for remediation may struggle to justify the cost. 3) Policy/allowlisting management:- you will likely need to allowlist legitimate admin tools and service accounts to prevent deception triggers during routine operations. This adds ongoing governance overhead.
Was clunky in dealing with Multi Domain spread, horrible delays in mail delivery, not as robust as some competitors.
It should definitely allow for a wider customization approach, especial where it concerns advanced threat detection logic and reporting tailored to the specific company needs. Investigations could benefit from having to jump between different views, and reporting could do well to be better aligned with compliance and executive requirements and demands.