Proofpoint and CyberArk extend partnership to bolster online protection for high-risk users

The combined solutions allow organisations to contain and remediate attacks against privileged users and high-risk assets, favorite targets of today’s threat actors
CYBERSECURITY, Security, Networks, Proofpoint, CyberArk


Cybersecurity and compliance specialist Proofpoint has announced it is extending its partnership with CyberArk, in a move that will enhance security strategies across the region.

The enhanced integration of Proofpoint Targeted Attack Protection with CyberArk’s Privileged Access Security Solution enables organisations to identify their very attacked people (VAPs), apply additional security policies to their high-risk users with privileged access, and remediate phishing attempts.  

“Threat actors are exceptionally adept at targeting individuals with privileged access to extremely sensitive data—and organisations need the ability to seamlessly protect those users, across their ecosystem of security solutions,” said Bhagwat Swaroop, executive vice president of Industry Solutions and Business Development for Proofpoint.

“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats. This is the latest example of our ongoing commitment to lasting partnerships with the industry’s leading security firms and to provide essential people-centric solutions to organisations worldwide.”

The Proofpoint and CyberArk partnership features a combination of layered defenses designed to stop threats before they reach users and apply policies and controls that ensure privilege accuracy. Proofpoint prevents email attacks from accessing users and helps to identify the individuals that are targeted by the most sophisticated, highest impact threats. CyberArk takes this insight and applies adaptive controls and policies to ensure those privileged users are only able to access what they need and nothing more.

“Privileged users are just as vulnerable to email-based cyber attacks as anyone in an organisation, however the systems and environments they manage are so critical to the business that a breach can be devastating,” said Adam Bosnian, executive vice president of Global Business Development at CyberArk.

“With Proofpoint Targeted Attack Prevention feeding information to CyberArk about ‘very attacked’ privileged users in an organisation, we can immediately—and automatically—apply remediation measures to help stop targeted threats before they can reach their intended destination.”

Organisations worldwide can now use a combination of Proofpoint Targeted Attack Protection (TAP) and CyberArk’s Privileged Access Security to:

  • Identify and Manage Privileged Access: Proofpoint TAP identifies VAPs within organisations and shares that information with CyberArk’s Privileged Access Security Solution to manage the access level of privileged users with a high level of threat severity.
  • Revoke Privileged Access for Potentially Compromised Users: Proofpoint TAP identifies malicious links within emails, rewrites each URL, and provides click-time sandboxing for every user. TAP insights are then delivered to CyberArk detailing privileged users that have clicked on malicious links. CyberArk then provides real-time remediation to automatically disable certain features, restrict the user completely, or force a real-time password change.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story