Advance Email Security
Advance Email Security
and, why are companies choosing Proofpoint.
1
After this training you should know:
• The market problems addressed by Proofpoint’s Advanced Email Security suite, and our
approach to solving them
• What's in it for you
• How to start a conversation and
• Where to go from here
2
So, let’s start with the market problem, what is happening today, and what it means for
your prospects and customers.
3
Organizations are paying closer attention to security — and spending more than ever to
strengthen it. But, most security programs do not align with today's threat landscape. We
know that 90% of targeted attacks start with an e‐mail, yet according to Gartner’s 2017
report, companies spend a meager 8% of their budget on e‐mail protection.
4
Network and endpoint security are useful for detecting threats that are already inside
organizations, but they do little to stop attacks from getting there in the first place; and
worse, they only illuminate the last stage of the attack, leaving the "good guys" without any
insights to prevent or effectively respond.
5
Today’s threats target people, not infrastructure. Attackers are reaching people through
their natural daily communication channels (like email, mobile, web and social). Cyber
attacks are using social engineering, not vulnerabilities, to trick us to grant them access,
and unfortunately, people continue to click on malicious attachments and links despite
ongoing security awareness training.
6
Credential phishing continues to evolve; malware‐free attacks slip past traditional security
defenses; and users unknowingly provide their credentials to cybercriminals.
Office 365 and other SaaS applications increase the risk of data exposure, since they move
data to the cloud leaving old data security solutions ineffective.
Business Email Compromise, also known as BEC, or CEO fraud, runs rampant. BEC is a
highly‐targeted email‐impersonation attack, where hackers leverage social media or insider
knowledge to pretend to be someone else, and then trick people into sharing sensitive
data, like W2s during tax season, or money. Since January 2015, the U.S. FBI reports over
40 thousand organizations have been victimized worldwide, costing north 5 Billion dollars.
7
Attacks are becoming more sophisticated and are constantly evolving so it's getting harder
to keep up unless you have a dedicated and specialized team.
8
• Attackers are using better technology – so speed of innovation matters,
• There are more types of malware‐ so reputation and rules cannot keep up anymore
• Security awareness training alone is not enough to protect against social engineering
attacks, and
• Manual incident response processes are not scalable due to the increased volume of
alerts
9
So, how can Proofpoint help?
10
Proofpoint Advanced Email Security is the only solution that offers total protection against
today’s most sophisticated attacks.
We believe in THREE STEPS TO STOPPING ADVANCED EMAIL THREATS:
Step 1: Block Malware‐Free Attacks, email fraud and credential phishing.
Step 2: Fight Advanced Malware‐Based Threats like ransomware.
Step 3: Learn from attacks, and respond to threats quickly by automating the response
process.
11
Organizations are struggling to address the speed, volume, and complexity of today’s fast‐
evolving cyber threats. Our unified solution helps them prevent, detect, learn and respond
to today’s most advanced attacks.
12
Proofpoint is the leading security solution for organizations regardless of their size.
Gartner, 50% of the Fortune 100 companies, and 40% of the Fortune 500s, trusts us.
Protecting these organizations gives us unmatched visibility into email threats, which
translates into better protection for all of our customers.
We rapidly innovate with new detection techniques as quickly as attackers vary their
methods.
Our effectiveness comes from the fact that we are a pure cybersecurity company with
plentiful security resources. We also integrate with other technologies. Palo Alto Networks
is a key ecosystem partner, as well as Splunk and CyberArk, because we believe in a 'better
together' approach and in continuously improving our customer’s security investments
returns.
Proofpoint focuses on delivering a great user experience at an extremely competitive price.
We look beyond sticker price at our delivered total cost of ownership and customer’s
Return On Investment. Simple facts like stopping more threats, providing professional
services with each deployment, seamless product integrations, and our fanatic customer
support, translate into a lower Total Cost of Ownership than the alternatives. We know no
one wants to babysit their email security product, so we’ve built powerful tools, and a
world‐class professional services organization, so our customers can simply “set and forget”
13
their email protection tools. Many other solutions are fairly effective against spam or basic
attacks; however, these “simple solutions” tend to impact the end‐user experience. If we
were to PDF all attachments coming into your organization, sure, you would see less
malware, but you would also break some end‐user workflows. Proofpoint focuses on
technology that detects threats behind the scenes, without disrupting workflows.
13
We believe that effective security requires technology, people, and intelligence.
We reinvests nearly 20% of our revenue back into Research and Development, one of the
highest rates in the industry, and we see the results day in and day out.
We employ more than 100 threat researchers worldwide who exposed Locky and
the CryptXXX ransomware, among many others. We also built and operate the
Nexus Threat Platform, which powers all our technology.
The Nexus Threat Graph database correlates more threat intelligence from more
sources than ANY other security firm including:
14
• Over 5 billion daily emails and hundreds of millions of social media posts every day
• Over 505 million cloud apps scanned
• Over 300,000 daily malware samples from our international malware exchange
• And over 500 billion nodes analyzed in a couple of minutes.
Nexus extracts and correlates threat intelligence for unmatched visibility into new and
emerging threats.
15
Before we jump into conversation starters let's discuss what's in it for you:
16
1. Proofpoint Advanced Email suite offers you happy customers, up‐sell opportunities, and
sales incentives.
2. Proofpoint sells under a yearly subscription Model with 90%+ renewal rates.
3. Proofpoint’s Advanced Email Security suite consists of various products that can be
bundled to satisfy different levels of security needs and budgets, creating add‐on
opportunities with preference given to incumbent partners. Additionally, the Proofpoint
product portfolio keeps growing beyond email protection, and we frequently have sales
incentives in place; for details, visit the Partner Hub ‐ Sales Incentives section.
17
Now let's move into How to start a conversation.
18
Most vendors help with some aspects of email security or block some attacks, Proofpoint
offers the most comprehensive suite of products to satisfy the needs and budgets of
Enterprises and SMBs, powered by, proprietary technology, and unmatched threat visibility
that spans all attack vectors email, social media, mobile, and SaaS Applications.
19
Our product suites combine world‐class components to fit into varying degrees of security
needs.
Our Enterprise offering takes a people‐centric approach, and it is designed to protect
Enterprises or SMBs needing granular policy creation, in‐depth threat visibility, third‐party
integrations, incident response, or fulfillment of advanced compliance requirements, like
those required by Financial Services industry regulators.
20
In a nutshell:
Our Enterprise and Essentials solutions:
1. Stop advanced threats (malware, phishing, and fraud) before they reach people,
2. Protect organization’s data from exfiltration
3. Make sure organizations can send and receive emails anytime, anywhere from any
device, and
4. On the compliance side, satisfy email archiving needs.
21
Beyond this, our enterprise solution:
1. Helps organizations identify threats targeting them; who is attacking, how, and what
they are after.
2. Notifies missed threats, who was affected, and even automates the removal of
malicious emails.
3. It provides detailed attack‐forensics used to speed‐up the incident response
process.
4. It protects organizations, their customers, and supply chain from email fraud or
business email compromise.
5. It integrates out of the box with third‐party security vendors like Palo Alto and
Splunk.
6. It delivers security awareness training and realistic phishing simulation attacks.
7. It provides secure private capabilities for personal web email use in compliance
with privacy regulations like Europe’s General Data Protection Regulation or GDPR,
22
and
8. On the compliance side, it satisfies email archiving supervision needs.
22
Our solutions meet the needs of the Security and Messaging teams. Keep in mind that a
purchase decision always requires both teams alignment, so you need to talk to the
Messaging team, who cares about deliverability, and the Security team, who cares about
threats.
23
Uncovering pain points requires you to ask the right questions at the right time.
Here's a list of questions you can use , read them at your leisure.
24
Next steps
25
If you want to learn more or start selling, visit The Proofpoint Partner Hub ‐ your 1‐
stop shop for deal registration, sales enablement, and training.
26
Here's a recap of what we learned:
1. Email is the No. 1 weapon of choice ‐it's used in over 90% of today's cyber‐
attacks.
2. Proofpoint protects against malware‐based threats delivered via URLs and
attachments, and malware‐free ones like business email compromise and
credential phishing. Proofpoint also automates incident response to decrease
exposure and improve Security Operations.
3. Proofpoint is a pure cybersecurity company that protects the most sophisticated
enterprises and provides the Best user experience at a competitive price, through two
different product suites, Essentials for SMBs and Enterprise.
27
Thanks for watching!
28