Thursday, February 27, 2025
HomeCyber Security NewsProofpoint to Acquire AI Email Security Firm Tessian

Proofpoint to Acquire AI Email Security Firm Tessian

Published on

SIEM as a Service

Follow Us on Google News

Proofpoint, an enterprise security company, has entered into a definitive agreement to acquire Tessian, a leading provider of email security solutions.

The acquisition is aimed at enhancing the existing email security offerings of Proofpoint and preventing misdirected emails and data exfiltration, which are major concerns for businesses in today’s digital age.

Proofpoint, Inc. is a leading cybersecurity company that provides comprehensive cloud-based solutions to businesses worldwide.

Their suite of security solutions is designed to prevent specific threats, safeguard sensitive data, and enhance user resilience against cyberattacks.

With Proofpoint’s advanced protection, businesses can operate with confidence and peace of mind in today’s ever-evolving threat landscape.

AI-Based Email Security

Proofpoint is a leading provider of security and compliance solutions that prioritize people’s safety and privacy.

Its cutting-edge technology is designed to help businesses of all types mitigate their most crucial risks across various platforms, including email, cloud, social media, and the web.

With Proofpoint’s powerful tools, companies can ensure the highest level of security and compliance without compromising their users’ experience.

The ability of AI-powered surveillance to identify risks intended for individuals, such as phishing emails and assaults on vendors, and to prevent the loss of data caused by either intentional or unintentional actions has been outstanding.

According to the report, in 2022, 65% of all data loss events happened through email, and almost two-thirds of businesses lost data or had it stolen because an employee made a mistake on email. 

“Far too often, human errors with email lead to organizations putting their and their customer’s data at risk, breaching industry and data protection regulations, and losing mission-critical intellectual property,” said Darren Lee, executive vice president and general manager.

Tessian’s AI-powered email security platform is set to enhance Proofpoint’s email data loss prevention (DLP) service by effectively mitigating both accidental data loss and malicious insiders.

The integration of Microsoft 365 and Google Workspace into Tessian’s platform ensures a seamless implementation that enables organizations to maximize their email security. Some instances of Tesseracts include:

  • Protects sensitive data, helps customers achieve regulatory compliance and confidentiality agreements, and avoids the risk of reputational damage by eliminating misdirected emails and mis-attached files.
  • Automatically protects against data exfiltration and safeguards intellectual property without predefined rules or deny lists.
  • Context-aware, AI-based email defense that detects and prevents the full spectrum of email attacks while providing end users with in-the-moment contextual warning banners to help them decide whether an email is safe.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Latest articles

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two...

Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions

The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with...

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two...

Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions

The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with...