Thursday, April 3, 2025
HomeCyber Security NewsProofpoint to Acquire AI Email Security Firm Tessian

Proofpoint to Acquire AI Email Security Firm Tessian

Published on

SIEM as a Service

Follow Us on Google News

Proofpoint, an enterprise security company, has entered into a definitive agreement to acquire Tessian, a leading provider of email security solutions.

The acquisition is aimed at enhancing the existing email security offerings of Proofpoint and preventing misdirected emails and data exfiltration, which are major concerns for businesses in today’s digital age.

Proofpoint, Inc. is a leading cybersecurity company that provides comprehensive cloud-based solutions to businesses worldwide.

Their suite of security solutions is designed to prevent specific threats, safeguard sensitive data, and enhance user resilience against cyberattacks.

With Proofpoint’s advanced protection, businesses can operate with confidence and peace of mind in today’s ever-evolving threat landscape.

AI-Based Email Security

Proofpoint is a leading provider of security and compliance solutions that prioritize people’s safety and privacy.

Its cutting-edge technology is designed to help businesses of all types mitigate their most crucial risks across various platforms, including email, cloud, social media, and the web.

With Proofpoint’s powerful tools, companies can ensure the highest level of security and compliance without compromising their users’ experience.

The ability of AI-powered surveillance to identify risks intended for individuals, such as phishing emails and assaults on vendors, and to prevent the loss of data caused by either intentional or unintentional actions has been outstanding.

According to the report, in 2022, 65% of all data loss events happened through email, and almost two-thirds of businesses lost data or had it stolen because an employee made a mistake on email. 

“Far too often, human errors with email lead to organizations putting their and their customer’s data at risk, breaching industry and data protection regulations, and losing mission-critical intellectual property,” said Darren Lee, executive vice president and general manager.

Tessian’s AI-powered email security platform is set to enhance Proofpoint’s email data loss prevention (DLP) service by effectively mitigating both accidental data loss and malicious insiders.

The integration of Microsoft 365 and Google Workspace into Tessian’s platform ensures a seamless implementation that enables organizations to maximize their email security. Some instances of Tesseracts include:

  • Protects sensitive data, helps customers achieve regulatory compliance and confidentiality agreements, and avoids the risk of reputational damage by eliminating misdirected emails and mis-attached files.
  • Automatically protects against data exfiltration and safeguards intellectual property without predefined rules or deny lists.
  • Context-aware, AI-based email defense that detects and prevents the full spectrum of email attacks while providing end users with in-the-moment contextual warning banners to help them decide whether an email is safe.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Latest articles

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...