Tuesday, March 5, 2024

Proofpoint to Acquire AI Email Security Firm Tessian

Proofpoint, an enterprise security company, has entered into a definitive agreement to acquire Tessian, a leading provider of email security solutions.

The acquisition is aimed at enhancing the existing email security offerings of Proofpoint and preventing misdirected emails and data exfiltration, which are major concerns for businesses in today’s digital age.

Proofpoint, Inc. is a leading cybersecurity company that provides comprehensive cloud-based solutions to businesses worldwide.

Their suite of security solutions is designed to prevent specific threats, safeguard sensitive data, and enhance user resilience against cyberattacks.

With Proofpoint’s advanced protection, businesses can operate with confidence and peace of mind in today’s ever-evolving threat landscape.

AI-Based Email Security

Proofpoint is a leading provider of security and compliance solutions that prioritize people’s safety and privacy.

Its cutting-edge technology is designed to help businesses of all types mitigate their most crucial risks across various platforms, including email, cloud, social media, and the web.

With Proofpoint’s powerful tools, companies can ensure the highest level of security and compliance without compromising their users’ experience.

The ability of AI-powered surveillance to identify risks intended for individuals, such as phishing emails and assaults on vendors, and to prevent the loss of data caused by either intentional or unintentional actions has been outstanding.

According to the report, in 2022, 65% of all data loss events happened through email, and almost two-thirds of businesses lost data or had it stolen because an employee made a mistake on email. 

“Far too often, human errors with email lead to organizations putting their and their customer’s data at risk, breaching industry and data protection regulations, and losing mission-critical intellectual property,” said Darren Lee, executive vice president and general manager.

Tessian’s AI-powered email security platform is set to enhance Proofpoint’s email data loss prevention (DLP) service by effectively mitigating both accidental data loss and malicious insiders.

The integration of Microsoft 365 and Google Workspace into Tessian’s platform ensures a seamless implementation that enables organizations to maximize their email security. Some instances of Tesseracts include:

  • Protects sensitive data, helps customers achieve regulatory compliance and confidentiality agreements, and avoids the risk of reputational damage by eliminating misdirected emails and mis-attached files.
  • Automatically protects against data exfiltration and safeguards intellectual property without predefined rules or deny lists.
  • Context-aware, AI-based email defense that detects and prevents the full spectrum of email attacks while providing end users with in-the-moment contextual warning banners to help them decide whether an email is safe.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Website

Latest articles

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within...

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles