Monday, February 17, 2025
HomeCyber Security NewsProofpoint to Acquire AI Email Security Firm Tessian

Proofpoint to Acquire AI Email Security Firm Tessian

Published on

SIEM as a Service

Follow Us on Google News

Proofpoint, an enterprise security company, has entered into a definitive agreement to acquire Tessian, a leading provider of email security solutions.

The acquisition is aimed at enhancing the existing email security offerings of Proofpoint and preventing misdirected emails and data exfiltration, which are major concerns for businesses in today’s digital age.

Proofpoint, Inc. is a leading cybersecurity company that provides comprehensive cloud-based solutions to businesses worldwide.

Their suite of security solutions is designed to prevent specific threats, safeguard sensitive data, and enhance user resilience against cyberattacks.

With Proofpoint’s advanced protection, businesses can operate with confidence and peace of mind in today’s ever-evolving threat landscape.

AI-Based Email Security

Proofpoint is a leading provider of security and compliance solutions that prioritize people’s safety and privacy.

Its cutting-edge technology is designed to help businesses of all types mitigate their most crucial risks across various platforms, including email, cloud, social media, and the web.

With Proofpoint’s powerful tools, companies can ensure the highest level of security and compliance without compromising their users’ experience.

The ability of AI-powered surveillance to identify risks intended for individuals, such as phishing emails and assaults on vendors, and to prevent the loss of data caused by either intentional or unintentional actions has been outstanding.

According to the report, in 2022, 65% of all data loss events happened through email, and almost two-thirds of businesses lost data or had it stolen because an employee made a mistake on email. 

“Far too often, human errors with email lead to organizations putting their and their customer’s data at risk, breaching industry and data protection regulations, and losing mission-critical intellectual property,” said Darren Lee, executive vice president and general manager.

Tessian’s AI-powered email security platform is set to enhance Proofpoint’s email data loss prevention (DLP) service by effectively mitigating both accidental data loss and malicious insiders.

The integration of Microsoft 365 and Google Workspace into Tessian’s platform ensures a seamless implementation that enables organizations to maximize their email security. Some instances of Tesseracts include:

  • Protects sensitive data, helps customers achieve regulatory compliance and confidentiality agreements, and avoids the risk of reputational damage by eliminating misdirected emails and mis-attached files.
  • Automatically protects against data exfiltration and safeguards intellectual property without predefined rules or deny lists.
  • Context-aware, AI-based email defense that detects and prevents the full spectrum of email attacks while providing end users with in-the-moment contextual warning banners to help them decide whether an email is safe.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Latest articles

Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Meta's commitment to cybersecurity took center stage in 2024 as the tech giant awarded...

Google Chrome Introduces AI to Block Malicious Websites and Downloads

Google has taken a significant step in enhancing internet safety by integrating artificial intelligence...

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Meta's commitment to cybersecurity took center stage in 2024 as the tech giant awarded...

Google Chrome Introduces AI to Block Malicious Websites and Downloads

Google has taken a significant step in enhancing internet safety by integrating artificial intelligence...

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...