Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Proofpoint Launches Innovative Cloud Account Defense Solution to Detect and Respond to Compromised Microsoft Office 365 Accounts

Cybersecurity leader enables organizations to detect, investigate, and remediate Microsoft Office 365 credential theft, mitigating financial and data loss

Proofpoint, Inc., (NASDAQ:PFPT), a leading cybersecurity and compliance company, today announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and proactively protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss. Cybercriminals have pioneered a new way to compromise corporate email systems, this time by using brute force attacks to steal Microsoft Office 365 login credentials of corporate users and then logging in as an imposter on the system. These new hacking techniques work even if the company has deployed single sign on or multi-factor authentication (MFA) as part of their security system. Once the hacker has logged in masquerading as a real employee, they have a wide spectrum of choices while operating within a corporation’s email instance to cause financial harm and data loss. Available today, the new Proofpoint CAD solution helps organizations detect, investigate, and remediate these Microsoft Office 365 compromises.

CAD provides comprehensive user-centric visibility necessary to detect and investigate compromised accounts and thwart email account compromise (EAC) credential theft tactics including credential reuse, brute force attacks, and credential-stealing malware. EAC tactics, combined with business email compromise (BEC) social engineering, are hallmarks of groups like the 70+ cybercriminals arrested during the recent Operation Wire Wirefederal effort that recovered approximately $14 million in lost funds.

[addthis tool=addthis_horizontal_follow_toolbox]

Ryan Kalember
Ryan Kalember
Related Posts
1 of 4,841

“It only takes one compromised Microsoft Office 365 account to unlock access to a virtual goldmine of confidential data and access—and we have seen a major increase in organizations losing both money and data to these attacks,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. “Once an attacker compromises a trusted account, they can read a user’s email, look at their calendar, and launch internal phishing emails attempts from a trusted account. We’ve even seen these attackers go after targets with multifactor authentication by exploiting interfaces that do not support strong authentication in most deployments, such as Exchange Web Services and ActiveSync. Fortunately, CAD can detect these attacks by utilizing our extensive intelligence, stopping them before they can cause damage.”

Read More: California Becomes First State To Strengthen Consumer Data Privacy Protections

Operating across the entire Microsoft Office 365 applications suite including email, SharePoint Online, and OneDrive, the new CAD solution protects users, data, and financial assets on any network or device. CAD empowers organizations to take a proactive approach when addressing risks associated with Office 365 that often evade other security detection methods. This is especially critical due to Microsoft Office 365’s wide array of integrated third-party applications. With CAD, security teams can:

  • Detect Compromised Accounts: CAD studies the attacker’s footprint by combining contextual data like user location, device, and login time, with Proofpoint’s rich threat intelligence to establish safe baseline behaviors, detect compromised accounts, and flag suspicious behavior.
  • Investigate Incidents with Granular Forensics: Organizations can investigate past activity and alerts through CAD’s intuitive dashboard using granular transaction forensic data such as user, date, time, IP, device, browser, location, threat, threat score, and more.
  • Defend Office 365 Accounts with Flexible Policies: With insights from CAD’s detailed forensics, users can prioritize alerts based on severity to prevent alert fatigue while building flexible policies based on multiple parameters such as user, location, network, device, and suspicious activity.
  • Deploy Quickly in the Cloud: Proofpoint’s cloud architecture and integration with Microsoft Office 365 APIs enable organizations to quickly deploy and derive value from CAD.

Read More: Interview With Akemi Tsunagawa, Founder And CEO, Bespoke Inc

2 Comments
  1. Iron and steel reuse says

    Metal recyclable waste solutions Ferrous scrap brokerage Iron repurposing plant

    Ferrous material equipment maintenance, Iron waste reclaiming, Scrap metal reclamation operations

  2. Transformer copper scrap buyer Scrap Copper recycling benefits Industrial metal recovery
    Copper cable scrap value, Metal recycling certifications, Copper scrap annealing

Leave A Reply

Your email address will not be published.