Start Time by Time Zone:
9:00 am PDT
10:00 am MDT
11:00 am CDT
12:00 pm EDT
4:00 pm UTC
Email Security: Threat Response Automation
Sponsored By: Proofpoint
According to the latest Mandiant M-Trends and Verizon's DBIR report, email continues to be an effective and growing vector of choice for threat actors. The evolving sophistication of these attacks means an increasing number of malicious emails successfully bypass perimeter security controls. Often, threat actors will even weaponize their content several hours or days after hitting send to further guarantee delivery success. Handling a malicious email requires a lot of steps. Typically, once an attack is traced back to an email, the security team sends a quarantine request to the messaging team. The messaging team then drops everything to remove the malicious email from users' mailboxes. The teams must also document the date and time of every action taken in these efforts. In essence, every action must be auditable and admissible in a legal process.
In this webinar, you'll learn how automating these tasks can greatly reduce the number of users exposed to malicious content and the amount of time they're able to interact with it. We'll discuss Proofpoint's Threat Response Auto Pull (TRAP), a security platform that automates all of these tasks and works with on-premises Exchange (2010, 2013, 2016) and cloud-based Office 365. Join us to see if this automation solution is right for your firm.
Joseph Yun, a member of the Threat Response product team at Proofpoint, is a security automation evangelist. He has worked in a variety of industries, including previous roles at DSM Pharmaceuticals, Verizon, FireEye Mandiant and Phantom. Joe also ran a private software development consulting agency for several years.