10.4 C
Casper
Thursday, September 19, 2024

Proofpoint and CyberArk Partner to Enhance Identity Security

Must read

Proofpoint and CyberArk partners to deliver identity security solutions, protecting organizations from cyber threats and ensuring secure user access.

Proofpoint, a leading cybersecurity and compliance company, and CyberArk, an identity security company, announced an extended strategic collaboration to help organizations worldwide secure identities. 

Supporting this joint aim, the expanded partnership includes the launch of new integrations and solutions to address critical cyber challenges.

Securing Identities Across the Enterprise

Digital transformation and the cloud have altered infrastructures, while mobile technologies and remote access have changed how people work. Traditional endpoint and network-based controls are inadequate given today’s threat landscape—where identities are the new perimeter and have become critical for organizations to secure. With attackers increasingly exploiting identities thanks to the potential wide-ranging access they enable, 93% of organizations suffered two or more identity security breaches in the past year. The exponential growth of identities and evolving attack techniques underscores the critical need for a paradigm shift toward identity-centric security strategies.

Threat actors continue to target identities as the most effective way to land and expand their access to the targeted organization. From workforce users to IT admins with privileged administration rights, to an executive with access to confidential data, to a developer with access to code repositories or a machine identity such as an IoT device, identities are cyber adversaries’ preferred path to an enterprise-wide breach. Connecting a human-targeted attack with its potential impact has never been more critical.

Also Read: From Hacker to Defender: Sergey Belov’s Cybersecurity Playbook

The integration between Proofpoint and CyberArk features a combination of layered defenses designed to stop threats before they reach users, and preventative policies and controls that ensure access accuracy are applied. Proofpoint prevents email attacks from reaching users and helps identify the individuals and systems targeted by the most sophisticated, highest impact threats using its expansive data set comprised of trillions of data points every year. CyberArk takes this insight and applies adaptive controls and identity security policies to ensure legitimate users can only access what they need and nothing more.

Proofpoint’s ZenWeb Browser Extension Enhances CyberArk’s Secure Browser

Web browsers—often consumer-focused and lacking in security, privacy, and productivity features—are essential to organizations’ operations. They are the connective tissue between identities, applications, and data, making them a primary target for cybercriminals and a prominent vector for security breaches.

Powered by Proofpoint’s industry-leading threat intelligence, Proofpoint’s ZenWeb browser extension solution protects employees and contractors from malicious URLs that can download malware or steal corporate credentials and sensitive data. When deployed with CyberArk Secure Browser, organizations can, in real-time, detect and block malicious URLs, one of the leading attack vectors used by cyber adversaries.

Additional benefits of Proofpoint’s ZenWeb and CyberArk’s Secure Browser integration include:

  • Stopping targeted threats and malicious URLs in real time, independent of how the user encountered the URL
  • Identifying and securing privileged users by applying granular policies and minimizing the risk of unauthorized access
  • Enhancing user safety with adaptive controls and policies
  • Reducing the risk of unauthorized access to sensitive data
  • Streamlining incident response and automating remediation processes

Also Read: Markus Bauer’s Blueprint for Cyber Defense at Acronis

Deeper integrations for innovative identity-centric threat remediation include:

  • Leveraging Proofpoint’s Nexus TI (Threat Intelligence), email threats are identified and dynamically assessed for risk, then passed to CyberArk Identity Flows for adaptive response and remediation.
  • Privileged users with high-risk access are singled out for enhanced layers of protection and real-time remediation when threats occur. Proofpoint also automates privileged accounts and local admin discovery, integrating with CyberArk to manage and secure them.

More articles

Latest posts