- The Model Context Protocol: Simplifying Building AI apps with Anthropic Claude Desktop and Docker | Docker
- This robot vacuum and mop performs as well as some flagship models - but at half the price
- Finally, a ThinkPad model that checks all the boxes for me as a working professional
- Why I recommend this Android phone for kids over a cheap Samsung or Motorola model
- My favorite USB-C accessory of all time scores a magnetic upgrade
Proofpoint rolls out cloud-native security platform | SC Media
Proofpoint on Tuesday announced its new cloud-native Information Protection and Cloud Security Platform that layers in multiple features, including data loss prevention, insider threat management, a cloud app security broker (CASB), zero trust network access, and remote browser isolation.
The company’s new cloud platform was developed from its extensive experience managing and analyzing email traffic. Proofpoint claims that every day it analyzes more than 2.2 billion email messages, 35 billion URLs, 200 million attachments, and 35 million cloud accounts.
The cloud platform offers two main features: web security and managed transition services. The web security delivers controls and network isolation when end users access the web. By combining with the platform’s CASB, remote browser isolation, and zero trust network access, companies now have a security architecture that ensures access control coupled with threat and data protection. The managed transition service that’s been rolled out following Proofpoint’s recent acquisition of InteliSecure offers a partner with experience in working with companies to migrate off legacy DLP systems.
Along with the cloud platform, Proofpoint also announced advanced threat protection for business email compromises based on its Supernova detection platform that leverages outbound gateway telemetry, supply chain risk analytics, and API data from cloud platforms such as Microsoft 365 and Google Workspace. The company also introduced Nexus AI for Compliance, which uses machine learning to identity compliance violations.