InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Get Hands-On with Closed-Loop Email Analysis and Response

Presented by

Jennica Brodeur from Proofpoint, Neal Iyer from Proofpoint, Dave Cook from Proofpoint

About this talk

Email continues to be the #1 attack vector for cyber criminals. Security teams can train end users to identify and report suspicious email activity, but they still have to sift through those reported messages to identify and prioritize truly malicious emails, and then remediate them. Proofpoint's Closed-Loop Email Analysis and Response (CLEAR) reduces the time it takes to address potentially malicious emails from days to just minutes. Join our experts as we show how CLEAR stops active attacks in their tracks with just a click, and how your security team can save time and effort by automatically remediating malicious messages. In this 60-min session, we will go over: - Configuring CLEAR in your environment - Investigating messages that have been reported by end-users - Taking action on incidents - Giving feedback to users who report threats - Reporting on the overall value of CLEAR
Proofpoint

Proofpoint

85685 subscribers826 talks
Protect people. Defend data.
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Related topics