Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
A cybersecurity analyst or engineer wakes up every morning, flips on their laptop, and defends others from attacks, responding at the speed of lightning to beat cyber villains, and with unmatched adaptability and agility stops cyber villains from getting into your inboxes and organizations – all while calling it just a normal day at the office.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
In April 2021, private equity firm Thoma Bravo announced its intention to acquire Proofpoint for $12.3 billion, the largest private equity cloud software acquisition in history. While investors and Wall Street reacted positively to the news judging from the jump in Proofpoint’s stock shortly after the announcement, it is still unclear how Proofpoint customers will fare post-acquisition.
We can only speculate as to what Thoma Bravo has in mind for the future of third email security vendor in their portfolio (particularly with Barracuda and Sophos already part of the Thoma Bravo family), but there are still some undeniable facts customers and prospects should be aware of based on prior private equity transactions.
Read on for what you can expect following the acquisition, and why now is the perfect time to consider upgrading your email security.
Both Proofpoint and Thoma Bravo expect the acquisition to close during the third quarter of 2021. In this near term timeframe, it is unlikely Proofpoint will make any drastic advances to its products, but customers will likely continue to experience effects of the deal long afterwards as the company adopts new strategies. For any company, mergers and acquisitions distract from a focus on the product. For customers, this can translate to uncertainty or slowdowns in product roadmap and future innovations. And while Proofpoint may prove to be an exception, previous private equity acquisitions have resulted in less customer support, less R&D spend, cost cutting around sales and marketing functions, and internal churn which may impact customers.
However, threat actors do not wait for corporate realities. With new threats moving at a dynamic pace, organizations cannot afford to risk missing a new attack due to Proofpoint’s product inactivity. On the bright side, organizations can take this opportunity to re-evaluate email security strategies. Considering that Proofpoint products will be relatively static during this period, this may be the perfect time to upgrade. When it comes to modernizing cloud email security, organizations have two primary options.
Option 1: Re-Evaluate Your Cloud Email Security Architecture
As cloud adoption continues to grow and organizations turn to cloud-based email providers, a traditional Secure Email Gateway (SEG) approach to email security becomes increasingly less relevant. Built on hosted hypervisors with limited dynamic scaling capabilities SEGs like Proofpoint can struggle to keep critical business email traffic flowing while detecting and stopping email-based attacks at the same time.
Modern, cloud-native email security architectures are much more resilient and can dynamically manage traffic spikes. These architectures also integrate seamlessly with cloud-based email providers like Microsoft 365 and Gmail. For organizations wanting to continue a cloud-forward strategy, it makes sense to take this opportunity to upgrade to a cloud-native email security infrastructure.
Option 2: Implement an Augmentation Strategy
Organizations who want to keep their Proofpoint architecture can still close security gaps and guard against risks from Proofoint’s business uncertainty by adopting augmenting security solutions. By first conducting a gap analysis of Proofpoint’s existing email security controls, you can determine security weaknesses, such as detection of malware-less business email compromise (BEC), supply-chain attacks, ransomware and low-volume targeted attacks, and add a reinforcement layer with a dedicated solution capable of stopping these hard-to-detect attacks.
At Area 1 Security, our cloud-native architecture and superior detection capabilities have earned us praise from analysts, like Gartner and GigaOm, and customers alike. Capable of detecting attacks 24 days before industry averages and blocking 30% more attacks than leading SEGs, our flexible deployment options allow for direct integration with cloud email providers for cloud-native email security. Alternatively, customers can also use Area 1 to augment Proofpoint (or other existing email security solutions) the attacks Proofpoint misses from reaching inboxes.
Despite the current business uncertainty, Proofpoint customers can still remain protected from advanced targeted attacks with Area 1 Security. To conduct a Gartner-recommended gap analysis and see what attacks Proofpoint is missing or to bolster your current email security stack, schedule a complimentary Phishing Risk Assessment with our technical team.
Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 15 year in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.
Today is National Superhero Day, and we would like to dedicate this day to you—the SOC teams and the security experts on the frontline of the phish fight.
https://www.area1security.com/wp-content/uploads/2022/05/BlogBanner_PoTWSuperhero_2022MAY.png20845209Shalabh Mohanhttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngShalabh Mohan2022-04-28 13:51:312022-06-01 10:55:30Superhero strategies for the Phish Fight
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types