Enterprise cybersecurity and compliance company Proofpoint announced that it is extending its partnership with CyberArk, a company offering privileged account security. The alliance integrates Proofpoint’s targeted attack protection platform with CyberArk’s privileged access security solutions to help organizations identify their Very Attacked People (VAP) and deploy additional security policies to remediate attacks against privileged users and high-risk assets.
With the new partnership, global organizations can now use a combination of Proofpoint’s Targeted Attack Protection (TAP) and CyberArk’s Privileged Access Security to identify and manage privileged access and revoke privileged access for potentially compromised users.
CyberArk provides privileged access management services globally. It offers enterprises a critical layer of IT security to protect their critical data, infrastructure, and digital assets on-premises, in the cloud, and throughout the DevOps pipeline. With an integrated suite of cloud-based solutions, Proofpoint helps global companies to prevent targeted threats, safeguard their data, and make their users more resilient against cyberattacks.
Bhagwat Swaroop, Executive Vice President of Industry Solutions and Business Development for Proofpoint, said, “Threat actors are exceptionally adept at targeting individuals with privileged access to extremely sensitive data — and organizations need the ability to seamlessly protect those users, across their ecosystem of security solutions.”
Adam Bosnian, Executive Vice President of Global Business Development at CyberArk, said, “Privileged users are just as vulnerable to email-based cyberattacks as anyone in an organization, however the systems and environments they manage are so critical to the business that a breach can be devastating. With Proofpoint Targeted Attack Prevention feeding information to CyberArk about ‘very attacked’ privileged users in an organization, we can immediately — and automatically — apply remediation measures to help stop targeted threats before they can reach their intended destination.”