Cyber Magazine May 2022 | Page 73

Proofpoint : protecting customers with the right approach
Striking the right balance between the customer and the infrastructure

Proofpoint : protecting customers with the right approach

Deborah Watson , Proofpoint ’ s Resident CISO , discusses the company ’ s values and how it supports the University of Oklahoma with cyber defences
Providers of cybersecurity and compliance solutions , Proofpoint , protect people over every channel including email , the web , the cloud and social media .
Commenting on the company , Proofpoint ’ s Resident CISO , Deborah Watson said : “ First and foremost , we listen to our customers . To address their needs , we continuously focus on addressing reducing the risks in the evolving threat landscape .”
The University of Oklahoma has been a customer of Proofpoint since 2016 and offers the institution email protection with TAP and TRAP , CASB , TAM .
Adding to this , Watson said : “ The University of Oklahoma is unique in the fact that they have a very diverse set of security circumstances , in addition to having three campuses , offering remote learning , they also have a premier teaching hospital . With all of this , they have a lot of challenges that a hospital or other healthcare system would have , as well as a university .”
These challenges include email phishing attacks , cloud app threats , email and cloud security and IT efficiency . To overcome these challenges , Watson explained : “ Our solution provides them with a consolidated solution to
cover all of the different places into a single umbrella . By having this single umbrella , they don ’ t have to go to three different windows to do one job and that helps with resources .”

Striking the right balance between the customer and the infrastructure

With its customer-centric approach , Proofpoint always aims to reduce the risk of cyber-attacks and in doing so , protect people , data and brands against advanced threats and compliance risks .
“ A cybersecurity attack isn ’ t going to be effective if somebody on the other end doesn ’ t take some form of response . That ’ s why we take a peoplecentric approach ,” explained Watson .
“ More than 99 % of cyber-attacks require human interaction to be successful ,” she added . Noting the importance of focusing on Very Attacked People ( VAPs ) rather than VIPs , Watson outlined that this approach is of equal importance to focusing on infrastructure , and striking the right balance lends itself to Proofpoint ’ s success .
She concluded : “ Unlike security teams , cybercriminals aren ’ t focused on infrastructure and don ’ t view the world as a network diagram . Defenders , on the other hand , are confident in dealing with networks and endpoints , which is why more than 60 % of IT budgets are focused on the network .”