Leader in Advanced Cybersecurity Solutions. Next-generation cybersecurity company that protects the way people work today.

Leader in Advanced Cybersecurity Solutions. Next-generation cybersecurity company that protects the way people work today.

Proofpoint.

More than 90% of targeted attacks start with email, and these threats are always evolving. Proofpoint Targeted Attack Protection (TAP) stays ahead of today’s attackers with an innovative approach that detects, analyzes, and blocks advanced threats before they reach the inbox.

Benefits and Features

Next-Generation Detection

TAP is built on our next-generation email security platform, which gives you a unique architectural advantage. You get clear visibility into all email communications for a far-reaching view of the threat landscape. See everything from banking trojans and ransomware to attacks targeted at your organization. Deep, message-level context makes TAP especially effective at identifying hard-to-catch threats that other solutions miss.

TAP equips you to:

Block and quarantine messages with malicious attachments or malicious URLs. They never reach the inbox, so users never click on them and become compromised.
Submit attachments and URLs to our cloud-based scanning service to detect and inspect malicious content.
Transparently rewrite all embedded URLs to protect users on any device or network. Track and block clicks to malicious web pages without affecting the user experience or other URL-filtering technologies you’re using.

Sophisticated Threat Analysis

TAP stops threats quickly and accurately. It applies multi-stage analysis to inspect the full attack chain. And it uses a combination of static and dynamic techniques to catch even the most advanced threats. Our technology doesn’t just detect threats—it also learns from them. It observes the patterns, behaviors, and tradecraft used in each attack. Armed with that insight, TAP adapts to make the next attack easier to catch.

TAP technology stands out because:

  • The cloud-based sandbox constantly adapts to detect new attack tools, tactics, and targets. Our technology handles evasive attacker techniques: virtual-machine detection, time-delay malware activation, geographically bound threats, and more.
  • Some threats, like credential phishing attacks, leave no obvious digital traces. We use template- and reputation-based detection to efficiently catch these attacks.
  • Our unique predictive analysis preemptively identifies and sandboxes suspicious URLs based on email traffic patterns. This drastically minimizes the risk of a patient-zero case from a previously unknown malicious URL.

Superior Intel and Visibility

Only Proofpoint provides threat intelligence that spans email, network, mobile apps, and social media. Our threat graph of community-based intelligence contains more than 800 billion data points that correlate attack campaigns across diverse industries and geographies. You can easily leverage this insight through the TAP Threat Dashboard.

The TAP Threat Dashboard:

  • Can be accessed through a web browser. You get visibility into the threats entering your organization. See who is attacking, how they’re attacking, and what they’re after.
  • Provides data at organization, threat, and user level. This detail helps you prioritize alerts and act on them.
  • Highlights broad attack campaigns and targeted threats. See attacks directed at your executive leadership and other high-value employees.
  • Provides detailed forensic information on threats and campaigns in real time. You get downloadable reports and can integrate with other tools through APIs.