Call a Specialist Today! 855-958-0756

Proofpoint Targeted Attack Protection SaaS Defense
Protection against malicious files in SaaS file stores

TARGETED ATTACK PROTECTION SAAS DEFENSE

Safeguard your organization against hidden threats in cloud-based file-storage apps.

CONTACT US»

Sorry, this product is no longer available, please contact us for a replacement.


Key Benefits

Proofpoint Targeted Attack Protection SaaS Defense detects malicious files in Google Drive, OneDrive, SharePoint, and Box to safeguard your organization against hidden threats in cloud-based file-storage apps.

Software-as-a-service (SaaS) is a security blind spot for most enterprises. Users routinely store, access, and share files without knowing where they came from or whether they’re safe. At the same time, security teams have little visibility into these threats. Files are usually accessible only after logging into the service, making sandboxing and other analysis techniques impractical. And domain-reputation services can leave you a false sense of security, as most major SaaS services are legitimate, even if the files they contain aren’t.

TAP dashboard

Protection against malware and phishing files in SaaS apps

SaaS Defense, part of our Targeted Attack Protection family of products, helps you take a “trust, but verify” approach to SaaS-hosted files and how your people use them. As files are added to SaaS services from within your environment, SaaS Defense “detonates” them in our sandbox to observe and analyze. Our multilayer analysis detects potential threats by examining behavior, code, and protocol in multiple stages through a combination of static and dynamic techniques.

Attackers vary their tactics to avoid detection, and some attacks don’t use malware at all. Threats such as email fraud (also known as business email compromise or whaling) and credential phishing leave no obvious traces. That’s why our technologies also include logic to learn from both malware-based and malware-free attacks. In every attack, we observe the content, patterns, tactics, behaviors, and tools to make the next one easier to catch.

Gain visibility into the size, scope, and type of threats you face

No other security company gives you as much visibility into the threats that matter. Our threat intelligence spans email, network, mobile apps, social media, and SaaS platforms. Our threat graph of community-based intelligence contains more than 500 billion data points. That means we can correlate attack campaigns across diverse industries and geographies. Using this broad base of threat data, we attribute most malicious traffic to campaigns, and these are surfaced in our TAP dashboard. You can easily distinguish between broad-spectrum attacks and those targeted at executive leadership or other high-value employees.

TAP SaaS Defense also draws on insight from Proofpoint Emerging Threats (ET) Intelligence, the timeliest and most accurate source of threat intelligence in the market. Proofpoint ET Intelligence is the gold standard for threat researchers, offering fully verified threat intelligence with context beyond domains and IP addresses.

gain visibility

Find users affected by threats hidden in SaaS files

Proofpoint TAP SaaS Defense gives you complete visibility through the TAP Dashboard. Our web-based interface gives you graphical indicators of the types of threats, SaaS application hosting the malicious content, the number of threats found, and the number of affected users. Drill-down visibility provides data at organizational, threat, and user levels to help you prioritize alerts and act on them. The TAP dashboard provides detailed forensic information on both individual threats and campaigns is available. TAP SaaS Defense requires TAP URL or Attachment Defense.

We help answer critical questions, such as:

Deploy quickly into key SaaS applications

To protect your people, data, and brand, your security tools must work where your people do, at the pace that they do. The TAP SaaS Defense architecture enables you to deploy quickly and derive value right away. You can protect a handful to hundreds of thousands of users with a simple API integration. You’ll see results in hours or days—not weeks or months.

To protect your people, data, and brand, your security tools must work where your people do, at the pace that they do. The TAP SaaS Defense architecture enables you to deploy quickly and derive value right away. You can protect a handful to hundreds of thousands of users with a simple API integration. You’ll see results in hours or days—not weeks or months.

Documentation:

Download the Proofpoint Targeted Attack Protection for SaaS Datasheet (PDF).