Proofpoint, Inc. announced a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms, empowering organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider threats. The new innovations further enhance Proofpoint's leading threat and information protection platforms, in addition to its newly formed Identity Threat Defense business (formerly known as Illusive), to help organizations augment and safeguard their productivity investments, such as Microsoft 365, with maximum deployment flexibility. Proofpoint Aegis Threat Protection Platform is the only AI/ML-powered threat protection platform that disarms today's advanced attacks, including Business Email Compromise (BEC), phishing, ransomware, supply chain threats and more.

With flexible deployment options using both APIs and inline architecture, Aegis delivers advanced AI-powered, cloud-based protection that complements native Microsoft 365 defenses. By combining the company's proprietary behavioral analytics and threat intelligence, Proofpoint is delivering new capabilities that provide visibility into account takeover-based attacks - from both within an organization's environment and outside suppliers. NEW; Supplier Threat Protection: Trusted supplier relationships are a growing attack vector: 69% of organizations experienced a supply chain attack within the past year, and CISOs rate it as one of their top concerns.

With Proofpoint Supplier Threat Protection, available now, organizations can detect compromised supplier accounts so that security teams can swiftly investigate and remediate. This new product proactively monitors for and prioritizes known compromised third-party accounts, simplifies investigation with details on why the account is suspected compromised and which employees recently communicated with the account in question, enabling security teams to seamlessly defend against prevalent third-party attacks such as BEC and phishing.