Innocom Set to Deliver Identity Theft Protection Following Proofpoint’s Latest Acquisition


    Proofpoint Inc., a frontrunner in cybersecurity and compliance, has announced its definitive agreement to acquire Illusive, a pioneer in Identity Threat Detection and Response (ITDR). With the acquisition set to close by January 2023, Proofpoint aims to strengthen its threat and information protection platforms by incorporating proactive identity risk discovery, remediation, and post-breach defense capabilities, creating a comprehensive solution for critical threats such as ransomware and data breaches.

    The Growing Challenge of Identity-Based Attacks

    The global surge in cyberattacks has prompted threat actors to shift their focus towards identity-based attacks, resulting in 84% of organizations experiencing an identity-related breach in the past year. These attacks exploit identities through various means, such as privilege escalation, lateral movement, and abuse of Active Directory and cloud environments like Microsoft 365.

    The Illusive Advantage

    Integrating Illusive into Proofpoint’s platform will provide enterprises with unrivaled insights into the attacked and vulnerable identities across their organization, empowering them to better protect their Very Attacked People (VAPs). Illusive’s innovative solutions are trusted by leading multinational corporations to safeguard some of the world’s most renowned brands by denying attackers the privileged account access they need to execute their crimes.

    A Shared Vision for Comprehensive Identity Security

    The acquisition highlights Proofpoint’s commitment to innovation and growth, as well as its dedication to making it increasingly difficult for threat actors to succeed. Illusive’s founder and CEO, Ofer Israeli, expressed enthusiasm about joining forces with Proofpoint and contributing their unique ITDR approach to Proofpoint’s people-centric security vision.

    Together, Proofpoint and Illusive will offer a comprehensive identity security suite as part of Proofpoint’s threat protection platform, featuring:

    1. Illusive Spotlight™: An agentless approach for automatic discovery and remediation of identity vulnerabilities before attackers can exploit them, providing unmatched visibility into vulnerable identities by scanning directory structures, privileged access management solutions, endpoints, servers, and services.
    2. Illusive Shadow™: A detection and response solution for identity threats that thwarts privilege escalation and lateral movement to critical assets, with an agentless architecture that prevents attacker detection and remains undefeated in over 150 red team exercises. This enables organizations to accelerate threat detection based on attacker interaction with deceptions, rather than relying on signatures or behaviors.

    As the cyber threat landscape continues to evolve, this strategic acquisition positions Proofpoint and Illusive at the forefront of identity security, offering enterprises a powerful, unified solution to defend against the ever-growing menace of ransomware and data breaches.

    Innocom is committed to providing its customers with enhanced discovery, detection, and response capabilities. By leveraging the cutting-edge solutions offered by Proofpoint and Illusive, Innocom empowers organizations to proactively identify and remediate identity vulnerabilities, effectively detect identity-based threats, and respond rapidly to protect critical assets. With a customer-centric approach and an unwavering focus on innovation, Innocom works closely with its clients to deliver comprehensive and tailored cybersecurity solutions that address today’s ever-evolving threat landscape, ensuring the safety and security of their digital ecosystems.

    Read more about Application Delivery for Kubernetes

    Read more about Secure application delivery

    PREVIOUS Story Next Story

    Citrix Juniper Networks Palo Alto What is a firewall? Essential Guide in 2024
    April 4, 2024 by Denis Pozolotin
    How Eilat Municipality recovered from a cyber incident using Rubrik
    March 25, 2024
    Zero Trust Architecture: The Executive’s Guide to Cybersecurity Success
    March 11, 2024
    The Email Security Paradigm Shift: From Prevention to Deception
    March 1, 2024 by Benny Bitton
    Immutable Backups: A Necessity in the Modern IT Environment
    December 19, 2023
    What is XDR and a road map for successful implementation
    January 25, 2024
    Palo Alto Cortex XSIAM: A Revolutionary Approach to Security Operations
    April 9, 2024 by Gavriel Itzhaki
    Prisma Cloud: Securing the Wild West of Your Cloud Empire
    December 19, 2023
    SASE: Cyber Security’s Answer to Modern IT Demand
    December 19, 2023
    What is API Security and its Growing Importance in the Digital Age
    December 17, 2023
    What is a Web Application Firewall and How to Choose the Right One for 2024
    December 17, 2023
    NGWF VM-Series: The Next-Generation Virtual Firewall Solution
    November 29, 2023
    Palo Alto Bolsters Cybersecurity Dominance with Talon’s Acquisition
    November 9, 2023
    Higher Trust: What’s the meaning of transition from ZTNA 1.0 to ZTNA 2.0
    November 2, 2023
    Enhancing Incident Response and Data Security with Rubrik Security Cloud
    September 27, 2023
    Rubrik Rubrik Acquires Laminar: Setting the New Benchmark for Cyber Resilience
    August 20, 2023
    Rubrik Backup & Recovery for Microsoft 365
    August 6, 2023
    Rubrik Business Continuity Plan
    July 27, 2023
    Amplifying Kubernetes Power: 10 Usage Scenarios
    May 23, 2023
    Rubrik Leading the trend: Merging Backup and Security
    June 26, 2023
    Rubrik Beyond Traditional: Safeguard your backups against sophisticated attackers
    April 20, 2023
    Rubrik Rubrik Data Protection for Microsoft O365
    October 5, 2021
    Juniper Networks Juniper Networks- Welcome to Innocom Family!
    July 20, 2021
    Citrix How to secure a Source Code?
    September 9, 2020 by Denis Pozolotin
    Rubrik The Beauty of Immutability
    September 9, 2020
    Citrix Innocom Won Distributor of the Year 2020!
    January 25, 2021 by Denis Pozolotin
    Proofpoint Proofpoint Essentials Threat Protection Bundle for SMB’s
    June 3, 2021
    Proofpoint People centric: Protecting the human weaknesses
    September 9, 2020
    Palo Alto Safe and secure remote operation is one of the most important challenges for businesses today
    September 9, 2020

    Accessibility Toolbar