NCA's Groundbreaking Phishing Defense with Proofpoint and Palo Alto Networks

 Posted by Susan Sison on Jun 14, 2017 8:17:00 AM

Phishing Proofpoint NCA PaloAlto

Phishing attacks are among the most dangerous threats on the Web today.

They can happen any time, targeting businesses and individuals alike. A phishing attack disguises malware as an attachment to an “official-looking” email or instant message, infiltrating the network by convincing a user to download or run an infected file. From there, the malware spreads on its own.

The last two years have seen phishing attacks take place at an unprecedented rate.

Today, international criminal cartels use phishing attacks to capture sensitive information, bring down networks, and plant “ransomware” that costs victims thousands or even millions of dollars. Some recent attacks have targeted the medical devices in hospitals, putting lives at risk.

Recently, NCA has developed proactive new solutions to the phishing threat. We estimate that, internally and among our clients, these solutions have prevented tens of millions in damages.

With Proofpoint and Palo Alto Networks, NCA Has the Solution to Phishing

NCA has helped businesses around the world harden their security in an environment of ever-increasing threats. Recently, we launched a campaign to uplevel our capacity to fight modern phishing attacks and support client targeted by these attacks.

Our solution: A synthesis of technologies built on Proofpoint and Palo Alto Networks.

Even with the most advanced defensive technology on the Web, there is still the problem of “patient zero” – that is, the first instance of a new type of attack. No single product produced the speed, awareness, and robust security NCA’s top security architects were looking for.

Proofpoint’s inbound email security offers a powerful layer of defense for the most common phishing attack vector: Email. Palo Alto Networks, on the other hand, is one of the world’s top creators of enterprise-grade firewall technology.

Through integration of these two products – backed by NCA expertise – an unprecedented level of protection is possible under “patient zero” scenarios.

NCA Successfully Deflects Intense Attack With New Solution Set

From the moment Proofpoint and Palo Alto Networks came online in our systems, we had the chance to appreciate how integrated reports could accelerate incident analysis for our clients. Faster analysis means we can provide actionable steps and harm remediation faster.

However, no one could have predicted that we would soon be using the same new solution set to defend our own network from a coordinated attack.

As a security thought leader, it’s no surprise NCA is a high-profile target for a variety of bad actors. Shortly after implementation of Proofpoint and Palo Alto, we were subject to a sustained assault from a new phishing attack variant that bypassed all known security measures.

In another enterprise, this could have resulted in a deeply compromised network.

Thanks to quick thinking and excellent technology, NCA was able to deflect the attack with no operational problems. As soon as an NCA employee received a phishing email, threat response features alerted our security team – and the message was eliminated before it could be opened.

Likewise, all links from the attack email were automatically cataloged to stop future threats.

A New Era of Advanced Email Security and Proactive Threat Response

Under normal circumstances, non-technical personnel are targeted by hackers because they are seen as more likely to respond to phishing emails in predictable ways. Until now, the only true solution was to rigorously train all personnel on threat recognition and response.

While it will always be necessary for non-technical personnel to understand security basics, an undue burden of security procedures can have the opposite of the intended effect: It may numb users to the importance of remaining alert and vigilant in a diverse threat environment.

In effect, the weakest point of security in any enterprise can be protected and attacks diverted to security experts. That leaves everyone free to focus more attention on what they do best for the enterprise, while investments on enterprise-wide security training can be recovered.

In essence, it’s the win-win scenario security and non-security pros have been waiting for.

NCA Recommends Proofpoint and Palo Alto Networks

NCA’s security strategists have developed powerful new integrations that significantly improve the way Proofpoint and Palo Alto Networks combine to neutralize phishing campaigns. On their own, however, both these products already represent a quantum leap forward.

If your enterprise wants to stop active threats before they reach front-line employees, Proofpoint and Palo Alto Networks are two essential keystones. With them, you can enjoy the benefits of a proactive security strategy where attacks are stopped before they can start.

The team at NCA stands ready to help you implement and customize either or both of these products to meet your needs. No matter the size of your business or its complexity, we have the insight to give you value from your security investments from the first day they become active.

To find out more, contact NCA today.