Security

Close the gap in the protection of your employees at home and in the office

Share this post:

IBM partners Proofpoint and CrowdStrike integrate best-of-breed e-mail and endpoint security

More and more people are working remotely. This results in extra security risks, as also shown from the figures: 92% of all malware on a business network comes in via e-mail. How can you protect your employees against this? Watch the webinar  to find out more about integrated e-mail and endpoint security.

Business e-mail sent from endpoints such as laptops, mobile phones and tablets is currently the weakest security link in business networks. Firstly because we are working more from home – on more, different devices. Secondly due to the increasingly clever ways in which hackers are taking advantage of this. They also now know that employees are less careful if they are working on their own phone, laptop or tablet, in a trusted home environment.

Cybercriminals raise the stakes
The number of ransomware attacks are soaring and this cybercrime starts with an e-mail. With ransomware attacks systems and data are generally blocked, but criminals are now going one step further. They increasingly threaten to leak data if the victim doesn’t pay. And the number of attacks are growing. This is due to the fact that cybercrime is increasingly on an industrial scale. The proceeds of ransomware are so high and predictable that cybercriminals even dare to invest in call centers.

Survival of the fastest
Another worrying development is that hackers are getting faster all the time. It takes Russian nation state cybercriminals an average of 18 minutes to penetrate a network. Hackers who don’t work for a country are often slightly slower: it takes them an average of 4.5 hours to penetrate a business network. This is twice as quick as a year ago. This trend calls for a faster response. But this is easier said than done, as most organizations are struggling with a shortage of security personnel.

Protect e-mail & endpoint
How can we stop the growing threat from endpoint and e-mail? Technology offers the solution that can help us stop more threats with less manpower. This calls for efficient e-mail security tools, such as solutions that can put a stop to the growing number of ransomware attacks. And it requires smart endpoint security to meet the challenge of increasing endpoint vulnerability due to remote working.

IBM alliance partners Proofpoint and CrowdStrike join forces
As a supplier of data-driven e-mail security solutions, Proofpoint is strong in predicting and preventing cybercrime from incoming and outgoing e-mail. CrowdStrike provides super-fast endpoint security. This organization is also based on insights from global threat and security data. Security specialists from both partners share a vision, approach and, of course, their data and insights. This means together they have everything in house to stay one step ahead of hackers who threaten the business network via endpoint and e-mail.

IBM Security Services has included the integrated security solution in its offer. Together IBM Security, Proofpoint and CrowdStrike can better protect employees at home and in the office. On the one hand their joint action stops more e-mail threats at the gate. On the other hand organizations can react twice as fast if endpoint contamination does occur.

Watch the webinar (45min) to find out more about the integrated e-mail and endpoint security of IBM, Proofpoint and CrowdStrike.

More Security stories

Data-driven asset management with IBM Maximo Application Suite and Cloud Pak for Data

IBM has enhanced its Enterprise Asset Management platform, IBM Maximo Application Suite (MAS), with IBM Cloud Pak for Data: a supporting platform which provides a framework for combining a variety of data from different areas of an organization. How does IBM Cloud Pak for Data help organizations gain additional asset management insights from available data? […]

Continue reading

Being a data driven organization: What does this mean at Allianz?

Reading Time: 8 minutes From calculating risks and premiums to understanding customer behavior, data is of vital importance in the insurance business. Allianz, a multinational financial services company that focuses on insurance and asset management, has recently transformed its operations on a data level to reinvent its insurance business. Read an extract from a recent […]

Continue reading

Hardware is not dead – Power10 is paving the way for hybrid cloud and energy savings

  IBM has recently launched the first Power10 server. A new generation of servers, which due to changes in structure, components and functionality, provide significant improvements in terms of performance, computing power and energy consumption. These servers are paving the way for a more sustainable and flexible business based on a hybrid cloud. But what […]

Continue reading