of the Fortune 100 7000+ Enterprise Customers 91,000+ Total Customers 300K+ Unique daily malware samples 500B+ threat graph nodes 130 of 140 Largest Global Service Providers Visibility network, email, social, partnerships
$26B+ 45% of organizations have at least 1 compromised account Exposed losses worldwide from BEC/EAC (June 2016 – July 2019) Source: FBI 36% Of VAP identities could be found via a simple web search Only 7% Of VIP identities could be found online Source: Proofpoint Threat Data. Attackers go after a range of platforms Social engineering is a pervasive and evolving threat “Very Attacked People” (VAPs) aren’t always VIPs Source: Proofpoint Threat Data. Of all phishing involved generic email harvesting 25% 99%+ Of observed attacks rely on user to run malicious code
Proofpoint. All rights reserved Attack Vectors IT Security Spending Source: 2019 Verizon DBIR Source: Gartner Network 62% Endpoint 18% Email 8% Web 12% 93% all breaches are attacks targeting people, 96% via email
- 2 4 6 8 10 12 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Percent of total volume by hour of day Tme of day, adjusted for regional time zones Global Malicious Click Hours AMER APAC EUR GLOBAL ME
risk and exposure for individuals in an organization. Averaging the attack index across industries provides important insights into risk and defensive posture for organizations of all sizes. Combined with views of “Very Attacked People” (VAPs), organizations can better understand their posture relative to the threat landscape.
25 Attack Vulnerability Privilege VAPs Access to Valuable Data Work in High Risk Ways Receive highly targeted, very sophisticated, or high volumes of attacks Clicks on malicious content, fails awareness training, or uses risky devices or cloud services Can access or manage critical systems or sensitive data Targeted by Threats