Overview Benefits Products Key Features Related Resources
Overview
Without understanding user risk, security controls and awareness programs are blind.
Most cybersecurity issues can be traced back to human error. Although many organisations have security controls and some form of security awareness education in place to mitigate this issue, they lack visibility into where their human risk lies. Without knowing their most vulnerable users, organisations cannot protect them adequately, nor prepare them to recognise and prevent attacks.
1%
of cyber attacks can be traced back to human error
1%
of working adults took risky actions to bypass security knowingly
1%
or less of organisations conduct phishing simulations
Benefits
Unlock full user risk visibility and drive behaviour change.
Proofpoint human-centric intelligence provides invaluable insights into vulnerable, privileged, and targeted individuals within the organisation, pinpointing those most likely to be compromised and enabling organisations to apply their strongest human-centric controls where they will mitigate the most risk.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (1) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (1)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Intro_LgImage.png.webp?itok=5Uh6wugO)
Proofpoint Security Awareness empowers your people with a user-centric and threat-driven program that drives behaviour change and builds sustainable security habits.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (2) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (2)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Intro_SmallImage.png.webp?itok=QFcCaDdj)
Our approach unifies behavioural science-proven nudges, tailored microlearning, and programs that incorporate actual threats faced by employees, driving behaviour change and building sustainable security cultures that measurably improve over time.
Identify Risk
Identify vulnerable, attacked, and privileged (VAPs) individuals within the organisation and who are most likely to be compromised.
Adaptive Protection
Protect your most risky and privileged used with specific security controls.
Change Unsafe Behaviour
Create sustainable security habits by using personalised content for each user’s needs.
Evaluate and Scale
Measure performance and make group wide decisions with multitenant administration.
Report Back
We measure behavioural metrics that matter to your executive leadership.
Products
Turn your employees into active defenders
Focus on true risk within your organisation
Proofpoint identifies vulnerable users using multiple methods— we identify what users know with adaptive learning assessments; what users do when faced with threats with phishing simulations that mimic real-world attacks; and what users believe with short and concise assessments.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (3) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (3)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Benefit_DriveTrueChange_0501.png.webp?itok=rX_fIu5_)
Powerful integrations
Integrated with Proofpoint Threat Protection, we unveil Very Attacked People and top clickers. Nexus People Risk Explorer (NPRE) quantifies people risk by considering user vulnerability, attack index, and business privilege, revealing the riskiest users.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (4) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (4)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Benefit_AccelerateResponse_0501.png.webp?itok=3nhRI1-i)
Drive true change and sustainable habits
Proofpoint provides users with a personalised learning experience that aligns with their role, vulnerabilities, competencies, and language. We keep users resilient against today’s threat landscape by educating them on trending threats with our threat-driven content. Proofpoint creates a security awareness culture that results in many customers seeing a 40% decrease in clicks on real world threats and a 90% reduction in malware infections.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (5) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (5)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Benefit_ReduceVulnerability_0501.png.webp?itok=yfd14qmA)
Better Communicate people risk and program impact
Proofpoint Nexus People Risk Explorer gives security executives a comprehensive but simple report summarising the risk people pose to the rest of the organisation. Proofpoint Security Awareness provides behavioural metrics that matter to your executive leadership.
Accelerate threat investigation and response
Proofpoint Security Awareness makes it easy for end users to report suspicious messages. When integrated with Threat Response Auto-Pull, Proofpoint can automate the analysis and remediation of end-user reported emails, thus reducing manual work for the incident
response team.
Key Features
Key features of our Security Awareness Training
Assess user risk through a whole new lens
Proofpoint helps you identify your most vulnerable users, including top clickers and users that are being targeted with a significant volume of attacks. With this, you get a data-driven security awareness program that goes beyond phishing simulation.
We provide you with:
- Phishing/USB simulations based on real-world threats
- Knowledge assessments
- Security culture assessments
- Reports that identify your Very Attacked People (VAPs) and top clickers
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (6) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (6)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Feature_PeopleRiskExplorer_0501.png.webp?itok=BEEVLcd9)
A personalised learning experience
The Proofpoint content library provides you with a wide range of educational topics, formats, and support materials. With our rich threat intelligence, our solution helps users understand real-world security risks, privacy threats and compliance rules. You can now create a truly global training program that users across different functions, regions and languages will understand.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (7) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (7)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Benefit_PersonalizedLearning_0501.png.webp?itok=x-oji5Ad)
Measure program success and user vulnerability
Proofpoint allows you to effectively measure your program’s progress over time with metrics. With Proofpoint Security Awareness Training, you can:
- Can track behaviour for both simulations and real emails (even in real time)
- View a single dashboard that captures behaviour change and reveals user vulnerability.
- Get benchmarks against industry peers.
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (8) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (8)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/webp_conversion/public/product%20panels/MitigateHumanRisk_Feature_MeasureSuccess_0501.png.webp?itok=bVbZilGQ)
Real time coaching
Reinforce positive user behaviour with just-in-time training like Teachable Moment and Phish Hooks.
CISO Dashboard
Our CISO dashboard provides C-level visibility, making it easier to gather and communicate program performance and impact to the board.
Phish Alarm
Proofpoint accelerates threat response by automatically analysing user-reported messages. We make it easier for end users to report suspicious messages, even when they’re accessing email via mobile devices.
Easily expand and scale your program
Proofpoint Security Awareness Enterprise gives you the power of automation and scalability. With our multitenant administration capabilities, you can group-wide decisions, while also branding your security awareness content in 40+ different languages.
Related
Related mitigating human risk products from Proofpoint
Stop Human-Targeted Attacks
Stop the full range of attacks targeting your people, including threats, impersonation attempts and supplier fraud.
Learn More
Impersonation Protection
Holistic brand and supplier defense that stops 100% of domain spoofing.
Learn More
Adaptive Email Security
Stop more threats, including internal phishing, with a fully integrated layer of behavioural AI.
Learn More
Identity Protection
Secure vulnerable identities, stop lateral movement and privilege escalation.
Learn More
Resources
The latest developments in mitigating human risk
![Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (9) Identify, assess,
and mitigate people-based cybersecurity risks | Proofpoint UK (9)](https://i0.wp.com/www.proofpoint.com/sites/default/files/styles/promo_featured_1100_auto/public/promo-image/pfpt-promo-image-sotp-2024.jpg.webp?itok=x5yY9QG2)
Featured Resource