List of Proofpoint Emerging Threat (ET) Intelligence Integrations
This is a list of platforms and tools that integrate with Proofpoint Emerging Threat (ET) Intelligence. This list is updated as of April 2025.
-
1
CrowdStrike Falcon
CrowdStrike
Empower your defense with advanced, intelligent cybersecurity solutions.CrowdStrike Falcon is an advanced cloud-based cybersecurity solution designed to provide strong protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. Leveraging artificial intelligence and machine learning, it allows for immediate detection and reaction to potential security breaches, featuring capabilities such as endpoint protection, threat intelligence, and incident management. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, ensuring security without significantly impacting system performance. Its cloud infrastructure allows for rapid updates, flexibility, and quick threat mitigation across large and diverse networks. With its comprehensive array of security tools, Falcon equips organizations to proactively thwart, detect, and manage cyber threats, making it a vital asset for modern enterprise cybersecurity. Furthermore, its ability to seamlessly integrate with existing systems not only enhances security measures but also helps to minimize disruptions in operational workflows, reinforcing its value in a rapidly evolving digital landscape. The ongoing commitment to innovation ensures that users remain equipped to face the ever-changing cybersecurity landscape with confidence. -
2
A single platform offers endless opportunities to engage with both your customers and staff. Any application can be made secure with authentication capabilities. Okta enables you to swiftly develop experiences that are both secure and enjoyable. By integrating Okta's Customer ID products, you can assemble the necessary framework to ensure security, scalability, and dependability. Safeguard and empower your employees, contractors, and partners effectively. Okta’s workforce identification solutions ensure that your employees remain protected regardless of their location. You will be equipped with essential tools to streamline cloud transitions and facilitate hybrid work environments. Trusted by organizations worldwide, Okta is committed to safeguarding workforce identities while promoting seamless connectivity across various platforms. This reliability and trust make Okta a go-to choice for businesses aiming to enhance their security infrastructure.
-
3
Palo Alto Networks NGFW
Palo Alto Networks
Empower your security with advanced, intelligent, automated solutions.Our hardware solutions equipped with ML-Enhanced NGFW technology empower users to proactively address unidentified threats, achieve comprehensive visibility across all devices, including IoT, and reduce errors with automated policy recommendations. The VM-Series functions as the virtual equivalent of our ML-Enhanced NGFW, protecting your applications in both private and public cloud environments through efficient segmentation and robust threat prevention strategies. Concurrently, the CN-Series, specifically crafted for containerized settings, guarantees that complex network threats cannot spread across Kubernetes namespace boundaries, significantly bolstering security measures. Collectively, these advanced solutions offer a thorough defense framework tailored to meet the unique needs of various infrastructures, ensuring that organizations can adapt to evolving security challenges effectively. This multifaceted approach not only enhances protection but also simplifies management for IT teams. -
4
ThreatConnect Risk Quantifier (RQ)
ThreatConnect
Transform financial cyber risks into actionable insights effortlessly.ThreatConnect RQ serves as a financial cyber risk quantification tool designed to help organizations pinpoint and convey the cybersecurity threats that pose the greatest financial risks. Its goal is to empower users to enhance their strategic and tactical decision-making by assessing risks in relation to their business, technical landscape, and sector-specific data. The solution streamlines the creation of financial cyber risk reports associated with the organization, its cybersecurity efforts, and existing controls, generating automated outputs within hours for timely and relevant insights. By facilitating rapid risk modeling, the vendor claims that clients can quickly kick off their assessments and adjust or fine-tune their models as needed, rather than starting from scratch. This tool utilizes historical breach information and threat intelligence from the outset, effectively eliminating months of data gathering while alleviating the ongoing responsibility of updates. Furthermore, the efficiency of this approach not only saves time but also helps organizations stay ahead in their cybersecurity strategies. -
5
ThreatBlockr
ThreatBlockr
Enhance your network security with modern, comprehensive protection.To effectively protect your network from every conceivable threat, a comprehensive solution is crucial. Relying on outdated firewall systems without incorporating modern security tools like ThreatBlockr® leaves your network exposed to cyber threats. Conventional firewalls are particularly susceptible to encrypted attacks, can be bypassed through port forwarding and fragmented packets, and frequently suffer from misconfigurations. Additionally, these traditional systems often struggle with basic web and messaging protocols, while challenges like side-channel attacks, BYOD policies, and remote work arrangements only amplify these risks. Organizations have the opportunity to utilize ThreatBlockr® for immediate enhancements in network security without needing to completely revamp their existing security architecture, whether their environment is on-premise, cloud-based, or a hybrid model. By adopting ThreatBlockr® now, you can bolster your security measures and achieve peace of mind, confident that your network remains secure regardless of your operational setting. This approach not only delivers a highly secure network but also significantly improves the performance and effectiveness of your firewalls, ensuring a robust defense against evolving threats. In a landscape where cyber threats are increasingly sophisticated, taking proactive measures is essential for any organization aiming to protect its digital assets. -
6
Corelight
Corelight
Empower your cybersecurity with seamless, efficient network protection.Corelight delivers the benefits of Zeek while eliminating the complexities tied to Linux, network interface card concerns, and the possibility of packet loss. The installation process takes mere minutes, allowing your talented team to dedicate their efforts to threat hunting instead of troubleshooting technical issues. Built on open-source technology, this powerful platform grants you complete access to your metadata, enabling tailored solutions and expanded functionalities while fostering an interactive community. Our elite team of Zeek experts and contributors is complemented by a world-class customer support group that consistently wows clients with their remarkable knowledge and prompt assistance. With the Corelight Dynamic Health Check feature enabled, your Corelight Sensor sends performance metrics back to Corelight, facilitating the early identification of potential problems such as disk failures or abnormal performance indicators. This proactive approach helps ensure that your network remains both secure and operationally effective at all times. Ultimately, Corelight empowers organizations to protect their networks with confidence and efficiency, enhancing overall cybersecurity resilience. In a landscape where threats evolve rapidly, having a reliable partner like Corelight can make all the difference in maintaining a robust security posture.
- Previous
- You're on page 1
- Next