Vendor Sheet

Your Data and Identity Threat Assessment

Your Data and Identity Threat Assessment

Pages 2 Pages

This overview details how Proofpoint ensures data security during its Identity Threat Assessment. Using ephemeral AWS instances, all customer data is destroyed after evaluation, ensuring compliance with ISO 27001, SOC 1/2/3, and GDPR. Only authorized staff access the data, with no passwords stored. The process involves running a lightweight Beacon tool on a single endpoint, sending encrypted analysis to Proofpoint experts who generate risk reports. Customers benefit from a secure, efficient, one-time assessment that reveals identity threats and provides actionable mitigation insights, without requiring complex deployments or exposing sensitive data.

Join for free to read