Try our new research platform with insights from 80,000+ expert users

More on Targeted Attacks and How to Protect Against Them

AV
Editor at a tech company with 11-50 employees
  • 14
Published:Sep 27, 2021
Explore related topics
Search for a product comparison in Advanced Threat Protection (ATP)
PeerSpot user
PeerSpot user
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: December 2025.
879,422 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
VP Product at PeerSpot
Dec 1, 2024
Dec 1, 2024
Advanced Threat Protection is crucial for companies as it offers comprehensive security against complex cyber threats. Important aspects to consider: Real-time threat detection Automated response capabilities Behavioral analysis E-mail protection Data loss prevention Understanding the importance of Advanced Threat Protection starts with its ability to detect threats in real-time, minimizing pot...
See 2 answers
Zahid-Muhammad - PeerSpot reviewer
Cyber Security Manager at Addison Lee Ltd
Jun 12, 2024
ATP (Advanced Threat Protection) is important for companies because it detects, prevents, and responds to sophisticated cyber threats, enhancing security and protecting critical data and systems from attacks.
Rivka Alexander - PeerSpot reviewer
Content Specialist at PeerSpot
Dec 1, 2024
Advanced Threat Protection is crucial for companies as it offers comprehensive security against complex cyber threats. Important aspects to consider: Real-time threat detection Automated response capabilities Behavioral analysis E-mail protection Data loss prevention Understanding the importance of Advanced Threat Protection starts with its ability to detect threats in real-time, minimizing potential disruption. Cyber threats evolve rapidly, making it essential for businesses to have a security solution that can anticipate and neutralize these dangers before they infiltrate systems. ATP solutions offer real-time monitoring and analysis, quickly identifying unusual patterns that may indicate malicious activity. This capability streamlines a company's ability to respond promptly, reducing potential damage and decreasing recovery time from security breaches.Another significant factor of ATP’s importance is its automated response mechanisms. ATP allows companies to respond to threats swiftly, often without manual intervention. This automation is vital, reducing human error and ensuring consistent application of security protocols. ATP also includes solutions for e-mail protection, which is a primary vector for attacks through phishing or malicious attachments. By integrating these features, ATP ensures comprehensive data loss prevention measures, protecting sensitive corporate information from unauthorized access. The combination of these capabilities underscores ATP's essential role in protecting a company's assets and maintaining the integrity of its operations.
EhabAli - PeerSpot reviewer
Sr. Cybersecurity Solutions Architect at BMB
Jun 27, 2023
Jun 27, 2023
Hi, I think the other answers are a little off. Sure, Take-down bundles for fake internet Sites are a thing to look at, although the initial Brand Protection starts with well-managed DNS and DNS Authentication methods like DKIM and DMARC. That goes even further with BIMI for instance. Having a good DMARC analyzer will actually show you if someone is using your domain or brand to contact the oth...
2 out of 4 answers
May 17, 2023
Hi Ehab, I'm Karim Sabry from Giza Systems. It all boils down to how many channels can be monitored and where are they authorized to initiate a takedown and the time to take down (SLA). Channels can be Fake Internet Domains, Social Media various channels (LinkedIn, Facebook, Instagram, etc..), Dark Web chatter around brand and IP mentions, attack plans, and adversary motivations.
AJITHH G - PeerSpot reviewer
Solution Engineer at AppSmart
May 18, 2023
Sometimes you need to look for tools based on your business and compliance requirements.Otherwise, you will end up having too many tools for the same things, which doesn't make any sense.Evaluate the business and identify the requirements.Gather the dependency and check the skills of your resources to manage.
Download Free Report
Download our free Advanced Threat Protection (ATP) Report and find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint, and more! Updated: December 2025.
DOWNLOAD NOW
879,422 professionals have used our research since 2012.