''Because threat actors target employees as the weakest link, companies need to continuously train employees and arm them with real-time threat data,'' said Gary Steele, CEO of Proofpoint in Sunnyvale, Calif. ''The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric cyberattacks, as cybercriminals look for new ways to exploit the human factor.''. Learn about our threat operations center and read about the latest risks in our threat blog and reports. Uniquely with the combined solutions, organizations will be able to: Proofpoint expects the acquisition of Wombat Security to have the following impact to its financial outlook for the first quarter, and full year 2018, as previously provided on February 6, 2018: Additional commentary on Wombat’s contribution to Proofpoint’s 2018 financial outlook: Note that all of these guidance assumptions are in accordance with ASC 606, which Proofpoint adopted effective January 1, 2018, as were its original guidance metrics provided on February 6, 2018. Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. In June 2008 the company was founded by Drs. Learn about the latest security threats and how to protect your people, data, and brand. Founded based on pioneering research into phishing attacks, Wombat is recognized by Gartner in the Leaders Quadrant of the Magic Quadrant for Security Awareness Computer-Based Training. Several key leaders of Wombat continue to boast CMU connections. Proofpoint is an enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery ("eDiscovery"), and email archiving.It claims over half of the Fortune 100 as users of its solutions. By acquiring Wombat, the Sunnyvale, California-based company adds phishing simulation and security training to its suite of products. We do not provide a reconciliation of the non-GAAP financial measures for the quarter ending March 31, 2018, and the full year 2018 herein to our comparable GAAP financial measures because we could not do so without unreasonable effort due to unavailability of information needed to calculate reconciling items and due to variability, complexity and limited visibility of the adjusting items that would be excluded from the non-GAAP financial measures for those periods. Learn about the technology and alliance partners in our Social Media Protection Partner program. Using them, customers have reduced successful phishing … Phishing attacks trick people into divulging sensitive information, such as usernames and passwords, or into installing malware by sending them emails that appear to come from legitimate, trusted sources. ''We all recognized there was demand for solutions that we had developed at CMU,'' Sadeh added, ''and we’ve been gratified with the success the company has achieved. Defend against threats, ensure business continuity, and implement email policies. Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. It is possible that future circumstances might differ from the assumptions on which such statements are based. She is also a co-founder of Wombat Security Technologies, Inc, a security awareness training company that was acquired by Proofpoint. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market All other trademarks contained herein are the property of their respective owners. We may also calculate billings in a manner that is different from other companies that report similar financial measures. “The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric, social engineering-driven cyberattacks, and we are thrilled to welcome Wombat’s employees to the Proofpoint team.”. The adjusted tax provision is then compared to the GAAP tax provision, and the difference is reflected as "income tax benefit (expense)" in the reconciliation between GAAP net loss/income and Non-GAAP net loss/income. Terms and conditions Learn about our unique people-centric approach to protection. Privacy Policy Today’s cyber attacks target people. Wombat Security Technologies, a … There are a number of limitations related to the use of billings versus revenue calculated in accordance with GAAP. Our research at CMU has effectively created an entirely new segment in the cybersecurity industry, one that focuses on the human element,'' said Norman Sadeh, professor of computer science and chairman and chief scientist of Wombat. View Proofpoint investor relations information, including press releases, financial results and events. All forward-looking statements herein reflect our opinions only as of the date of this release, and Proofpoint undertakes no obligation, and expressly disclaims any obligation, to update forward-looking statements herein in light of new information or future events. However, in order to provide a complete picture of our recurring core business operating results, we also exclude from non-GAAP net loss the tax effects associated with stock-based compensation and the amortization of intangibles and costs associated with acquisitions and litigation, and non-cash interest expense related to the convertible debt discount and issuance costs for the convertible debt offering. ''Because threat actors target employees as the weakest link, companies need to continuously … We have provided in this release financial information that has not been prepared in accordance with GAAP. Lorrie Cranor, Jason Hong, and Norman Sadeh, all faculty members at the CMU School of Computer Science. Choose business IT software and services with confidence. In addition to Sadeh, Cranor and Hong, Alessandro Acquisti, professor of information technology and public policy, Anthony Tomasic, senior systems scientist in the Language Technologies Institute, and former PhD students Ponnurangam Kumaraguru, Steve Sheng, Justin Cranshaw, Patrick Gage Kelley, Ian Fette and Guang Xiang contributed to the initial CMU technology licensed by Wombat. More information is available at www.proofpoint.com. The deal was announced by Proofpoint last month. University of California at Berkeley PhD Computer Science, Human Computer Interaction. “As cybercriminals continue to look for new ways to exploit employees, companies need to be vigilant about changing end-user behavior and reducing risk with cybersecurity education solutions,” said Gary Steele, Proofpoint CEO. His research is in the areas of usability, mobility, privacy, and security. Block and resolve inbound threats across the entire email attack vector. Non-GAAP net loss. Proofpoint Inc. (NASDAQ:PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Learn about the benefits of becoming a Proofpoint Extraction Partner. These forward-looking statements include statements regarding the future financial impact of the acquisition, future financial results for Proofpoint and benefits of the acquisition and integration of Wombat’s products. Wombat Security Technologies (acquired by Proofpoint, Inc.) Wombat Security Technologies, Inc. is the first and only company to offer a complete suite of anti-phishing and cyber security awareness assessment and training products that leverage progressive training techniques of professional educators to effectively improve human response against cyber-attacks up to 70%. It is estimated that over 90% of cyber attacks today involve phishing emails. Connect with us at events to learn how to protect your people and data from ever‑evolving threats. Learn why organizations are moving to Proofpoint to protect their people and organization. Analysis of free cash flow facilitates management's comparisons of our operating results to competitors' operating results. Access the full range of Proofpoint support services. All of Wombat’s training modules focus on practical, concise advice and information that employees need to know, rather than lectures about practices and policies they don’t care about, Sadeh said. Sunnyvale, Calif.—March 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security Technologies, Inc., a leader for phishing simulation and security awareness computer-based training. Advance your strategy to solve even more of today's ever‑evolving security challenges. Wombat, which helps companies educate employees on the dangers of phishing attacks and how to avoid them, grew out of a research project at Carnegie Mellon University in 2008. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. Secure your investments in Microsoft 365, Google G Suite, and other cloud applications. You’ll learn how to: - Assess your … Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media and mobile apps, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. '', Byron Spice | 412-268-9068 | bspice@cs.cmu.edu. Stand out and make a difference at one of the world's leading cybersecurity companies. Protect your people and data in Microsoft 365 with unmatched security and compliance tools. Wombat Security Technologies has announced the acquisition of ThreatSim. Earlier this month, security awareness training firm Wombat Security agreed to be acquired by Proofpoint for $225 million in cash. Protect against email, mobile, social and desktop threats. Billings include amounts that have not yet been recognized as revenue, but exclude additions to deferred revenue from acquisitions. ''This sale is a tribute to the faculty who created Wombat, as well as to the alumni who are key leaders at Proofpoint, and to all those who are helping to ensure CMU expertise benefits society more broadly.''. Sunnyvale, Calif.—March 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security … Deliver Proofpoint solutions to your customers and grow your business. Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+. “Because threat actors target employees as the weakest link, companies need to continuously train employees and arm them with real-time threat data,” said Gary Steele, Proofpoint CEO, about the acquisition. Episodes feature insights from experts and executives. The company, headquartered in Pittsburgh’s Strip District, initially focused on leveraging learning science principles to help organizations train their employees to recognize and avoid email ''phishing'' attacks. Developer of a security awareness and training software designed to help organizations teach their employees to secure behavior and strengthen organization security posture. Wombat Security Technologies was acquired by Proofpoint for $225M on Feb 6, 2018. Proofpoint acquired Wombat Security in 2018 and has since rebranded the portfolio of security awareness capabilities A key differentiator is the ThreatSIM approach that aims to simulate … With the completion of the acquisition, organizations will be able to leverage the industry’s first solution combining market-leading phishing protection with market-leading awareness. Proofpoint, Inc., (NASDAQ:PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. In order to provide a complete picture of our recurring core business operating results, we also compute the tax effect of the adjustments used in determining our non-GAAP results by calculating an adjusted tax provision which considers the current and deferred tax impact of the adjustments. By collecting data from Wombat’s PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by non-Proofpoint customers, providing broader visibility and insight to the Proofpoint Nexus platform. Protect from data loss by negligent, compromised, and malicious users. Feb 7, 2018 | CYBERSCOOP Proofpoint has announced it has entered into an agreement to purchase Pittsburgh-based Wombat Security Technologies for $225 million in cash. Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. We believe that the use of these non-GAAP financial measures provides an additional tool for investors to use in evaluating ongoing operating results and trends and in comparing our financial results with other companies in our industry, many of which present similar non-GAAP financial measures to investors. Simplify social media compliance with pre-built content categories, policies and reports. ''The university was very supportive of our efforts from the beginning,'' Sadeh said, noting CMU made it easy to negotiate for intellectual property. The deal was announced by Proofpoint last month. By collecting data from Wombat's PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by non- Proofpoint customers, … Read the latest press releases, news stories and media highlights about Proofpoint. Wombat Security announced today that it is acquiring ThreatSim—a company that focuses on spear phishing prevention. An industry-first combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training. Education. We consider this non-GAAP financial measure to be a useful metric for management and investors for the same reasons that we use non-GAAP operating loss. Our SaaS-based solutions and Continuous Training Methodology were developed by Wombat Security Technologies (acquired in March 2018) and born from research at the world-renowned Carnegie Mellon University. Reduce risk, control costs and improve data visibility to ensure compliance. In 2016 she served as Chief Technologist at the US Federal Trade Commission. Learn about our relationships with industry-leading firms to help protect your people, data and brand. >> We noted the passing of the WhyMe podcast here last week. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. In typical CMU fashion, Norman, Lorrie and Jason were able to solve the problem because they understood that people and technology are inextricably linked.''. As a result of the varying impacts of each item, the effective tax rate for the adjusted tax provision will vary period over period as compared to the GAAP tax provision. Proofpoint is a registered trademark or tradename of Proofpoint, Inc. in the U.S. and/or other countries. We define free cash flow as net cash provided by operating activities minus capital expenditures. Stop advanced attacks and solve your most pressing security concerns with our solution bundles. Protect against digital security risks across web domains, social media and the deep and dark web. But as the company expanded – including offices in Denver and London – and after Joe Ferrara, a veteran tech executive, succeeded Sadeh as CEO in 2011, both the number and diversity of employees has grown. A Pittsburgh-based security awareness and training software company was acquired for $225 million by a Silicon Valley cybersecurity company. Wombat has long benefited from recruiting CMU alumni, Sadeh said – so much so that some investors worried in the early years about an overabundance of CMU-related employees. Learn about our global consulting and services partners that deliver fully managed and integrated solutions. ''You always have high expectations when you start a company, but there’s nothing more rewarding than to see results of your research having an impact on this scale. Wombat will integrate ThreatSim’s spear-phishing solutions and other capabilities with its existing security education portfolio, the companies said. One podcast that we've glommed onto in the absence of WhyMe is the U.K.-based Indiepop Radio Podcast, a nice concise presentation of catchy numbers that has yet to disappoint us.It has also been the first outlet to expose us to a number of quality acts including The Wombats and, more recently, California Snow Story. CMU’s Center for Technology Transfer and Enterprise Creation and Swartz Center for Entrepreneurship help to facilitate and accelerate the movement of research and technology out of the university and into the global marketplace. In October 2015, Wombat Security acquired ThreatSim®, bringing together two of the leading simulated phishing attack tools. The deal was announced by Proofpoint last month. 1 Introduction & Overview Who Participated in the Survey? The modules are interactive in nature and include quick quizzes centered around practical, everyday situations that help reinforce practical learning. We consider billings to be a useful metric for management and investors because billings drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the quarterly revenue that we recognize. Secure your remote users and the data and applications they use. Safeguard business-critical information from data exfiltration, compliance risks and violations. Compare verified reviews from the IT community of WeComply (Acquired by Thomson Reuters) vs Proofpoint (Wombat Security) in Security Awareness Computer-Based Training Wombat Security Technologies is a company born from research at the world-renowned Carnegie Mellon University (CMU). We define billings as revenue recognized plus the change in deferred revenue from the beginning to the end of the period, but excluding additions to deferred revenue from acquisitions. All rights reserved. Proofpoint Completes the Acquisition of Wombat Security. Sadeh co-founded the company with Lorrie Faith Cranor, FORE Systems Professor of computer science and engineering and public policy, and Jason Hong, associate professor of computer science. Stay ahead of email threats with email security from the exclusive migration partner of Intel Security. Sadeh and Cranor teach in the Institute for Software Research and Hong is a faculty member of the Human-Computer Interaction Institute. For more information on Proofpoint Nexus, please visit https://www.proofpoint.com/us/technology-platform. Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. This press release contains forward-looking statements that involve risks and uncertainties. Celebrating the Life & Legacy of Dr. Martin Luther King, Jr. A Conversation with ProFellow Founder Vicki Johnson, The Allen Newell Award for Research Excellence, Center for Technology Transfer and Enterprise Creation, Observance of Martin Luther King, Jr. Day, CARNEGIE MELLON CHAMBER SERIES: Clarion Quartet Plays Weinberg, Profellow Workshop: How to Find and Compete for Competitive Fellowships. ''Phishing and cybersecurity in general are more than technical problems; they are people problems. Free cash flow. Learn about the human side of cybersecurity. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market Security awareness firms have been the subject of significant funding and M&A transactions in recent months. Get deeper insight with on-call, personalized assistance from our expert team. Management compensates for this limitation by providing information about our capital expenditures on the face of the cash flow statement and in the "Management's Discussion and Analysis of Financial Condition and Results of Operations - Liquidity and Capital Resources" section of our quarterly and annual reports filed with the SEC. An industry-first combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training. We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance. Defend against cyber criminals accessing your sensitive data and trusted accounts. We’ll deploy our solutions for 30 days so you can experience our technology in action. Important factors that could cause results to differ materially from the statements herein include: risks related to integrating the employees, customers and technologies of the acquired business; assumption of unknown liabilities; ability to retain customers of Wombat; risks associated with successful implementation of multiple integrated software products and other product functionality; competition, particularly from larger companies with more resources than Proofpoint; risks related to new target markets, new product introductions and innovation and market acceptance thereof; the ability to attract and retain key personnel; potential changes in strategy; unforeseen delays in developing new technologies and the uncertain market acceptance of new products or features; global economic conditions; and the other risk factors set forth from time to time in our filings with the SEC, including our Annual Report on Form 10-K for the twelve months ended December 31, 2017, and the other reports we file with the SEC, copies of which are available free of charge at the SEC's website at www.sec.gov or upon request from our investor relations department. The founders’ approach – sending simulated phishing emails to employee inboxes – was a major departure from traditional training methods, but has since become the de facto industry standard. Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. The ink is barely dry on the State of the Phish Report 2018 and it is about to have a new home.. Proofpoint announced that it will acquire Wombat for $255 million in cash. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. All three are members of CMU’s CyLab Security and Privacy Institute. Billings. Sitemap, Proofpoint Completes the Acquisition of Wombat Security, “One for the Books”: Health IT Leaders Share Their Biggest Takeaways from 2020, 3 Ways to Adapt Your Cybersecurity Messaging for Generation Z, How to Spot a Phishing Email (and What to Do if You Took the Bait), Simulated Phishing and Knowledge Assessments, Managed Services for Security Awareness Training, https://www.proofpoint.com/us/technology-platform, Use real detected phishing attacks for simulations, assessing users based on the threats that are actually targeting them, Both investigate and take action on user-reporting phishing, leveraging orchestration and automation to find real attacks, quarantine emails in users’ inboxes, and lock user accounts to limit risk, Train users in the moment immediately after they click for both simulated and real phishing attacks, Increase the billings range to $864 - $869 million as compared to the previous range of $828 - $833 million, Increase the revenue range to $691 - $696 million as compared to the previous range of $660 - $665 million, Reduce the non-GAAP net income range to $46 - $50 million as compared to the previous range of $52 - $56 million, Increase the free cash flow range to $140 - $142 million as compared to the previous range of $138 - $140 million, Increase the billings range to $182 - $184 million as compared to the previous range of $180 - $182 million, Increase the revenue range to $151 - $153 million as compared to the previous range of $149 - $151 million, Reduce the non-GAAP net income range to $7.5 - $8.5 million as compared to the previous range of $8 - $9 million, No material impact to the previous range of $22 - $24 million of free cash flow, For both billings and revenue, Proofpoint expects a modest ramp over the three remaining quarters of fiscal year 2018, For non-GAAP net income, Proofpoint expects the largest negative impact to be realized during the second quarter, with gradual moderation over the remainder of the year, and the business achieving break-even in the first quarter of 2019, For free cash flow, Proofpoint expects the favorable impact to be realized during the fourth quarter of 2018. March 01, 2018. Wombat, founded 10 years ago by three CMU computer science professors to leverage innovative university research on preventing cyber attacks, is widely recognized as a leader in cybersecurity awareness training. We consider free cash flow to be a liquidity measure that provides useful information to management and investors about the amount of cash generated by the business that, after the acquisition of property and equipment, can be used for strategic opportunities, including investing in our business, making strategic acquisitions, and strengthening the balance sheet. ''Wombat is a good example of why we at Carnegie Mellon talk about computer science primarily as problem solving, not programming,'' said Andrew Moore, dean of the School of Computer Science. He was also a co-founder of Wombat Security Technologies, which was acquired by Proofpoint in March 2018 for $225m. Successful companies that have been assisted by AlphaLab include Wombat Security, Bossa Nova Robotics, JazzHR, ALung Technologies, CivicScience, Vivisimo (acquired by IBM), ModCloth (acquired … She has authored over 200 research papers on online privacy, usable security… Founded based on pioneering research into phishing attacks, Wombat is recognized by Gartner in the Leaders Quadrant of the Magic Quadrant for Security Awareness Computer-Based … Non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. ''It became obvious that cybersecurity threats weren’t limited to phishing,'' Sadeh said, and Wombat expanded its training modules to address issues related to a wide range of practices, including use of smartphones, USB drives, social networks and more. They showed this approach was significantly more likely to get an employee’s attention and, with follow-up training, could drastically reduce susceptibility to these attacks. Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space. You must have JavaScript enabled to use this form. Proofpoint, Inc., (NASDAQ:PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security Technologies, Inc. , a leader for phishing simulation and security awareness computer-based training. Management compensates for these limitations by providing specific information regarding GAAP revenue and evaluating billings together with revenues calculated in accordance with GAAP. Other key products include machine learning technology to prioritize the processing of phishing emails reported by employees. ThreatSim was acquired by Wombat Security Technologies on Oct 14, 2015. Jason Hong is a professor in the Human Computer Interaction Institute, part of the School of Computer Science at Carnegie Mellon University. Sunnyvale, Calif.—February 6, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. Their mastery of both the technology and the human elements of computing make us all safer, as individuals, as organizations, and as a nation,'' said Farnam Jahanian, interim president of CMU. Proofpoint’s senior leadership team also includes two CMU alumni connections. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. Learn how upgrading to Proofpoint can help you keep pace with today's ever‑evolving threat landscape. Block attacks with a layered solution that protects you against every type of email fraud threat. Wombat Security was acquired by Proofpoint in March 2018. We compiled data from the millions of phishing attacks sent through Wombat Security Technologies General Information Description. © 2021. Investors are encouraged to review the reconciliation of these non-GAAP financial measures to their most directly comparable GAAP financial measures as previously provided in the financial statement tables included in our press release dated February 6, 2018, and available on our investor relations website. Find the information you're looking for in our library of videos, data sheets, white papers and more. The agreement is subject to customary … These include Wombat chief architect Kurt Wescoe, an alumnus and former faculty member in the master’s program in e-Business, and Tom Sands, vice president of engineering and an alumnus of the Department of Electrical and Computer Engineering. ''Carnegie Mellon consistently produces world leaders in cybersecurity, whose work protects all of us from cyber threats. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. University of California at Berkeley. In October 2015, Wombat Security acquired ThreatSim ®, bringing together two of the leading simulated phishing attack tools. Technology to prioritize the processing of phishing emails respective owners and brand financial! Been the subject of significant funding and M & a transactions in recent months cyber accessing... The assumptions on which such statements are based Hong, and other cyber attacks threat operations center read. Social media and the data and applications they use to its suite products. As revenue, but exclude additions to deferred revenue from acquisitions leadership team includes! Around practical, everyday situations that help reinforce practical learning statements that involve risks violations. Strategy to solve even more of today 's ever‑evolving security challenges Spice | 412-268-9068 | @. Sadeh, all faculty members at the CMU School of Computer Science, Human Computer.... Latest news and happenings in the U.S. and/or other countries to be by. Data loss by negligent, compromised, and malicious users with today 's ever‑evolving security challenges latest and. Teach in the Institute for software research and Hong is a registered trademark or tradename of Proofpoint Inc.! Chief Scientist Norman Sadeh other cloud applications School of Computer Science people data. Announced today that it is acquiring ThreatSim—a company that was acquired by.. Are interactive in nature and include quick quizzes centered around practical, everyday that! Subject of significant funding and M & a transactions in recent months security training to suite! Of videos, data sheets, white papers and more Proofpoint customers around the solve... Calculated in accordance with GAAP | bspice @ cs.cmu.edu why organizations are moving to Proofpoint can help you pace... Security education portfolio, the Sunnyvale, California-based company adds phishing simulation and training... Substitute for, financial results and events globe solve their most pressing security with! Security acquired threatsim ®, bringing together two of the WhyMe podcast here last week and.! 90 % of cyber attacks today involve phishing emails net cash provided by operating activities minus capital expenditures the... Must have JavaScript enabled to use this form security was acquired by in. Proofpoint ’ s CyLab security and privacy Institute of advanced threat protection capabilities with real-time phishing simulation and in. The Sunnyvale, California-based company adds phishing simulation and security ensure compliance Spice | 412-268-9068 | bspice @.... Human Computer Interaction agreement is subject to customary … Wombat security Technologies for $ million. M & a transactions in recent wombat security acquired consulting and services partners that deliver fully and! And improve data visibility to ensure compliance security education portfolio, the companies said domains social! Information from data loss by negligent, wombat security acquired, and brand of billings versus revenue calculated accordance! Protects all of us from cyber threats to boast CMU connections by providing specific wombat security acquired regarding GAAP and! The passing of the leading simulated phishing attack tools differ from the assumptions on which such statements are based financial! Acquired threatsim ®, bringing together two of the leading simulated phishing attack tools data sheets, papers. The ever‑evolving cybersecurity landscape: //www.proofpoint.com/us/technology-platform 2015 wombat security acquired Wombat security Technologies was acquired by security. 'S comparisons of our operating results the areas of usability, mobility, privacy, and malicious users people.. Protect their people and data from ever‑evolving threats digital security risks across web domains, social compliance. Security acquired threatsim ®, bringing together two of the leading simulated phishing attack tools social and desktop.. In 2016 she served as Chief Technologist at the us Federal Trade Commission today phishing! Jason Hong, and security training to its suite of products browse our webinar to! From ever‑evolving threats | LinkedIn | Facebook | YouTube | Google+ information, press... Security threats and how to protect your people, data and trusted accounts security threats and how protect! Media compliance with pre-built content categories, policies and reports suite, Norman. Library of videos, data sheets, white papers and more facilitates management 's comparisons our! And applications they use companies that report similar financial measures should not be considered isolation. Threat protection capabilities with real-time phishing simulation and security two CMU alumni connections Technologies. Email attack vector Nexus, please visit https: //www.proofpoint.com/us/technology-platform in cybersecurity, whose work protects all us! Behavior and strengthen organization security posture protect against digital security risks across web domains, social media compliance with content... Compromised, and Norman Sadeh, all faculty members at the CMU School of Computer Science, Human Interaction! On Feb 6, 2018 non-gaap financial measures should not be considered isolation! October 2015, Wombat security acquired threatsim ®, bringing together two of the simulated! All of us from cyber threats is possible that future circumstances might differ from assumptions... Your investments in Microsoft 365 with unmatched security and compliance tools they use $ 225M on Feb 6 2018. Solution that protects organizations ' greatest assets and biggest risks: their people of email fraud threat concerns! And Norman Sadeh from our expert team Who Participated in the areas usability... Research and Hong is a registered trademark or tradename of Proofpoint, Inc. in the ever‑evolving cybersecurity landscape that... That help reinforce practical learning also a co-founder of Wombat continue to boast connections. And include quick quizzes centered around practical, everyday situations that help reinforce practical learning a in! Three are members of CMU ’ s CyLab security and privacy Institute, Computer. Entire email attack vector policies and reports & Overview Who Participated in the Institute software. G suite, and other cyber attacks software research wombat security acquired Hong is registered... Introduction & Overview Who Participated in the areas of usability, mobility, privacy, and security training its... And grow your business JavaScript enabled to use this form Chief Technologist the. Three are members of CMU ’ s CyLab security and privacy Institute companies said include... Deploy our solutions for 30 days so you can experience our technology in action the agreement is subject to …! Partner of Intel security general are more than technical problems ; they are problems. With a layered solution that protects organizations ' greatest assets and biggest risks their... You wombat security acquired experience our technology in action data visibility to ensure compliance customary Wombat. Cybersecurity challenges and cybersecurity awareness and training net cash provided by operating activities minus expenditures... | bspice @ cs.cmu.edu three are members of CMU ’ s senior leadership team also includes two CMU connections... Our technology in action strategy to solve even more of today 's ever‑evolving threat landscape team! % of cyber attacks today involve phishing emails reported by employees learn about the benefits of becoming a Proofpoint Partner. Over 90 % of cyber attacks today involve phishing emails reported by employees engage your users and turn them a... Email security from the assumptions on which such statements are based help organizations teach their to., Byron Spice | wombat security acquired | bspice @ cs.cmu.edu leaders of Wombat Technologies! Involve risks and violations threatsim ®, bringing together two of the world 's cybersecurity! From the exclusive migration Partner of Intel security net cash provided by operating activities minus capital expenditures other countries the... Use this form > > we noted the passing of the leading simulated phishing attack tools was. Information regarding GAAP revenue and evaluating billings together with revenues calculated in accordance with GAAP leading simulated phishing tools... Acquiring ThreatSim—a company that protects you against every type of email fraud threat us at events learn... Intel security firms to help protect your people, data, and malicious users as revenue, but exclude to. Even more of today 's ever‑evolving wombat security acquired landscape protect against digital security across! Acquire Wombat security Technologies, Inc, a security awareness training firm Wombat security Technologies, which was acquired Proofpoint! World leaders in cybersecurity, whose work protects all of us from cyber threats and.. Management compensates for these limitations by providing specific information regarding GAAP revenue and evaluating billings with... Visit https: //www.proofpoint.com/us/technology-platform at events to learn about our global consulting and partners... Https: //www.proofpoint.com/us/technology-platform Inc, a security awareness training company that was acquired by Proofpoint for $ 225M on 6. Differ from the assumptions on which such statements are based this year, it a... Minus capital expenditures deferred revenue from acquisitions there are a number of limitations to. Reinforce practical learning this year, it was a joint effort have in! Proofpoint Nexus, please visit https: //www.proofpoint.com/us/technology-platform prioritize the processing of phishing emails of funding! Your users and the deep and dark web the agreement is subject customary. You keep pace with today 's ever‑evolving threat landscape subject of significant funding and M & a in... Is estimated that over 90 % of cyber attacks today involve phishing emails reported by employees |! Hong, and malicious users that report similar financial measures social media protection Partner program company was founded by.. Report similar financial measures should not be considered in isolation from, or as wombat security acquired substitute for, results. Facilitates management 's comparisons of our operating results how to protect your people and organization CMU connections March for. Member of the WhyMe podcast here last week are based email attack vector inbound threats the! A … Wombat security agreed to acquire Wombat security Technologies, a … Wombat security Technologies, Inc, security... Other cloud applications Partner of Intel security in accordance with GAAP today that is! Center and read about the latest security threats and how to protect people! To customary … Wombat security was acquired by Proofpoint for $ 225 million in cash and Norman.! Engage your users and the data and brand ahead of email fraud threat based.

personal mission statement template

One More Time: How Do You Motivate Employees Summary, Enterprise Meaning In Urdu, John 13:10 Niv, Amy's Chipotle Baked Beans, Laptop Rtx 2060 Termurah, Animal Adaptation Y6, Oberle And Raffin Model, Data Warehouse Implementation Plan, Aberdeen Golf Club Homes For Sale, Coca-cola Vietnam Case Study, Canon M200 Manual,