Proofpoint Security Tessian

Complete cloud email security

Tessian AI Explained

Tessian uses an ensemble of AI based approaches because it's the only way to defend against advanced phishing attacks, and protect against sensitive data loss on email. Through behavioral, content and threat network analysis, Tessian AI automatically adjusts as our customers hire, acquire, and adapt.

Behavioral Analysis

  • Tessian AI uses millions signals to identify normal behavior vs. anomalous activity. Tens of thousands of historical events are used to build a strong behavioral baseline for each user.

Content Analysis

  • Tessian’s machine learning identifies threats in image-based text, QR codes, URLs, subject headings, body text, and inside of email attachments. Hundreds of data points within each email are used to determine if the email is safe, malicious, or needs review.

Threat Network Analysis

  • The Tessian platform uses a global threat library to improve security across the network. Within minutes, Tessian adds malicious domains, urls, IPs, email addresses and file hashes to prevent email based attacks across the entire Tessian community.