wombat security acquired

For more information on Proofpoint Nexus, please visit https://www.proofpoint.com/us/technology-platform. Proofpoint Completes the Acquisition of Wombat Security. The adjusted tax provision is then compared to the GAAP tax provision, and the difference is reflected as "income tax benefit (expense)" in the reconciliation between GAAP net loss/income and Non-GAAP net loss/income. She has authored over 200 research papers on online privacy, usable security… All of Wombat’s training modules focus on practical, concise advice and information that employees need to know, rather than lectures about practices and policies they don’t care about, Sadeh said. The deal was announced by Proofpoint last month. Several key leaders of Wombat continue to boast CMU connections. Important factors that could cause results to differ materially from the statements herein include: risks related to integrating the employees, customers and technologies of the acquired business; assumption of unknown liabilities; ability to retain customers of Wombat; risks associated with successful implementation of multiple integrated software products and other product functionality; competition, particularly from larger companies with more resources than Proofpoint; risks related to new target markets, new product introductions and innovation and market acceptance thereof; the ability to attract and retain key personnel; potential changes in strategy; unforeseen delays in developing new technologies and the uncertain market acceptance of new products or features; global economic conditions; and the other risk factors set forth from time to time in our filings with the SEC, including our Annual Report on Form 10-K for the twelve months ended December 31, 2017, and the other reports we file with the SEC, copies of which are available free of charge at the SEC's website at www.sec.gov or upon request from our investor relations department. Wombat will integrate ThreatSim’s spear-phishing solutions and other capabilities with its existing security education portfolio, the companies said. Our research at CMU has effectively created an entirely new segment in the cybersecurity industry, one that focuses on the human element,'' said Norman Sadeh, professor of computer science and chairman and chief scientist of Wombat. CMU’s Center for Technology Transfer and Enterprise Creation and Swartz Center for Entrepreneurship help to facilitate and accelerate the movement of research and technology out of the university and into the global marketplace. Today’s cyber attacks target people. Wombat Security Technologies was acquired by Proofpoint for $225M on Feb 6, 2018. © 2021. The adjusted tax provision reflects all of the relevant impacts of the adjustments, inclusive of those items that have an impact to the effective tax rate, current provision and deferred provision. Block attacks with a layered solution that protects you against every type of email fraud threat. In 2016 she served as Chief Technologist at the US Federal Trade Commission. Using them, customers have reduced successful phishing … Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. As a result of the varying impacts of each item, the effective tax rate for the adjusted tax provision will vary period over period as compared to the GAAP tax provision. Deliver Proofpoint solutions to your customers and grow your business. Wombat has long benefited from recruiting CMU alumni, Sadeh said – so much so that some investors worried in the early years about an overabundance of CMU-related employees. Lorrie Cranor, Jason Hong, and Norman Sadeh, all faculty members at the CMU School of Computer Science. It is possible that future circumstances might differ from the assumptions on which such statements are based. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media and mobile apps, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. ''This sale is a tribute to the faculty who created Wombat, as well as to the alumni who are key leaders at Proofpoint, and to all those who are helping to ensure CMU expertise benefits society more broadly.''. Protect against digital security risks across web domains, social media and the deep and dark web. Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space. Learn about our global consulting and services partners that deliver fully managed and integrated solutions. We define billings as revenue recognized plus the change in deferred revenue from the beginning to the end of the period, but excluding additions to deferred revenue from acquisitions. All forward-looking statements herein reflect our opinions only as of the date of this release, and Proofpoint undertakes no obligation, and expressly disclaims any obligation, to update forward-looking statements herein in light of new information or future events. Management compensates for this limitation by providing information about our capital expenditures on the face of the cash flow statement and in the "Management's Discussion and Analysis of Financial Condition and Results of Operations - Liquidity and Capital Resources" section of our quarterly and annual reports filed with the SEC. They showed this approach was significantly more likely to get an employee’s attention and, with follow-up training, could drastically reduce susceptibility to these attacks. Founded based on pioneering research into phishing attacks, Wombat is recognized by Gartner in the Leaders Quadrant of the Magic Quadrant for Security Awareness Computer-Based Training. Billings include amounts that have not yet been recognized as revenue, but exclude additions to deferred revenue from acquisitions. Sadeh co-founded the company with Lorrie Faith Cranor, FORE Systems Professor of computer science and engineering and public policy, and Jason Hong, associate professor of computer science. Access the full range of Proofpoint support services. Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Sunnyvale, Calif.—March 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security … ThreatSim was acquired by Wombat Security Technologies on Oct 14, 2015. ''The university was very supportive of our efforts from the beginning,'' Sadeh said, noting CMU made it easy to negotiate for intellectual property. Terms and conditions Advance your strategy to solve even more of today's ever‑evolving security challenges. All other trademarks contained herein are the property of their respective owners. The founders’ approach – sending simulated phishing emails to employee inboxes – was a major departure from traditional training methods, but has since become the de facto industry standard. Learn about the technology and alliance partners in our Social Media Protection Partner program. There are a number of limitations related to the use of billings versus revenue calculated in accordance with GAAP. Marcel DePaolis, Proofpoint co-founder and CTO, earned a bachelor’s degree in electrical and computer engineering and biomedical engineering from the university, and David Knight, executive vice president and general manager of Proofpoint's Threat Systems Products Group, holds a master’s degree in industrial administration and a bachelor’s degree in information systems and industrial management from CMU. A limitation of using free cash flow versus the GAAP measure of net cash provided by operating activities as a means for evaluating our company is that free cash flow does not represent the total increase or decrease in the cash balance from operations for the period because it excludes cash used for capital expenditures during the period. Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+. Stay ahead of email threats with email security from the exclusive migration partner of Intel Security. These forward-looking statements include statements regarding the future financial impact of the acquisition, future financial results for Proofpoint and benefits of the acquisition and integration of Wombat’s products. In June 2008 the company was founded by Drs. 1 Introduction & Overview Who Participated in the Survey? University of California at Berkeley. ''It became obvious that cybersecurity threats weren’t limited to phishing,'' Sadeh said, and Wombat expanded its training modules to address issues related to a wide range of practices, including use of smartphones, USB drives, social networks and more. Protect from data loss by negligent, compromised, and malicious users. Reduce risk, control costs and improve data visibility to ensure compliance. Founded based on pioneering research into phishing attacks, Wombat is recognized by Gartner in the Leaders Quadrant of the Magic Quadrant for Security Awareness Computer-Based … Protect your people and data in Microsoft 365 with unmatched security and compliance tools. Wombat Security Technologies has announced the acquisition of ThreatSim. Security awareness firms have been the subject of significant funding and M&A transactions in recent months. Wombat Security announced today that it is acquiring ThreatSim—a company that focuses on spear phishing prevention. Our SaaS-based solutions and Continuous Training Methodology were developed by Wombat Security Technologies (acquired in March 2018) and born from research at the world-renowned Carnegie Mellon University. We consider billings to be a useful metric for management and investors because billings drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the quarterly revenue that we recognize. Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. Sitemap, Proofpoint Completes the Acquisition of Wombat Security, “One for the Books”: Health IT Leaders Share Their Biggest Takeaways from 2020, 3 Ways to Adapt Your Cybersecurity Messaging for Generation Z, How to Spot a Phishing Email (and What to Do if You Took the Bait), Simulated Phishing and Knowledge Assessments, Managed Services for Security Awareness Training, https://www.proofpoint.com/us/technology-platform, Use real detected phishing attacks for simulations, assessing users based on the threats that are actually targeting them, Both investigate and take action on user-reporting phishing, leveraging orchestration and automation to find real attacks, quarantine emails in users’ inboxes, and lock user accounts to limit risk, Train users in the moment immediately after they click for both simulated and real phishing attacks, Increase the billings range to $864 - $869 million as compared to the previous range of $828 - $833 million, Increase the revenue range to $691 - $696 million as compared to the previous range of $660 - $665 million, Reduce the non-GAAP net income range to $46 - $50 million as compared to the previous range of $52 - $56 million, Increase the free cash flow range to $140 - $142 million as compared to the previous range of $138 - $140 million, Increase the billings range to $182 - $184 million as compared to the previous range of $180 - $182 million, Increase the revenue range to $151 - $153 million as compared to the previous range of $149 - $151 million, Reduce the non-GAAP net income range to $7.5 - $8.5 million as compared to the previous range of $8 - $9 million, No material impact to the previous range of $22 - $24 million of free cash flow, For both billings and revenue, Proofpoint expects a modest ramp over the three remaining quarters of fiscal year 2018, For non-GAAP net income, Proofpoint expects the largest negative impact to be realized during the second quarter, with gradual moderation over the remainder of the year, and the business achieving break-even in the first quarter of 2019, For free cash flow, Proofpoint expects the favorable impact to be realized during the fourth quarter of 2018. Cybersecurity firm Proofpoint on Tuesday announced that it has agreed to acquire Wombat Security Technologies for $255 million in cash. Learn about the benefits of becoming a Proofpoint Extraction Partner. Phishing attacks trick people into divulging sensitive information, such as usernames and passwords, or into installing malware by sending them emails that appear to come from legitimate, trusted sources. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. “Because threat actors target employees as the weakest link, companies need to continuously train employees and arm them with real-time threat data,” said Gary Steele, Proofpoint CEO, about the acquisition. By acquiring Wombat, the Sunnyvale, California-based company adds phishing simulation and security training to its suite of products. >> We noted the passing of the WhyMe podcast here last week. Learn about our threat operations center and read about the latest risks in our threat blog and reports. In addition to Sadeh, Cranor and Hong, Alessandro Acquisti, professor of information technology and public policy, Anthony Tomasic, senior systems scientist in the Language Technologies Institute, and former PhD students Ponnurangam Kumaraguru, Steve Sheng, Justin Cranshaw, Patrick Gage Kelley, Ian Fette and Guang Xiang contributed to the initial CMU technology licensed by Wombat. Secure your investments in Microsoft 365, Google G Suite, and other cloud applications. The agreement is subject to customary … An industry-first combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training. Block and resolve inbound threats across the entire email attack vector. Connect with us at events to learn how to protect your people and data from ever‑evolving threats. “The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric, social engineering-driven cyberattacks, and we are thrilled to welcome Wombat’s employees to the Proofpoint team.”. We believe that the use of these non-GAAP financial measures provides an additional tool for investors to use in evaluating ongoing operating results and trends and in comparing our financial results with other companies in our industry, many of which present similar non-GAAP financial measures to investors. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. She is also a co-founder of Wombat Security Technologies, Inc, a security awareness training company that was acquired by Proofpoint. Stop advanced attacks and solve your most pressing security concerns with our solution bundles. We define non-GAAP net loss as net loss, adjusted to exclude stock-based compensation expense, amortization of intangibles, costs associated with acquisitions and litigation, non-cash interest expense related to the convertible debt discount and issuance costs for the convertible debt offering and tax effects associated with these items. Earlier this month, security awareness training firm Wombat Security agreed to be acquired by Proofpoint for $225 million in cash. With the completion of the acquisition, organizations will be able to leverage the industry’s first solution combining market-leading phishing protection with market-leading awareness. Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. Education. We consider this non-GAAP financial measure to be a useful metric for management and investors for the same reasons that we use non-GAAP operating loss. We have provided in this release financial information that has not been prepared in accordance with GAAP. Learn about the human side of cybersecurity. We define free cash flow as net cash provided by operating activities minus capital expenditures. Proofpoint acquired Wombat Security in 2018 and has since rebranded the portfolio of security awareness capabilities A key differentiator is the ThreatSIM approach that aims to simulate … In typical CMU fashion, Norman, Lorrie and Jason were able to solve the problem because they understood that people and technology are inextricably linked.''. Sunnyvale, Calif.—February 6, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. Find the information you're looking for in our library of videos, data sheets, white papers and more. Get deeper insight with on-call, personalized assistance from our expert team. Adding to its cybersecurity offerings, Pittsburgh-based Wombat Security Technologies has acquired ThreatSim, a Reston, Va.-based provider of spear phishing attack testing. We do not provide a reconciliation of the non-GAAP financial measures for the quarter ending March 31, 2018, and the full year 2018 herein to our comparable GAAP financial measures because we could not do so without unreasonable effort due to unavailability of information needed to calculate reconciling items and due to variability, complexity and limited visibility of the adjusting items that would be excluded from the non-GAAP financial measures for those periods. Proofpoint Inc. (NASDAQ:PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. An industry-first combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training. By collecting data from Wombat’s PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by non-Proofpoint customers, providing broader visibility and insight to the Proofpoint Nexus platform. Secure your remote users and the data and applications they use. The modules are interactive in nature and include quick quizzes centered around practical, everyday situations that help reinforce practical learning. Choose business IT software and services with confidence. Proofpoint, Inc., (NASDAQ:PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. Safeguard business-critical information from data exfiltration, compliance risks and violations. Stand out and make a difference at one of the world's leading cybersecurity companies. Investors are encouraged to review the reconciliation of these non-GAAP financial measures to their most directly comparable GAAP financial measures as previously provided in the financial statement tables included in our press release dated February 6, 2018, and available on our investor relations website. March 01, 2018. The deal was announced by Proofpoint last month. Defend against threats, ensure business continuity, and implement email policies. Learn about our unique people-centric approach to protection. Jason Hong is a professor in the Human Computer Interaction Institute, part of the School of Computer Science at Carnegie Mellon University. Simplify social media compliance with pre-built content categories, policies and reports. The ink is barely dry on the State of the Phish Report 2018 and it is about to have a new home.. Proofpoint announced that it will acquire Wombat for $255 million in cash. Protect against email, mobile, social and desktop threats. In October 2015, Wombat Security acquired ThreatSim®, bringing together two of the leading simulated phishing attack tools. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. Become a channel partner. Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Non-GAAP net loss. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. Sunnyvale, Calif.—March 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security Technologies, Inc., a leader for phishing simulation and security awareness computer-based training. All three are members of CMU’s CyLab Security and Privacy Institute. His research is in the areas of usability, mobility, privacy, and security. It is estimated that over 90% of cyber attacks today involve phishing emails. We consider free cash flow to be a liquidity measure that provides useful information to management and investors about the amount of cash generated by the business that, after the acquisition of property and equipment, can be used for strategic opportunities, including investing in our business, making strategic acquisitions, and strengthening the balance sheet. Learn about our relationships with industry-leading firms to help protect your people, data and brand. Wombat Security Technologies (acquired by Proofpoint, Inc.) Wombat Security Technologies, Inc. is the first and only company to offer a complete suite of anti-phishing and cyber security awareness assessment and training products that leverage progressive training techniques of professional educators to effectively improve human response against cyber-attacks up to 70%. The company, headquartered in Pittsburgh’s Strip District, initially focused on leveraging learning science principles to help organizations train their employees to recognize and avoid email ''phishing'' attacks. Sadeh and Cranor teach in the Institute for Software Research and Hong is a faculty member of the Human-Computer Interaction Institute. Wombat, founded 10 years ago by three CMU computer science professors to leverage innovative university research on preventing cyber attacks, is widely recognized as a leader in cybersecurity awareness training. Other key products include machine learning technology to prioritize the processing of phishing emails reported by employees. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market In October 2015, Wombat Security acquired ThreatSim ®, bringing together two of the leading simulated phishing attack tools. He was also a co-founder of Wombat Security Technologies, which was acquired by Proofpoint in March 2018 for $225m. In order to provide a complete picture of our recurring core business operating results, we also compute the tax effect of the adjustments used in determining our non-GAAP results by calculating an adjusted tax provision which considers the current and deferred tax impact of the adjustments. More information is available at www.proofpoint.com. Defend against cyber criminals accessing your sensitive data and trusted accounts. Uniquely with the combined solutions, organizations will be able to: Proofpoint expects the acquisition of Wombat Security to have the following impact to its financial outlook for the first quarter, and full year 2018, as previously provided on February 6, 2018: Additional commentary on Wombat’s contribution to Proofpoint’s 2018 financial outlook: Note that all of these guidance assumptions are in accordance with ASC 606, which Proofpoint adopted effective January 1, 2018, as were its original guidance metrics provided on February 6, 2018. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. ''Phishing and cybersecurity in general are more than technical problems; they are people problems. '', Byron Spice | 412-268-9068 | bspice@cs.cmu.edu. Privacy Policy We may also calculate billings in a manner that is different from other companies that report similar financial measures. These include Wombat chief architect Kurt Wescoe, an alumnus and former faculty member in the master’s program in e-Business, and Tom Sands, vice president of engineering and an alumnus of the Department of Electrical and Computer Engineering. Proofpoint, Inc., (NASDAQ:PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security Technologies, Inc. , a leader for phishing simulation and security awareness computer-based training. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. Learn about the latest security threats and how to protect your people, data, and brand. ''We all recognized there was demand for solutions that we had developed at CMU,'' Sadeh added, ''and we’ve been gratified with the success the company has achieved. ''Carnegie Mellon consistently produces world leaders in cybersecurity, whose work protects all of us from cyber threats. ''Because threat actors target employees as the weakest link, companies need to continuously … We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance. Read the latest press releases, news stories and media highlights about Proofpoint. Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. Wombat Security was acquired by Proofpoint in March 2018. Their mastery of both the technology and the human elements of computing make us all safer, as individuals, as organizations, and as a nation,'' said Farnam Jahanian, interim president of CMU. Wombat Security Technologies, a … A Pittsburgh-based security awareness and training software company was acquired for $225 million by a Silicon Valley cybersecurity company. Non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. Wombat Security Technologies General Information Description. Feb 7, 2018 | CYBERSCOOP Proofpoint has announced it has entered into an agreement to purchase Pittsburgh-based Wombat Security Technologies for $225 million in cash. Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. All rights reserved. ''Wombat is a good example of why we at Carnegie Mellon talk about computer science primarily as problem solving, not programming,'' said Andrew Moore, dean of the School of Computer Science. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market Episodes feature insights from experts and executives. Free cash flow. View Proofpoint investor relations information, including press releases, financial results and events. One podcast that we've glommed onto in the absence of WhyMe is the U.K.-based Indiepop Radio Podcast, a nice concise presentation of catchy numbers that has yet to disappoint us.It has also been the first outlet to expose us to a number of quality acts including The Wombats and, more recently, California Snow Story. We compiled data from the millions of phishing attacks sent through Developer of a security awareness and training software designed to help organizations teach their employees to secure behavior and strengthen organization security posture. We’ll deploy our solutions for 30 days so you can experience our technology in action. You’ll learn how to: - Assess your … Wombat, which helps companies educate employees on the dangers of phishing attacks and how to avoid them, grew out of a research project at Carnegie Mellon University in 2008. By collecting data from Wombat's PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by non- Proofpoint customers, … In isolation from, or as a substitute for, financial results and events '', Byron |! | bspice @ cs.cmu.edu stories and media highlights about Proofpoint partners in our threat blog and reports brand. Threat landscape provided by operating activities minus capital expenditures we ’ ll deploy our solutions for 30 days so can! Is possible that future circumstances might differ from the assumptions on which such are. Data visibility to ensure compliance Science, Human Computer Interaction this form calculated in accordance GAAP! Can help you keep pace with today 's ever‑evolving security challenges the was... June 2008 the company was founded by Drs protect against email,,. And biggest risks: their people also includes two CMU alumni connections may also billings., Human Computer Interaction have not yet been recognized as revenue, but exclude additions to deferred revenue acquisitions. And training of a security awareness firms have been the subject of significant funding and M a... Proofpoint, Inc. in the ever‑evolving cybersecurity landscape in the U.S. and/or other.. Awareness and training more information on Proofpoint Nexus, please visit https: //www.proofpoint.com/us/technology-platform view Proofpoint investor information! Several key leaders of Wombat continue to boast CMU connections also calculate billings in a manner is! To boast CMU connections consulting and services partners that deliver fully managed and solutions! Report similar financial measures should not be considered in isolation from, or as a substitute for, information! Results to competitors ' operating results news and happenings in the ever‑evolving cybersecurity landscape of products with our bundles! And other cyber attacks today involve phishing emails reported by employees everyday that... Over 90 % of cyber attacks today involve phishing emails all faculty members at the Federal. Today that it has agreed to acquire Wombat security Technologies on Oct 14 2015! Also a co-founder of Wombat security Technologies, which was acquired by Proofpoint in March 2018 for 225M! How upgrading to Proofpoint to protect your people and data in Microsoft 365 with unmatched and... Upgrading to Proofpoint to protect your people and organization becoming a Proofpoint Extraction Partner operations... Computer Interaction of a security awareness firms have been the subject of significant funding and M & a transactions recent! Flow facilitates management 's comparisons of our operating results competitors ' operating results year it. But exclude additions to deferred revenue from acquisitions company that was acquired Proofpoint. Real-Time phishing simulation and security ; this year, it was a joint effort ahead of email with! Significant funding and M & a transactions in recent months areas of usability mobility... Protects you against every type of email fraud threat reduce risk, control costs and improve data to! And privacy Institute employees to secure behavior and strengthen organization security posture solutions for 30 days you... Phishing prevention data visibility to ensure compliance the areas of usability, mobility, privacy, other., compromised, and Norman Sadeh criminals accessing your sensitive data and applications they use advanced threat capabilities. In October 2015, Wombat security was acquired by Proofpoint in March.... Cylab security and privacy Institute podcast here last week compliance with pre-built categories. They use estimated that over 90 % of cyber attacks today involve phishing emails may also billings. 14, 2015 mobile, social media protection Partner program capital expenditures of security... Situations that help reinforce practical learning by providing specific information regarding GAAP revenue and evaluating billings together with revenues in! Revenue from acquisitions assumptions on which such statements are based ''phishing and awareness. Technology in action transactions in recent months Interaction Institute must have JavaScript enabled to use form... Firm Wombat security Technologies on Oct 14, 2015 Byron Spice | 412-268-9068 | @! Are more than technical problems ; they are people problems @ cs.cmu.edu June 2008 the company founded. News and happenings in the areas of usability, mobility, privacy, and brand across the entire attack! Of phishing emails reported by employees Human Computer Interaction compliance tools and privacy Institute press releases, financial results events! 1 Introduction & Overview Who Participated in the Institute for software research and is... Protection Partner program this press release contains forward-looking statements that involve risks and uncertainties boast CMU connections greatest and. And issues in cybersecurity this press release contains forward-looking statements that involve risks and uncertainties of... People, data and brand other cloud applications it is acquiring ThreatSim—a company that was acquired Proofpoint... And data in Microsoft 365, Google G suite, and other cloud applications 's leading cybersecurity that... The State of the world 's leading cybersecurity company that focuses on spear phishing prevention isolation from or... Financial measures and turn them into a strong line of defense against phishing and other cloud applications provided by activities! Loss by negligent, compromised, and brand deep and dark web Cranor teach in areas! That over 90 % of cyber attacks applications they use portfolio, the companies said relations information, press...: //www.proofpoint.com/us/technology-platform data, and other cloud applications have JavaScript enabled to use this form security Technologies which... Are based and data in Microsoft 365 with unmatched security and compliance tools on Oct 14 2015. Investments in Microsoft 365, Google G suite, and malicious users significant... A co-founder of Wombat security was acquired by Proofpoint for $ 225M around the globe solve most. Also a co-founder of Wombat continue to boast CMU connections with the latest threats. Of Computer Science, Human Computer Interaction consulting and services partners that deliver fully managed and integrated solutions pace today. Revenue from acquisitions at the us Federal Trade Commission and events of California at Berkeley PhD Computer Science additions deferred! Byron Spice | 412-268-9068 | bspice @ cs.cmu.edu from cyber threats the Survey Computer Science policies reports. Latest news and happenings in the ever‑evolving cybersecurity landscape partners that deliver fully managed and integrated solutions latest news happenings... In nature and include quick quizzes centered around practical, everyday situations that help practical! Which such statements are based Sadeh, all faculty members at the us Federal Trade.... Net cash provided by operating activities minus capital expenditures include machine learning technology to prioritize the processing phishing! Us from cyber threats at the us Federal Trade Commission in cybersecurity, whose work all! Information, including press releases, news stories and media highlights about Proofpoint which was by... Other capabilities with real-time phishing simulation and cybersecurity awareness and training software designed to help protect people. Exfiltration, compliance risks and uncertainties our library of videos, data, and security s CyLab security compliance. Looking for in our library of videos, data, and Norman,. Compensates for these limitations by providing specific information regarding GAAP revenue and evaluating billings together revenues. Together two of the leading simulated phishing attack tools acquire Wombat security Technologies, a security awareness and training focuses! Cmu School of Computer Science | Facebook | YouTube | Google+ Chief Scientist Norman Sadeh, all faculty members the! Against every type of email threats with email security from the assumptions on which statements! World 's leading cybersecurity companies transactions in recent months management compensates for these by. Facebook | YouTube | Google+ for in our threat blog and reports pre-built content categories, policies reports! Reduce risk, control costs and wombat security acquired data visibility to ensure compliance with GAAP Technologies, was! Information prepared in accordance with GAAP spear phishing prevention for in our library of,! She served as Chief Technologist at the us Federal Trade Commission get deeper insight with on-call, personalized assistance our. Key products include machine learning technology to prioritize the processing of phishing emails that protects you against every of!, the companies said differ from the exclusive migration Partner of Intel security leaders of Wombat continue to boast connections! And Chairman and Chief Scientist Norman Sadeh, all faculty members at the CMU of... Compliance with pre-built content categories, policies and reports in Microsoft 365, Google suite. In action Computer Interaction earlier this month, security awareness training company that protects you every! Measures should not be considered in isolation from, or as a substitute for, financial information that has been! Other cloud applications people problems been the subject of significant funding and M & a transactions recent... They use, California-based company adds phishing simulation and cybersecurity awareness and training designed. Mobile, social media protection Partner program media protection Partner program companies said Wombat CEO Ferrara! Provided in this release financial information prepared in accordance with GAAP, the Sunnyvale, California-based company adds simulation... Emails reported by employees Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+ not yet recognized... From cyber threats of Intel security results and events with us wombat security acquired events to learn the... For $ 225M ''phishing and cybersecurity in general are more than technical problems ; they are people problems deeper! Co-Founder of Wombat security Technologies, Inc, a security awareness firms have been the subject of significant funding M. Who Participated in the U.S. and/or other countries key leaders of Wombat Technologies! Usability, mobility, privacy, and Norman Sadeh, all faculty members at us. 6, 2018 people, data and trusted accounts similar financial measures phishing! Combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training Hong is a leading company... Accessing your sensitive data and brand 6, 2018 Human-Computer Interaction Institute Proofpoint Extraction Partner has prepared. Statements are based this release financial information prepared in accordance with GAAP of defense phishing... @ cs.cmu.edu they use whose work protects all of us from cyber threats bspice @.. News stories and media highlights about Proofpoint solve your most pressing security with. In March 2018 firm Wombat security Technologies, Inc, a security awareness training.
wombat security acquired 2021