All resources sponsored by:

Proofpoint, Inc.

1 - 25 of 38 Matches
New Tools Lead to Refined GRC Practices
sponsored by Proofpoint, Inc.
EGUIDE:See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.
Posted: 22 Sep 2016 | Published: 20 Sep 2016
Get This Now


Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER:As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
Get This Now


Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps
sponsored by Proofpoint, Inc.
WHITE PAPER:Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.
Posted: 20 Sep 2016 | Published: 20 Sep 2016
Get This Now


Containerization Alone Cannot Defend Against Dangerous And Malicious Apps
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper learn the myth about containerization on a BYOD device. Discover several security scenarios on app-based breaches including: network profiling apps, VPN hijacking apps, data mining apps, and more.
Posted: 20 Sep 2016 | Published: 20 Sep 2016
Get This Now


Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER:This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016
Get This Now


BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016
Get This Now


Making the Business Case for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the robust offerings Office 365 can bring to your organization. Learn how it can improve your email, calendaring, scheduling, task management and overall productivity and tailor its capabilities to your specific requirements.
Posted: 12 Sep 2016 | Published: 01 Aug 2016
Get This Now


Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016
Get This Now


Top 5 Social Media Scams of 2016
sponsored by Proofpoint, Inc.
VIDEO:This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.
Posted: 12 Sep 2016 | Premiered: 12 May 2016
Get This Now


Protect The Way You Work Today
sponsored by Proofpoint, Inc.
PRODUCT DEMO:Whether you seek email protection, mobile defense, threat intelligence, or another type of tool to bolster your security posture, how can you be sure these investments will deliver? Uncover free, limited-time evaluations, trial versions, and demos of cloud-based security and compliance solutions.
Posted: 09 Sep 2016 | Premiered: 01 Aug 2016
Get This Now


Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO:Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016
Get This Now


Safeguarding Office 365
sponsored by Proofpoint, Inc.
WEBCAST:Discover how to get full attack chain detection for Office 365 through this short video. Learn how you can achieve complete coverage from advanced threats, both known and unknown across your entire global network.
Posted: 09 Sep 2016 | Premiered: Aug 1, 2016
Get This Now


Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER:While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016
Get This Now


Next-Generation Archiving: How to Extract Intelligence from Your Electronic Archives
sponsored by Proofpoint, Inc.
WHITE PAPER:Archiving tools have long served as basic storage management tools, storing data for "just in case." Next-gen tools are all about utilizing that data to derive insight and intelligence. Learn about the past, and discover the future, of archiving tools, and devise your organization's strategy to make the most of this technology.
Posted: 08 Sep 2016 | Published: 31 Aug 2016
Get This Now


Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015
Get This Now


The ROI of Enterprise-Wide E-Discovery: How To Save 5 Million Dollars
sponsored by Proofpoint, Inc.
MICROSITE:Access this resource to learn how to maximize your e-discovery ROI. You will learn the difference between collection and review savings. See how your organization can get an ROI of close to 5 million dollars annually.
Posted: 07 Sep 2016 | Published: 19 Oct 2015
Get This Now


6 Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST:Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016
Get This Now


Case Study: Office 365 Enterprise Strengths
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


How to Optimize Your Compliance Processes to Cut Costs
sponsored by Proofpoint, Inc.
RESOURCE:Discover how you can optimize your compliance processes proactively and use the right technology to get the job done efficiently. Gain greater control over audit-readiness to achieve a firmer bottom line.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER:How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


Infographic: What's Happening with your Data Now?
sponsored by Proofpoint, Inc.
RESOURCE:This infographic contains important stats about enterprise archiving trends and shows how a highly automated archiving system can help to reduce cost, mitigate risk, and deliver value.
Posted: 13 Jun 2016 | Published: 13 Jun 2016
Get This Now


The Need for Next-Generation Supervision
sponsored by Proofpoint, Inc.
RESOURCE:This infographic details how the proper next-generation supervision can provide a flexible workflow, visual reporting, and complete audit-readiness for financial organizations.
Posted: 13 Jun 2016 | Published: 13 Jun 2016
Get This Now


1 - 25 of 38 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement