All resources sponsored by:

Proofpoint, Inc.

1 - 25 of 26 Matches
Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER:Compliance, discovery and preservation are key drivers of the enterprise information archiving market. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's enterprise information archiving products as well as, a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017
Get This Now


Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER:How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017
Get This Now


The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO:90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017
Get This Now


Turning the Tide Against Ransomware
sponsored by Proofpoint, Inc.
WEBCAST:WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.
Posted: 05 Oct 2017 | Premiered: Oct 5, 2017
Get This Now


Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST:Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017
Get This Now


Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST:Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017
Get This Now


The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
WHITE PAPER:Attacks are quickly evolving faster than email defenses. Check out this white paper to discover how your organization can fight back against email fraud by investing in an end-to-end email security strategy.
Posted: 05 Sep 2017 | Published: 05 Sep 2017
Get This Now

TOPICS: 

Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE:Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017
Get This Now


How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE:Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017
Get This Now


The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017
Get This Now


How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017
Get This Now


What Every Organization Needs to Know Before, During, and After a Ransomware Attack
sponsored by Proofpoint, Inc.
WHITE PAPER:This guide helps you defend against phishing emails, vulnerabilities in mobile devices, and infected websites. Assess your organization's ability to prevent, respond to, and remediate attacks with a ransomware survival checklist.
Posted: 02 May 2017 | Published: 02 May 2017
Get This Now


A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017
Get This Now


ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER:This ESG Lab Validation examines the need to addresses advanced email-based threats with Advanced Email Security. ESG Lab evaluated how Proofpoint's unified, multilayered solution offers clear visibility into all of an organization's email and any threats it may contain, along with the ability to respond to and stop those threats.
Posted: 01 May 2017 | Published: 31 Jan 2017
Get This Now


How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017
Get This Now


Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017
Get This Now


Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017
Get This Now


Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY:Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016
Get This Now


Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE:Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017
Get This Now


The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016
Get This Now


Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015
Get This Now


Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


The Impact of Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


1 - 25 of 26 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement