All resources sponsored by:

Proofpoint, Inc.

22 Matches
What Every Organization Needs to Know Before, During, and After a Ransomware Attack
sponsored by Proofpoint, Inc.
WHITE PAPER:This guide helps you defend against phishing emails, vulnerabilities in mobile devices, and infected websites. Assess your organization's ability to prevent, respond to, and remediate attacks with a ransomware survival checklist.
Posted: 02 May 2017 | Published: 02 May 2017
Get This Now


Prevent Full-Blown Breaches with Threat Response and Incident Intelligence
sponsored by Proofpoint, Inc.
WHITE PAPER:The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.
Posted: 02 May 2017 | Published: 02 May 2017
Get This Now


Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015
Get This Now


A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017
Get This Now


4 Business Email Compromise Techniques and How to Stop Them
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper discover how to protect your enterprise from business email compromise-style attacks. Uncover 4 common business email compromise techniques and how to mitigate the risk.
Posted: 01 May 2017 | Published: 01 May 2017
Get This Now


ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER:In this ESG lab report discover how to deploy fast and easy identification and prioritization of email-based cybersecurity threats, giving your organization at-a-glance summary information about each threat.
Posted: 01 May 2017 | Published: 31 Jan 2017
Get This Now


How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017
Get This Now


Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017
Get This Now


Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017
Get This Now


Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY:Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016
Get This Now


Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE:Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017
Get This Now


The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY:In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
Get This Now


Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016
Get This Now


Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015
Get This Now


Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER:More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016
Get This Now


Is Additional Security Needed for Office 365?
sponsored by Proofpoint, Inc.
WHITE PAPER:Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016
Get This Now


Overcome Office 365 Security and Archiving Challenges
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the limitations of Office 365's built in security features and how you can augment your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014
Get This Now


Accelerate Office 365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


The Impact of Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement