All resources sponsored by:

Proofpoint, Inc.

15 Matches
How to Improve on Your Current Email Security
sponsored by Proofpoint, Inc.
WEBCAST:This webcast explores some of the options available to you for improving and strengthen your email security. Access it and learn how you can build on current email security measures by adding advanced encryption, threat intelligence, and more.
Posted: 04 Jan 2016 | Premiered: Dec 31, 2015
Get This Now


Respond to Any Attack with Deep Network Insights
sponsored by Proofpoint, Inc.
VIDEO:This video examines how deep insights into your network can keep you safe no matter what your users let in. Watch and discover how you can respond to an attack across any device before it can do any harm.
Posted: 30 Dec 2015 | Premiered: 28 Oct 2015
Get This Now


Cybersecurity Predictions for 2016: Targeting the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER:This article provides deep insights into how advanced cybercriminals will improve their social engineering tactics in the future. Take a look to prepare for the evolving threats of 2016.
Posted: 29 Dec 2015 | Published: 29 Dec 2015
Get This Now


How Risky Mobile Apps Steal Data and Spy on Users
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper explores the dangers of malicious mobile apps and gives you advice on avoiding them. Discover what threats are lurking in your users' app stores and how you can keep those threats out of your network.
Posted: 28 Dec 2015 | Published: 28 Dec 2015
Get This Now


CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014
Get This Now


Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST:In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015
Get This Now


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER:Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015
Get This Now


Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST:Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015
Get This Now


Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015
Get This Now


How Cybercriminals Exploit the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER:This report explores data on end-user behavior and how it contributes to security incidents. Take a look to learn why your users click on malicious links and how you can put a stop to their dangerous behavior.
Posted: 21 Oct 2015 | Published: 21 Oct 2015
Get This Now


Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER:In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014
Get This Now


Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER:In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015
Get This Now


Email is Today's #1 Advanced Threat Vector – Here's Why
sponsored by Proofpoint, Inc.
RESOURCE:Check out this brief infographic to learn what files hackers are using to dupe employees into clicking malicious links. Uncover the succes - or unsuccessful - level of protection antivirus provides against targeted threats.
Posted: 20 Oct 2015 | Published: 14 Oct 2015
Get This Now


The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE:Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015
Get This Now


Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY:Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015
Get This Now


15 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement