All resources sponsored by:

Proofpoint, Inc.

1 - 25 of 41 Matches
The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY:In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
Get This Now


Best Practices for eDiscovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016
Get This Now


Threat Summary: Top 2016 Cyber Risks
sponsored by Proofpoint, Inc.
WEBCAST:Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.
Posted: 11 Nov 2016 | Premiered: Oct 31, 2016
Get This Now


Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.
Posted: 10 Nov 2016 | Published: 31 Oct 2016
Get This Now


New Tools Lead to Refined GRC Practices
sponsored by Proofpoint, Inc.
EGUIDE:See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.
Posted: 22 Sep 2016 | Published: 20 Sep 2016
Get This Now


Blindsided: Today's Biggest Threats May Be the Ones You're Not Seeing Infographic
sponsored by Proofpoint, Inc.
RESOURCE:This short infographic shows you how you can identify key, blind spots in your network, create a plan to close the gap, and helps you consider solutions to improve visibility for the future. Access now to determine whether your current defense is strong enough and transparent enough to defend your entire expanding perimeter.
Posted: 21 Sep 2016 | Published: 31 Aug 2016
Get This Now


Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER:This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016
Get This Now


Making the Business Case for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the robust offerings Office 365 can bring to your organization. Learn how it can improve your email, calendaring, scheduling, task management and overall productivity and tailor its capabilities to your specific requirements.
Posted: 12 Sep 2016 | Published: 01 Aug 2016
Get This Now


Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016
Get This Now


Top 5 Social Media Scams of 2016
sponsored by Proofpoint, Inc.
VIDEO:This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.
Posted: 12 Sep 2016 | Premiered: 12 May 2016
Get This Now


Protect The Way You Work Today
sponsored by Proofpoint, Inc.
PRODUCT DEMO:Whether you seek email protection, mobile defense, threat intelligence, or another type of tool to bolster your security posture, how can you be sure these investments will deliver? Uncover free, limited-time evaluations, trial versions, and demos of cloud-based security and compliance solutions.
Posted: 09 Sep 2016 | Premiered: 01 Aug 2016
Get This Now


Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO:Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016
Get This Now


Safeguarding Office 365
sponsored by Proofpoint, Inc.
WEBCAST:Discover how to get full attack chain detection for Office 365 through this short video. Learn how you can achieve complete coverage from advanced threats, both known and unknown across your entire global network.
Posted: 09 Sep 2016 | Premiered: Aug 1, 2016
Get This Now


Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER:While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016
Get This Now


Next-Generation Archiving: How to Extract Intelligence from Your Electronic Archives
sponsored by Proofpoint, Inc.
WHITE PAPER:Archiving tools have long served as basic storage management tools, storing data for "just in case." Next-gen tools are all about utilizing that data to derive insight and intelligence. Learn about the past, and discover the future, of archiving tools, and devise your organization's strategy to make the most of this technology.
Posted: 08 Sep 2016 | Published: 31 Aug 2016
Get This Now


Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015
Get This Now


The ROI of Enterprise-Wide E-Discovery: How To Save 5 Million Dollars
sponsored by Proofpoint, Inc.
MICROSITE:Access this resource to learn how to maximize your e-discovery ROI. You will learn the difference between collection and review savings. See how your organization can get an ROI of close to 5 million dollars annually.
Posted: 07 Sep 2016 | Published: 19 Oct 2015
Get This Now


6 Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST:Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016
Get This Now


Case Study: Office 365 Enterprise Strengths
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


How to Optimize Your Compliance Processes to Cut Costs
sponsored by Proofpoint, Inc.
RESOURCE:Discover how you can optimize your compliance processes proactively and use the right technology to get the job done efficiently. Gain greater control over audit-readiness to achieve a firmer bottom line.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER:How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016
Get This Now


Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


The Impact of Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


1 - 25 of 41 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement