All resources sponsored by:

Proofpoint, Inc.

24 Matches
Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


Infographic: What's Happening with your Data Now?
sponsored by Proofpoint, Inc.
RESOURCE:This infographic contains important stats about enterprise archiving trends and shows how a highly automated archiving system can help to reduce cost, mitigate risk, and deliver value.
Posted: 13 Jun 2016 | Published: 13 Jun 2016
Get This Now


The Need for Next-Generation Supervision
sponsored by Proofpoint, Inc.
RESOURCE:This infographic details how the proper next-generation supervision can provide a flexible workflow, visual reporting, and complete audit-readiness. Read on to learn how an integrated archive and supervision can enable complete compliance.
Posted: 13 Jun 2016 | Published: 13 Jun 2016
Get This Now


7 Critical Capabilities for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER:This Gartner Report helps you understand and compare the critical capabilities of the enterprise information archiving solutions available in today's market.
Posted: 10 Jun 2016 | Published: 16 Dec 2015
Get This Now


Solving Your Top 3 Archiving Challenges: Compliance, Cost, and Risk
sponsored by Proofpoint, Inc.
WEBCAST:Aging archiving systems were not built to store emails, social media records, and other modern digital files. View this webcast to ensure that your enterprise is compliant with the latest e-discovery laws and learn how to properly archive electronically stored information in the cloud.
Posted: 09 Jun 2016 | Premiered: Jun 9, 2016
Get This Now


Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER:More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016
Get This Now


FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload
sponsored by Proofpoint, Inc.
WHITE PAPER:Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016
Get This Now


Proofpoint Advanced Security Platform for Microsoft Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016
Get This Now


Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016
Get This Now


The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016
Get This Now


The Human Factor Research Report 2016
sponsored by Proofpoint, Inc.
WHITE PAPER:Take an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


How Credential Phishing is Changing - How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016
Get This Now


Research on Impostor Emails: Types, Targets, Threats, and More
sponsored by Proofpoint, Inc.
WHITE PAPER:This infographic reveals the facts about imposter emails based on recent research. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016
Get This Now


Impostor Email Threats eBook
sponsored by Proofpoint, Inc.
EBOOK:This white paper shows you what to looks for and how to block email attacks.
Posted: 21 Apr 2016 | Published: 01 Mar 2016
Get This Now


Hook, Line, and Sinker: How Credential Phishing is Changing
sponsored by Proofpoint, Inc.
WHITE PAPER:Find out the facts about phishing attacks and a 4-step strategy to stop them.
Posted: 04 Apr 2016 | Published: 30 Mar 2016
Get This Now


Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016
Get This Now


Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015
Get This Now


The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER:This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016
Get This Now


CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:Discover the limitations of Office 365's built in security features and how you can augment your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014
Get This Now


Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST:Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015
Get This Now


Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER:Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015
Get This Now


Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY:Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015
Get This Now


24 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement