All resources sponsored by:

Proofpoint, Inc.

1 - 25 of 29 Matches
Social Media Account Takeovers
sponsored by Proofpoint, Inc.
WHITE PAPER:Most organizations lack the protective countermeasure or the expertise to mitigate risk and response to social media account takeovers. In this white paper, learn about how takeovers are possible, the complexity of social media accounts and how to prevent an attack from happening.
Posted: 04 Dec 2018 | Published: 04 Dec 2018
Get This Now


Financial Services: Managing Digital Risk and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER:Open this white paper to uncover the best approaches financial institutions can take to protect against domain risks, mobile app risks, digital compliance and much more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018
Get This Now


Are You Monitoring and Protecting Your Company's Digital Footprint?
sponsored by Proofpoint, Inc.
EBOOK:Although your digital presence is critical to providing a cohesive customer experience, it also exposes your company to security risks. Access this e-book to learn how to better monitor and secure your organization's digital footprint in 3 steps, even if you don't have an official brand presence in one.
Posted: 03 Dec 2018 | Published: 03 Dec 2018
Get This Now


Protecting your Execs and Offices: Executive and Location Threat Monitoring
sponsored by Proofpoint, Inc.
EBOOK:Now more than ever, it is crucial to safeguard your executives and office locations from unhappy customers, activist groups, cybercriminals and even disgruntled employees. Why? Download this e-book to learn about the significant risks these groups pose to your organization.
Posted: 30 Nov 2018 | Published: 30 Nov 2018
Get This Now


Digital Risk Protection: Understanding Digital Risk
sponsored by Proofpoint, Inc.
RESOURCE:Understand how you can protect your brand and customers from social media, mobile app, and domain threats.
Posted: 29 Nov 2018 | Published: 29 Nov 2018
Get This Now


Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO:Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018
Get This Now


Beat the Top 3 Security Challenges in Office 365
sponsored by Proofpoint, Inc.
VIDEO:Compromised accounts can be used to launch attacks or access sensitive data in the cloud. This is why organizations are taking security measures to defend your cloud collaboration tools against cybercriminals, especially in Office 365 applications. Download this webcast to learn how you can overcome these security challenges, today.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018
Get This Now


Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO:According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018
Get This Now


The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO:Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018
Get This Now


Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER:Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018
Get This Now


The Cost of Microsoft Office 365 Security and Compliance
sponsored by Proofpoint, Inc.
RESOURCE:From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.
Posted: 27 Feb 2018 | Published: 27 Feb 2018
Get This Now


The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER:Developing a plan to comply with the new rules of the EU GDPR is critical for all organizations. Leverage this guide to help you discover, plan and act on the upcoming GDPR.
Posted: 27 Feb 2018 | Published: 27 Feb 2018
Get This Now


Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018
Get This Now


The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018
Get This Now


Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK:Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018
Get This Now


Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE:Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018
Get This Now


Vendor Breakdown: Which Secure Email Gateway is Right for You?
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:Security and risk management leaders continue to rely on the secure email gateway (SEG) as a critical component of their security strategy in an evolving threat environment. But which SEG is the right one for you? Download this Gartner Market Guide for SEGs to compare vendor capabilities and see which tool is best for your organization.
Posted: 07 Sep 2018 | Published: 03 May 2017
Get This Now


Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK:Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018
Get This Now


Securing Microsoft Office 365: The Inside Track to Threat Protection
sponsored by Proofpoint, Inc.
RESOURCE:In this report, learn about the security risks of cloud-based productivity suites and how your organization can take the necessary steps to avoid them.
Posted: 06 Sep 2018 | Published: 06 Sep 2018
Get This Now


Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESOURCE:In this ransomware survival guide, learn how most ransomware spreads and uncover everything your organization needs to know before, during, and after an attack.
Posted: 01 Jun 2018 | Published: 29 Dec 2017
Get This Now


Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018
Get This Now


Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER:Compliance, discovery and preservation are key drivers of the enterprise information archiving market. This Gartner report reveals strengths and cautions of different vendor's enterprise information archiving products as well as a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017
Get This Now


How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE:Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017
Get This Now


How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017
Get This Now


The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


1 - 25 of 29 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement