All resources sponsored by:

Proofpoint

1 - 25 of 32 Matches
Attackers are Targeting your Company’s Most Valuable Resource: Your People
sponsored by Proofpoint
EBOOK:Gaining true visibility into the state of cyber-risk requires organizations to address the need to protect people against attacks at 3 different levels. And when we say “people” we’re not just talking about senior execs/the c-suite. Download and discover how to more effectively address 3 major problem areas in today’s enterprise.
Posted: 18 Oct 2019 | Published: 18 Oct 2019
Get This Now


Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER:Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


Human Factor Report 2019
sponsored by Proofpoint
ANALYST REPORT:Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.
Posted: 09 Oct 2019 | Published: 12 Mar 2019
Get This Now


Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW:It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019
Get This Now


Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE:For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019
Get This Now


Proofpoint Information Protection Research Team
sponsored by Proofpoint
RESOURCE:Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.
Posted: 22 Aug 2019 | Published: 22 Aug 2019
Get This Now


Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT:Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019
Get This Now


Assessing Cloud Access Security Brokers
sponsored by Proofpoint
ANALYST REPORT:Cloud access security brokers are becoming a must have for enterprises as they commit to the cloud. Which CASB vendor is best for yours?
Posted: 30 Jul 2019 | Published: 29 Oct 2018
Get This Now


Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER:Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019
Get This Now


Top 10 Reasons Customers Choose Proofpoint to Protect Office 365
sponsored by Proofpoint
RESOURCE:For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.
Posted: 28 Jun 2019 | Published: 28 Jun 2019
Get This Now


Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET:Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


Understanding Email Fraud
sponsored by Proofpoint
ANALYST REPORT:Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


Quarterly Threat Report
sponsored by Proofpoint
ANALYST REPORT:Learn about the most recent threats in 2019 and how to root them out in email messages, social media posts, and malware samples.
Posted: 21 Jun 2019 | Published: 21 Jun 2019
Get This Now


Protecting the End User
sponsored by Proofpoint
WHITE PAPER:Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019
Get This Now


Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER:Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018
Get This Now


Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks
sponsored by Proofpoint
RESEARCH CONTENT:Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.
Posted: 20 Jun 2019 | Published: 28 Feb 2019
Get This Now


Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY:From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY:Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Understanding Email Fraud
sponsored by Proofpoint
RESOURCE:Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.
Posted: 07 Jun 2019 | Published: 07 Jun 2019
Get This Now


Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY:There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019
Get This Now


Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY:When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019
Get This Now


The Golden State Warriors Case Study: Leading on the Court and in Social Media
sponsored by Proofpoint
CASE STUDY:As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.
Posted: 05 Jun 2019 | Published: 05 Jun 2019
Get This Now


Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY:The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019
Get This Now


2019 Threat Report: Email Fraud in Financial Services
sponsored by Proofpoint
RESEARCH CONTENT:Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.
Posted: 05 Jun 2019 | Published: 05 Jun 2019
Get This Now


Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks
sponsored by Proofpoint
RESEARCH CONTENT:Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.
Posted: 28 May 2019 | Published: 28 May 2019
Get This Now


1 - 25 of 32 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement