All resources sponsored by:

Proofpoint

16 Matches
Human Factor Report 2019
sponsored by Proofpoint
ANALYST REPORT:Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.
Posted: 09 Oct 2019 | Published: 12 Mar 2019
Get This Now


Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER:Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019
Get This Now


Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET:Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


Understanding Email Fraud
sponsored by Proofpoint
ANALYST REPORT:Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY:From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY:Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Understanding Email Fraud
sponsored by Proofpoint
RESOURCE:Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.
Posted: 07 Jun 2019 | Published: 07 Jun 2019
Get This Now


Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY:When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019
Get This Now


2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT:Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings from their research and recommendations to better protect your organization from phishing attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019
Get This Now


User Risk Report 2018
sponsored by Proofpoint
RESEARCH CONTENT:Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.
Posted: 26 Feb 2019 | Published: 26 Feb 2019
Get This Now


Proofpoint Threat Response
sponsored by Proofpoint
WHITE PAPER:How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017
Get This Now


The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint
WHITE PAPER:Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Impact of Not Keeping Up with Cybercriminals
sponsored by Proofpoint
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint
EBOOK:This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015
Get This Now


16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info