All resources sponsored by:

Proofpoint, Inc.

20 Matches
Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER:Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018
Get This Now


The Cost of Microsoft Office 365 Security and Compliance
sponsored by Proofpoint, Inc.
RESOURCE:From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.
Posted: 27 Feb 2018 | Published: 27 Feb 2018
Get This Now


The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER:Developing a plan to comply with the new rules of the EU GDPR is critical for all organizations. Leverage this guide to help you discover, plan and act on the upcoming GDPR.
Posted: 27 Feb 2018 | Published: 27 Feb 2018
Get This Now


Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018
Get This Now


The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018
Get This Now


Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK:Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018
Get This Now


Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE:Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018
Get This Now


Vendor Breakdown: Which Secure Email Gateway is Right for You?
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:Security and risk management leaders continue to rely on the secure email gateway (SEG) as a critical component of their security strategy in an evolving threat environment. But which SEG is the right one for you? Download this Gartner Market Guide for SEGs to compare vendor capabilities and see which tool is best for your organization.
Posted: 07 Sep 2018 | Published: 03 May 2017
Get This Now


Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK:Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018
Get This Now


Securing Microsoft Office 365: The Inside Track to Threat Protection
sponsored by Proofpoint, Inc.
RESOURCE:In this report, learn about the security risks of cloud-based productivity suites and how your organization can take the necessary steps to avoid them.
Posted: 06 Sep 2018 | Published: 06 Sep 2018
Get This Now


Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESOURCE:In this ransomware survival guide, learn how most ransomware spreads and uncover everything your organization needs to know before, during, and after an attack.
Posted: 01 Jun 2018 | Published: 29 Dec 2017
Get This Now


Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT:This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018
Get This Now


Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER:Compliance, discovery and preservation are key drivers of the enterprise information archiving market. This Gartner report reveals strengths and cautions of different vendor's enterprise information archiving products as well as a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017
Get This Now


How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE:Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017
Get This Now


How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER:This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017
Get This Now


The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER:Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016
Get This Now


The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE:In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016
Get This Now


Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE:IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


The Impact of Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE:Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016
Get This Now


Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint, Inc.
EBOOK:This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015
Get This Now


20 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement