All resources sponsored by:

Proofpoint

1 - 25 of 29 Matches
Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY:From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY:Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Episode 3: The Compromise
sponsored by Proofpoint
WEBCAST:This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019
Get This Now


Episode 2: The Attack
sponsored by Proofpoint
WEBCAST:This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019
Get This Now


Episode 1: Good Jan, Bad Jan
sponsored by Proofpoint
WEBCAST:This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019
Get This Now


Proofpoint Essentials for Microsoft Office 365
sponsored by Proofpoint
PRODUCT OVERVIEW:Office 365 is Microsoft's cloud-based email and collaboration platform. But you may need more advanced security capabilities beyond what's available. In this solution brief, explore how Proofpoint Essentials for Office 365 can help protect your users from targeted email attacks.
Posted: 07 Jun 2019 | Published: 31 Dec 2018
Get This Now


Understanding Email Fraud
sponsored by Proofpoint
RESOURCE:Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.
Posted: 07 Jun 2019 | Published: 07 Jun 2019
Get This Now


Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY:There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019
Get This Now


Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY:When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019
Get This Now


The Golden State Warriors Case Study: Leading on the Court and in Social Media
sponsored by Proofpoint
CASE STUDY:As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.
Posted: 05 Jun 2019 | Published: 05 Jun 2019
Get This Now


Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY:The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019
Get This Now


2019 Threat Report: Email Fraud in Financial Services
sponsored by Proofpoint
RESEARCH CONTENT:Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.
Posted: 05 Jun 2019 | Published: 05 Jun 2019
Get This Now


The Human Factor Report 2018
sponsored by Proofpoint
RESEARCH CONTENT:Over the last year, cybercriminals have increased their use of social engineering, scaling up people-centered threats. Whether they are broad-based or targeted the social engineering tactics used in these attacks work time and time again. In this research report, explore 5 recommendations to help protect your organization against these threats.
Posted: 04 Jun 2019 | Published: 31 Dec 2018
Get This Now


Cybersecurity Heroes Aren't Born... They're Made
sponsored by Proofpoint
WEBCAST:As organizations have become more open to delivering security awareness training, phishing has become a primary focus. But, email is just one of many mediums at cybercriminals' disposal. In this webcast, Gretel Egan discussed best practices and actionable tips for improving the effectiveness of your security awareness training activities.
Posted: 30 May 2019 | Premiered: May 31, 2018
Get This Now


The Insider Threat: Real Defense for Real Businesses
sponsored by Proofpoint
WEBCAST:How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.
Posted: 30 May 2019 | Premiered: Nov 30, 2018
Get This Now


Interview: The People Factor: Fight Back Against Phishing
sponsored by Proofpoint
WEBCAST:Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.
Posted: 30 May 2019 | Premiered: Jun 30, 2018
Get This Now


Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks
sponsored by Proofpoint
RESEARCH CONTENT:Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.
Posted: 28 May 2019 | Published: 28 May 2019
Get This Now


2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT:Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019
Get This Now


User Risk Report 2018
sponsored by Proofpoint
RESEARCH CONTENT:Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.
Posted: 26 Feb 2019 | Published: 26 Feb 2019
Get This Now


Healthcare's Cybersecurity Knowledge Gap
sponsored by Proofpoint
RESOURCE:Phishing and other cyberattacks can hit anyone. But the stakes are especially high for healthcare firms. Successful attacks can interrupt clinical practices and jeopardize patient safety. In this infographic, discover key statistics about healthcare's cybersecurity knowledge gap.
Posted: 25 Feb 2019 | Published: 25 Feb 2019
Get This Now


2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT:Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019
Get This Now


2018 User Risk Report
sponsored by Proofpoint
RESEARCH CONTENT:More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?
Posted: 16 Oct 2018 | Published: 16 Oct 2018
Get This Now


Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint
EBOOK:Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018
Get This Now


Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint
EBOOK:Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018
Get This Now


2018 Beyond the Phish Report
sponsored by Proofpoint
ANALYST REPORT:In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.
Posted: 09 May 2018 | Published: 09 May 2018
Get This Now


1 - 25 of 29 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement