All resources sponsored by:

Proofpoint

8 Matches
Proofpoint Cloud App Security
sponsored by Proofpoint
PRODUCT OVERVIEW:As organizations continue to adopt cloud applications, protecting your people and the data they create is more challenging than ever. In this solution brief, learn more about Proofpoint’s Cloud App Security and discover if its features align with your needs.
Posted: 04 Mar 2020 | Published: 04 Mar 2020
Get This Now


Proofpoint Security Awareness Training
sponsored by Proofpoint
DATA SHEET:While security tools allow organizations to detect and block malicious emails, one of the most effective ways to address modern cyberattacks is to train your employees in threat detection. However, it can be difficult to develop a training program. Read on to learn more about Proofpoint’s Security Awareness Training program.
Posted: 03 Mar 2020 | Published: 03 Mar 2020
Get This Now


Interactive Training Modules
sponsored by Proofpoint
WHITE PAPER:Employee awareness training remains one of the most effective aspects of a security strategy, but it can be difficult to develop an effective program. In this white paper, discover Proofpoint’s Security Awareness Training program’s key features and the various threat types it covers.
Posted: 03 Mar 2020 | Published: 03 Mar 2020
Get This Now


Proofpoint Threat Response Auto-Pull
sponsored by Proofpoint
DATA SHEET:Today’s organizations are under a constant barrage of email attacks, and current detection methods are manual and labor-intensive, allowing for malicious emails to remain in inboxes. In this data sheet, discover the Proofpoint Threat Response email security platform, designed to identify and quarantine lingering malware.
Posted: 02 Mar 2020 | Published: 02 Mar 2020
Get This Now


A People-Centric Approach to Insider Threat Management
sponsored by Proofpoint
PRODUCT OVERVIEW:Cyberattacks targeting individuals are on the rise. According to a study, over 50% of data breaches involve insiders. Addressing the new wave of threats requires shifting the focus to a people-centric approach. Download this solution brief to discover Proofpoint’s ObserveIT platform, designed to protect organizations from insider threats.
Posted: 02 Mar 2020 | Published: 02 Mar 2020
Get This Now


Next-Generation Email Security
sponsored by Proofpoint
PRODUCT OVERVIEW:While traditional email security measures were enough for blocking spam emails, today’s highly targeted social engineering campaigns require advanced security tools. In this solution brief, take a closer look at the key features and capabilities of Proofpoint’s Next-generation Email Security tool.
Posted: 28 Feb 2020 | Published: 28 Feb 2020
Get This Now


2020 State of Phish
sponsored by Proofpoint
WHITE PAPER:Along with immediate effects, successful phishing attacks have the most impact on an organization’s bottom line. Over recent years, security experts have been able to gather information to develop tactics for identifying and mitigating phishing attacks. Download this report to get a closer look at the current state of phishing.
Posted: 28 Feb 2020 | Published: 28 Feb 2020
Get This Now


2019 Proofpoint Domain Fraud Report
sponsored by Proofpoint
WHITE PAPER:Like many of today’s cyberthreats, domain fraud targets people rather than infrastructure, posing as a trusted brand’s domain to commit fraud. This Domain Fraud report highlights the results of a recent study into the trends and tactics around domain fraud. Download this report to uncover the key findings.
Posted: 27 Feb 2020 | Published: 27 Feb 2020
Get This Now


8 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info