All resources sponsored by:

Proofpoint

1 - 25 of 32 Matches
The Anatomy of an Insider Threat Investigation
sponsored by Proofpoint
EBOOK:Read this visual guide to get a step-by-step look at how an insider threat investigation works – both with and without a dedicated insider threat management (ITM) platform. Dive in to get started.
Posted: 15 Sep 2021 | Published: 15 Sep 2021
Get This Now

TOPICS:  .NET

The 10 Biggest and Boldest Insider Threat Incidents
sponsored by Proofpoint
EBOOK:In the last year and a half, some of the most devastating cyberattacks came from where organizations least expected them – the inside. What could these companies have done differently to prevent these breaches? Read this e-book to explore some of the biggest insider attacks of 2020 & 2021 – and what you can do to avoid similar threats.
Posted: 14 Sep 2021 | Published: 14 Sep 2021
Get This Now

TOPICS:  .NET

Highlights from Former Legacy On-premises Archive Users—Now Using Proofpoint Enterprise Archive to Streamline Compliance Processes
sponsored by Proofpoint
ESG:Access this white paper to view the highlights of ESG-collected field data from 3 detailed interviews with customers who have deployed and are using Proofpoint Enterprise Archive to improve or transform the management and effectiveness of compliance procedures.
Posted: 12 Aug 2021 | Published: 12 Aug 2021
Get This Now


Modern Blueprint To Information Protection
sponsored by Proofpoint
WHITE PAPER:With the rapidly growing frequency, scope, cost, and impact of data breaches, it’s evident that a new approach to DLP is needed. Access this e-guide to learn more about modern data protection requirements and discover how your organizations can modernize its data protection capabilities.
Posted: 11 Aug 2021 | Published: 11 Aug 2021
Get This Now

TOPICS:  .NET

Why Today’s Organizations Need A More Modern Approach To Data Loss Prevention
sponsored by Proofpoint
WHITE PAPER:Data loss prevention (DLP) has always been an issue, but the embrace of cloud-based infrastructure, remote work and a varied mix of employees, contractors and outside vendors has presented even more DLP challenges. Read this white paper to understand these challenges and why a modern approach to DLP is required today.
Posted: 22 Jul 2021 | Published: 22 Jul 2021
Get This Now

TOPICS:  .NET

Compliance in the Age of Digital Collaboration
sponsored by Proofpoint
EBOOK:Access this e-book to learn how to explore the challenges of capturing and managing a growing volume and diversity of business communications as well as how to solve today's toughest compliance challenges.
Posted: 28 May 2021 | Published: 28 May 2021
Get This Now


The Complete Guide to Migrating Your Enterprise Archiving System
sponsored by Proofpoint
EBOOK:Check out this e-book for a complete guide to migrating your enterprise archiving system and learn everything you’ll need to know about moving to the cloud.
Posted: 28 May 2021 | Published: 28 May 2021
Get This Now

TOPICS:  Backups

Best Practices: Mitigating Insider Threat
sponsored by Proofpoint
WHITE PAPER:Malicious activity from insiders is especially difficult to detect because they’re users privileged access to data. However, they’re also entitled to privacy and due process, so security pros must handle these incidents with greater care than external threats. Download this Forrester report to learn 6 best practices for mitigating insider risk.
Posted: 12 May 2021 | Published: 18 Mar 2021
Get This Now

TOPICS:  .NET

Managing Insider Threats In Financial Services
sponsored by Proofpoint
EBOOK:According to Verizon’s Data Breach Investigation Report, 24% of all security breaches occur at financial institutions – and more than half the attacks on these companies come from insiders. How can these institutions handle this unavoidable risk? Download this e-book for a deeper perspective on insider threats management in financial services.
Posted: 12 May 2021 | Published: 12 May 2021
Get This Now

TOPICS:  .NET

Was Guy Fawkes the Biggest and Boldest Insider Threat Ever
sponsored by Proofpoint
VIDEO:The idea of insider threats has been around forever – conceptually, Guy Fawkes and the Gunpowder Plot of 1605 is not too different than the schemes of today’s malicious insiders. Watch this webinar for a deep dive into the history and evolution of insider threats and discover best practices for protecting your organization going forwards.
Posted: 17 Mar 2021 | Premiered: 05 Nov 2020
Get This Now

TOPICS:  Cybersecurity

Protecting Your Number 1 Threat Vector
sponsored by Proofpoint
VIDEO:Almost every modern cyberthreat involved humans – either as the target, the catalyst or the adversary. This webinar explores how the cyberattack landscape has changed to be more human-focused and offers 6 best practice for how your organization can shift security practices to be more people-centric. Watch now to get started.
Posted: 16 Mar 2021 | Premiered: 16 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Driving Real Behaviour Change to Email
sponsored by Proofpoint
VIDEO:People are increasingly becoming the most common target for today’s cyberattacks – but identifying and proactively protecting those at the greatest risk can be nearly impossible. Watch this webinar to learn how to build a security awareness program that is both people-centric and future-proof.
Posted: 15 Mar 2021 | Premiered: 15 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Unmasking BEC And EAC
sponsored by Proofpoint
WHITE PAPER:The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.
Posted: 12 Mar 2021 | Published: 12 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Analysing The Economic Benefits Of Proofpoint Insider Threat Management
sponsored by Proofpoint
RESEARCH CONTENT:As organizations continue to invest in cybersecurity tools and capabilities, it’s critical that they understand the total economic impact of a buying decision. Read this research report from ESG to unlock a comprehensive analysis into the economic benefits of Proofpoint’s Insider Threat Management (ITM) platform.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now

TOPICS:  Cybersecurity

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK:Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now

TOPICS:  Malware | Security

The Hidden Costs Of Free
sponsored by Proofpoint
WHITE PAPER:As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.
Posted: 10 Mar 2021 | Published: 10 Mar 2021
Get This Now

TOPICS:  Cybersecurity

2021 State Of The Phish
sponsored by Proofpoint
RESEARCH CONTENT:Phishing proved to be one of the most prominent threats of 2020 – luckily, most organizations have taken measures towards addressing this threat in 2021 in the form of phishing tests and security awareness training. Read this State of the Phish report for a comprehensive look into phishing observations, insights and recommendations.
Posted: 10 Mar 2021 | Published: 10 Mar 2021
Get This Now

TOPICS:  Cybersecurity

The 10 Biggest And Boldest
sponsored by Proofpoint
WHITE PAPER:Insider threats can happen anywhere, anytime – and studying real-world examples is the key to understanding how they play out so you can short up your defenses. Read this e-book for an overview of the top 10 insider threat incidents over the past 2 years and discover what you can learn from them to better protect your organization.
Posted: 09 Mar 2021 | Published: 09 Mar 2021
Get This Now

TOPICS:  Cybersecurity

STEP 1: An Overview Of Insider Threat Management
sponsored by Proofpoint
EBOOK:The recent rise of remote and hybrid workforces has increased the prevalence insider threats. In fact, Ponemon reports that insider-caused cybersecurity incidents have grown by 47% since 2018. Read this e-book for an overview of insider threats, including common vulnerability areas and best practices for ensuring protection.
Posted: 09 Mar 2021 | Published: 09 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Stopping BEC And EAC
sponsored by Proofpoint
EBOOK:Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.
Posted: 08 Mar 2021 | Published: 08 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT:Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020
Get This Now


Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK:By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020
Get This Now


Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT:With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
Get This Now


What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER:For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020
Get This Now


Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET:Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020
Get This Now


1 - 25 of 32 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences