All resources sponsored by:

Proofpoint

14 Matches
Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT:Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020
Get This Now


Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK:By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020
Get This Now


Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT:With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
Get This Now


What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER:For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020
Get This Now


Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET:Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020
Get This Now


Survey Report: Evolution of the CASB
sponsored by Proofpoint
ANALYST REPORT:In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.
Posted: 04 Sep 2020 | Published: 04 Sep 2020
Get This Now


Getting Started with CASB
sponsored by Proofpoint
WHITE PAPER:Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.
Posted: 02 Sep 2020 | Published: 02 Sep 2020
Get This Now


The Role of Insider Threat Management Software Platforms
sponsored by Proofpoint
EBOOK:As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


Insider Threat Management and Cybersecurity Tools
sponsored by Proofpoint
EBOOK:The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK:The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK:In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


2020 Cost of Insider Threats Global report
sponsored by Proofpoint
ANALYST REPORT:Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 22 Jun 2020 | Published: 22 Jun 2020
Get This Now


Looking within: The Hidden Costs of Insider Threats
sponsored by Proofpoint
RESOURCE:Whether it’s careless users, disgruntled employees or compromised accounts, the cost of insider threats is on the rise. The infographic provides a closer look at the statistics and insights regarding the dangers of insider threats. Download now to learn more.
Posted: 18 Jun 2020 | Published: 18 Jun 2020
Get This Now


Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER:Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


14 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info