All resources sponsored by:

Proofpoint

12 Matches
What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER:For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020
Get This Now


Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET:Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020
Get This Now


Survey Report: Evolution of the CASB
sponsored by Proofpoint
ANALYST REPORT:In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.
Posted: 04 Sep 2020 | Published: 04 Sep 2020
Get This Now


Getting Started with CASB
sponsored by Proofpoint
WHITE PAPER:Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.
Posted: 02 Sep 2020 | Published: 02 Sep 2020
Get This Now


The Role of Insider Threat Management Software Platforms
sponsored by Proofpoint
EBOOK:As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


Insider Threat Management and Cybersecurity Tools
sponsored by Proofpoint
EBOOK:The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK:The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK:In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


A Visual Guide to Insider Threat Investigations
sponsored by Proofpoint
EBOOK:What does an insider threat mean? The truth is, at times, it can be very abstract. And while there is value in understanding the principles and best practices that underlie a strong security program, it can also be very helpful to see for yourself what a given process actually looks like. Download this e-book to learn more.
Posted: 25 Jun 2020 | Published: 25 Jun 2020
Get This Now


2020 Cost of Insider Threats Global report
sponsored by Proofpoint
ANALYST REPORT:Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 22 Jun 2020 | Published: 22 Jun 2020
Get This Now


Looking within: The Hidden Costs of Insider Threats
sponsored by Proofpoint
RESOURCE:Whether it’s careless users, disgruntled employees or compromised accounts, the cost of insider threats is on the rise. The infographic provides a closer look at the statistics and insights regarding the dangers of insider threats. Download now to learn more.
Posted: 18 Jun 2020 | Published: 18 Jun 2020
Get This Now


Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER:Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info