ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Proofpoint

  • Unmasking BEC and EAC

    Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.

  • Driving Real Behaviour Change

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • 2020 User Risk Report

    Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.

  • The 10 Biggest & Boldest Business Email Compromise Scams of 2020 and 2019

    Business email compromise (BEC) is a growing threat continues to plague inboxes, stealing billions of dollars across industries of all sizes. In this e-book, Proofpoint provides a look at 10 of the biggest, boldest and most interesting business email compromise scams across 2019 and 2020. Read on to get started.

  • The Definitive Email Security Strategy Guide: A People-Centric Approach

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).

  • 2020 State of Phish

    Along with immediate effects, successful phishing attacks have the most impact on an organization’s bottom line. Over recent years, security experts have been able to gather information to develop tactics for identifying and mitigating phishing attacks. Download this report to get a closer look at the current state of phishing.

  • Human Factor Report 2019

    Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.

  • Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security

    From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.

  • Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%

    Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.

  • Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes

    When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.

  • The Current Landscape of Advanced Persistent Threats

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • The Impact of Not Keeping Up with Cybercriminals

    Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.

  • Shore Up Your Office 365 Attack Surface

    This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.