ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Proofpoint

  • Attackers are Targeting your Company’s Most Valuable Resource: Your People

    Gaining true visibility into the state of cyber-risk requires organizations to address the need to protect people against attacks at 3 different levels. And when we say “people” we’re not just talking about senior execs/the c-suite. Download and discover how to more effectively address 3 major problem areas in today’s enterprise.

  • Cyber Insecurity: Managing Threats from Within

    Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.

  • Human Factor Report 2019

    Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.

  • Proofpoint Email Isolation

    It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.

  • Top 10 Reasons Customers Choose Proofpoint to Protect Office365

    For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.

  • Proofpoint Information Protection Research Team

    Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Assessing Cloud Access Security Brokers

    Cloud access security brokers are becoming a must have for enterprises as they commit to the cloud. Which CASB vendor is best for yours?

  • Getting Started with DMARC

    Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.

  • Top 10 Reasons Customers Choose Proofpoint to Protect Office 365

    For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.

  • Proofpoint Security and Compliance for Microsoft Office 365

    Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.

  • Understanding Email Fraud

    Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.

  • Quarterly Threat Report

    Learn about the most recent threats in 2019 and how to root them out in email messages, social media posts, and malware samples.

  • Protecting the End User

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

  • Stopping Email Fraud

    Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.

  • Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks

    Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.

  • Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security

    From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.

  • Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%

    Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.

  • Understanding Email Fraud

    Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.

  • Lincoln Memorial University Case Study

    There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.

  • Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes

    When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.

  • The Golden State Warriors Case Study: Leading on the Court and in Social Media

    As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.

  • Royal Bank of Scotland Reduces Phishing Susceptibility

    The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.

  • 2019 Threat Report: Email Fraud in Financial Services

    Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.

  • Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks

    Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.