ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Proofpoint

  • Proofpoint Cloud App Security

    As organizations continue to adopt cloud applications, protecting your people and the data they create is more challenging than ever. In this solution brief, learn more about Proofpoint’s Cloud App Security and discover if its features align with your needs.

  • Proofpoint Security Awareness Training

    While security tools allow organizations to detect and block malicious emails, one of the most effective ways to address modern cyberattacks is to train your employees in threat detection. However, it can be difficult to develop a training program. Read on to learn more about Proofpoint’s Security Awareness Training program.

  • Interactive Training Modules

    Employee awareness training remains one of the most effective aspects of a security strategy, but it can be difficult to develop an effective program. In this white paper, discover Proofpoint’s Security Awareness Training program’s key features and the various threat types it covers.

  • Proofpoint Threat Response Auto-Pull

    Today’s organizations are under a constant barrage of email attacks, and current detection methods are manual and labor-intensive, allowing for malicious emails to remain in inboxes. In this data sheet, discover the Proofpoint Threat Response email security platform, designed to identify and quarantine lingering malware.

  • A People-Centric Approach to Insider Threat Management

    Cyberattacks targeting individuals are on the rise. According to a study, over 50% of data breaches involve insiders. Addressing the new wave of threats requires shifting the focus to a people-centric approach. Download this solution brief to discover Proofpoint’s ObserveIT platform, designed to protect organizations from insider threats.

  • Next-Generation Email Security

    While traditional email security measures were enough for blocking spam emails, today’s highly targeted social engineering campaigns require advanced security tools. In this solution brief, take a closer look at the key features and capabilities of Proofpoint’s Next-generation Email Security tool.

  • 2020 State of Phish

    Along with immediate effects, successful phishing attacks have the most impact on an organization’s bottom line. Over recent years, security experts have been able to gather information to develop tactics for identifying and mitigating phishing attacks. Download this report to get a closer look at the current state of phishing.

  • 2019 Proofpoint Domain Fraud Report

    Like many of today’s cyberthreats, domain fraud targets people rather than infrastructure, posing as a trusted brand’s domain to commit fraud. This Domain Fraud report highlights the results of a recent study into the trends and tactics around domain fraud. Download this report to uncover the key findings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.