Research Library

Powered by

Email Security Research

  • Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement

    Sponsored by: Ziften

    38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.

  • 5 Steps to Selecting an Enterprise Anti-Virus Replacement

    Sponsored by: Ziften

    Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.

  • Secure Your Office 365 Environment With Forcepoint

    Sponsored by: Forcepoint

    Driving Office 365 adoption is an important goal. Yet few organizations have fully migrated due to concerns around security, compliance, and poor user experience. In this webcast, learn how Forcepoint's Office 365 platform can help you move past these barriers by providing the confidence you need to fully adopt the suite.

  • Phishing in the Age of SaaS

    Sponsored by: SonicWall

    Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.

  • How a Security Company Adopts Office 365

    Sponsored by: Forcepoint

    Driving Office 365 adoption is an important goal yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. In this webcast, join Forepoint's CIO and Chief Scientist as they share learnings, surprises and insight from their own migration.

  • The State of Email Security Report 2019

    Sponsored by: Mimecast

    Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.

  • Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security

    Sponsored by: Proofpoint

    From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.

  • Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%

    Sponsored by: Proofpoint

    Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.

  • Episode 2: The Attack

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.

  • Episode 1: Good Jan, Bad Jan

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.

  • Proofpoint Essentials for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is Microsoft's cloud-based email and collaboration platform. But you may need more advanced security capabilities beyond what's available. In this solution brief, explore how Proofpoint Essentials for Office 365 can help protect your users from targeted email attacks.

  • Understanding Email Fraud

    Sponsored by: Proofpoint

    Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.

  • Lincoln Memorial University Case Study

    Sponsored by: Proofpoint

    There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.

  • Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes

    Sponsored by: Proofpoint

    When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.

  • The Golden State Warriors Case Study: Leading on the Court and in Social Media

    Sponsored by: Proofpoint

    As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.

  • Securing Office 365 Email with Isolation

    Sponsored by: Menlo Security

    An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.

  • Royal Bank of Scotland Reduces Phishing Susceptibility

    Sponsored by: Proofpoint

    The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.

  • 2019 Threat Report: Email Fraud in Financial Services

    Sponsored by: Proofpoint

    Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.

  • 2019 SonicWall Cyberthreat Report

    Sponsored by: SonicWall

    Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.

  • The Human Factor Report 2018

    Sponsored by: Proofpoint

    Over the last year, cybercriminals have increased their use of social engineering, scaling up people-centered threats. Whether they are broad-based or targeted the social engineering tactics used in these attacks work time and time again. In this research report, explore 5 recommendations to help protect your organization against these threats.

  • Cybersecurity Heroes Aren't Born... They're Made

    Sponsored by: Proofpoint

    As organizations have become more open to delivering security awareness training, phishing has become a primary focus. But, email is just one of many mediums at cybercriminals' disposal. In this webcast, Gretel Egan discussed best practices and actionable tips for improving the effectiveness of your security awareness training activities.

  • Interview: The People Factor: Fight Back Against Phishing

    Sponsored by: Proofpoint

    Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.

  • Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks

    Sponsored by: Proofpoint

    Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Trend Micro, Inc.

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • TITUS Military Classification Tool

    Sponsored by: TITUS

    In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.