Proofpoint

Displaying 1-24 of 24 results

  • Research // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2014

    Whether you’re looking to stop advanced inbound email threats from entering your organization, or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email - you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be...

    Sponsored By Proofpoint

  • Research // Dec 2014

    Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Aug 2009

    HIPAA and Beyond: An Update on Healthcare Security Regulations for Email

    Healthcare regulations for IT security ? such as HIPAA and the new HITECH provisions of HIPAA ? are now broader than ever. And they apply not just to healthcare organizations, but to their business partners, as well. Learn about new provisions of the US economic stimulus legislation (ARRA) and...

    Provided By Proofpoint

  • White Papers // Aug 2009

    Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

    This paper summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to "take the pulse" of IT decision-makers with respect to outbound messaging and data loss issues and to help raise awareness of the policy, technology and...

    Provided By Proofpoint

  • Case Studies // Mar 2009

    The Southend University Hospital NHS Foundation Trust Stops Patient Data Leaks With Proofpoint

    Southend University Hospital NHS Foundation Trust is one of the UK's key healthcare trusts. The challenge was an email encryption solution that integrated easily into current Exchange deployment as well as the back end IT infrastructure. Southend University selected the Proofpoint Messaging Security Gateway appliance to protect over 6000 employee...

    Provided By Proofpoint

  • Research // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2014

    Whether you’re looking to stop advanced inbound email threats from entering your organization, or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email - you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be...

    Sponsored By Proofpoint

  • Research // Dec 2014

    Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Aug 2009

    HIPAA and Beyond: An Update on Healthcare Security Regulations for Email

    Healthcare regulations for IT security ? such as HIPAA and the new HITECH provisions of HIPAA ? are now broader than ever. And they apply not just to healthcare organizations, but to their business partners, as well. Learn about new provisions of the US economic stimulus legislation (ARRA) and...

    Provided By Proofpoint

  • White Papers // Aug 2009

    Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

    This paper summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to "take the pulse" of IT decision-makers with respect to outbound messaging and data loss issues and to help raise awareness of the policy, technology and...

    Provided By Proofpoint

  • Case Studies // Mar 2009

    The Southend University Hospital NHS Foundation Trust Stops Patient Data Leaks With Proofpoint

    Southend University Hospital NHS Foundation Trust is one of the UK's key healthcare trusts. The challenge was an email encryption solution that integrated easily into current Exchange deployment as well as the back end IT infrastructure. Southend University selected the Proofpoint Messaging Security Gateway appliance to protect over 6000 employee...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint