Proofpoint

Displaying 1 - 10 of 16 results

  • Big Data Solutions to Enterprise Data Security Challenges

    White Papers // May 2016 // provided by Proofpoint

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats ...

    Download Now
  • Why You Need to Consider Cloud-Based Security in 2012

    White Papers // May 2016 // provided by Proofpoint

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access ...

    Read more
  • Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    White Papers // May 2016 // provided by Proofpoint

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Learn more
  • What Every Enterprise Should Know about Cloud Computing and eDiscovery

    White Papers // May 2016 // provided by Proofpoint

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically ...

    Read more
  • A Guide to Corporate Social Media Security

    White Papers // Apr 2016 // provided by Proofpoint

    With rapid business adoption of social media as a core public communication channel, organizations are increasingly exposed to an array of internal and external security risks. Fraudulent Facebook accounts impersonate major brands to sell counterfeit products. Bogus LinkedIn profiles trick employees into divulging sensitive data. Corporate Twitter accounts are hijacked ...

    Download Now
  • How Credential Phishing is Changing — How to Stop It

    White Papers // Apr 2016 // provided by Proofpoint

    Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple: it works. Nearly one in four people who receive a phishing email open it, and more than 10% click on the malicious link or open the weaponised attachment that the ...

    Read more
  • The Impostor in the Machine

    White Papers // Apr 2016 // provided by Proofpoint

    Advanced threats are shifting once again, and you and your company will likely become the target of a new type of threat. Carefully planned and researched, impostor emails target specific people in your company. Either you become the target of this attack or you become the unwitting victim. Impostor emails ...

    Learn more
  • The New Art of War: 2014 Targeted Attacks Study

    White Papers // Jan 2015 // provided by Proofpoint

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training ...

    Find out more
  • Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    White Papers // Mar 2013 // provided by Proofpoint

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade ...

    Download Now
  • Longline Phishing

    White Papers // Mar 2013 // provided by Proofpoint

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade ...

    Download Now