Proofpoint

Displaying 1-35 of 35 results

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint

  • White Papers // Apr 2012

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Sep 2009

    Email Archiving: Understanding the Reasons, Risks and Rewards

    Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. Having a system in place that takes this...

    Provided By Proofpoint

  • White Papers // Aug 2009

    HIPAA and Beyond: An Update on Healthcare Security Regulations for Email

    Healthcare regulations for IT security ? such as HIPAA and the new HITECH provisions of HIPAA ? are now broader than ever. And they apply not just to healthcare organizations, but to their business partners, as well. Learn about new provisions of the US economic stimulus legislation (ARRA) and...

    Provided By Proofpoint

  • White Papers // Aug 2009

    Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

    This paper summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to "take the pulse" of IT decision-makers with respect to outbound messaging and data loss issues and to help raise awareness of the policy, technology and...

    Provided By Proofpoint

  • Case Studies // Mar 2009

    The Southend University Hospital NHS Foundation Trust Stops Patient Data Leaks With Proofpoint

    Southend University Hospital NHS Foundation Trust is one of the UK's key healthcare trusts. The challenge was an email encryption solution that integrated easily into current Exchange deployment as well as the back end IT infrastructure. Southend University selected the Proofpoint Messaging Security Gateway appliance to protect over 6000 employee...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Spam in Your Stocking: Malicious Holiday Email... and How to Stop It

    Offers for holiday sales, charitable solicitations and free shipping may very well be cleverly disguised attacks by phishers attempting to obtain personal identity and financial information. Spammers and virus writers also use these tactics during the holiday season to enable them to create ever-larger botnets that can be used to...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Leveraging Next-Generation Cloud Computing for Email Security and Archiving

    Want maximum control - managing custom policies, actions, users and reports? Or prefer a "Lights out" operation, which frees the administrators from ever having to spend time with the system? With the latest innovations, email security and archiving in the cloud can provide increased flexibility, control and security over traditional...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Time to Switch Your Email Security Solution? Top 5 Warning Signs

    With the continuing rise in email volumes and more aggressive spamming techniques, many organizations are struggling with tremendous growth in spam and other email-borne threats. And while most IT departments have email security solutions in place, many of these solutions are no longer adequate to deal with the increasing sophistication...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Is Now the Time to Deploy Email Encryption?

    According to a September 2009 Proofpoint/Osterman Research survey, 77% of enterprises IT professionals say that they have, or intend to, deploy email encryption, but 21% aren't sure when? With an escalating number of large fines being levied against corporations that don't comply with data protection regulations - and the constant...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Email Security and Compliance Risks: Video Webcast

    The presenter of this webcast discusses the current state of the secure email gateway market and the primary criteria organizations should consider when evaluating solutions. The presenter of this webcast speaks about the email risks that are driving enterprises to re-evaluate their current solutions and how Proofpoint can help address...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Minimal IT Budget?: Maximize ROI With Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. The presenter will discuss how in-the-cloud and new hybrid email security solutions can deliver more value than purely on-premises solutions. The presenter also explains...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Advances in SaaS Email Security: Data Loss Prevention and Beyond

    Until recently, selecting a SaaS solution for email security meant limiting the email security capabilities to spam and virus protection. Functions such as regulatory compliance, encryption and archiving were reserved for on-premise solutions due to security, trust and control issues. IT and security professionals were not ready to bet their...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    The Great Email Security Debate

    Based on "Real world" examples from Proofpoint's customer base, this web seminar replay discusses the critical factors that one should consider when evaluating email security deployment scenarios for the organization. The attendee will hear how to keep messaging infrastructure safe from spam and viruses, or prevent leaks of the organization's...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Stop Spam, Gain ROI With Virtual Appliances

    The presenter of this webcast will discusses how Proofpoint's breakthrough virtual appliance for messaging security delivers the industry's most advanced defense against spam, viruses and content security breaches - combined with the many benefits of virtualization. The latest spam and virus trends are also discussed.

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Customer Case Study Webinar: Cincinnati Bell Benefits From Proofpoint's Virtual Appliance for Messaging Security

    Virtual appliances are changing the traditional software distribution model. Independent software vendors can now package their application with the most appropriate operating system into a fully configured virtual machine, thus eliminating the set-up and configuration hurdles of new software deployment. IT organizations can now run these secure and reliable virtual...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    No Summer Vacation From Spam

    The presenter will discuss the latest email threats-including new spam techniques, phishing scams and blended threats- and how one can protect the organization, email system and end users this summer.

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Cloud Computing for Maximum Email Security

    At a time when email-borne threats continue to escalate while IT budgets shrink, enterprises seek new ways to improve security while simultaneously lowering costs. New cloud computing-based email security solutions - that multiply the power of the email security appliances one already own - can help to meet both objectives....

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Is It Time to Bench Your Anti-Spam Solution?

    The attendee of this webcast will learn how to address the threats facing the school and easily lower the Total Cost of Ownership (TCO) of the email security solution. The attende will see why schools such as City University of New York, Kent State, Oakland Unified School District, Prince William...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Lower Your TCO: Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. Advances in cloud computing and SaaS hold the key to achieving the lowest TCO and maximizing the ROI, while providing the anti-spam, anti-virus, DLP,...

    Provided By Proofpoint

  • White Papers // Jul 2008

    Beat Spam Today with Accurate and Adaptive Protection

    Mounting an effective defense against spam requires detection techniques that can evolve as quickly as the attacks themselves. Without the ability to automatically adapt to detect new types of threats, an anti-spam solution will always be a step behind the spammers. This whitepaper explains how Proofpoint MLX? technology leverages...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Spam in Your Stocking: Malicious Holiday Email... and How to Stop It

    Offers for holiday sales, charitable solicitations and free shipping may very well be cleverly disguised attacks by phishers attempting to obtain personal identity and financial information. Spammers and virus writers also use these tactics during the holiday season to enable them to create ever-larger botnets that can be used to...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Leveraging Next-Generation Cloud Computing for Email Security and Archiving

    Want maximum control - managing custom policies, actions, users and reports? Or prefer a "Lights out" operation, which frees the administrators from ever having to spend time with the system? With the latest innovations, email security and archiving in the cloud can provide increased flexibility, control and security over traditional...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Time to Switch Your Email Security Solution? Top 5 Warning Signs

    With the continuing rise in email volumes and more aggressive spamming techniques, many organizations are struggling with tremendous growth in spam and other email-borne threats. And while most IT departments have email security solutions in place, many of these solutions are no longer adequate to deal with the increasing sophistication...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Is Now the Time to Deploy Email Encryption?

    According to a September 2009 Proofpoint/Osterman Research survey, 77% of enterprises IT professionals say that they have, or intend to, deploy email encryption, but 21% aren't sure when? With an escalating number of large fines being levied against corporations that don't comply with data protection regulations - and the constant...

    Provided By Proofpoint

  • White Papers // Aug 2009

    HIPAA and Beyond: An Update on Healthcare Security Regulations for Email

    Healthcare regulations for IT security ? such as HIPAA and the new HITECH provisions of HIPAA ? are now broader than ever. And they apply not just to healthcare organizations, but to their business partners, as well. Learn about new provisions of the US economic stimulus legislation (ARRA) and...

    Provided By Proofpoint

  • White Papers // Jul 2008

    Beat Spam Today with Accurate and Adaptive Protection

    Mounting an effective defense against spam requires detection techniques that can evolve as quickly as the attacks themselves. Without the ability to automatically adapt to detect new types of threats, an anti-spam solution will always be a step behind the spammers. This whitepaper explains how Proofpoint MLX? technology leverages...

    Provided By Proofpoint

  • White Papers // Aug 2009

    Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

    This paper summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to "take the pulse" of IT decision-makers with respect to outbound messaging and data loss issues and to help raise awareness of the policy, technology and...

    Provided By Proofpoint

  • Case Studies // Mar 2009

    The Southend University Hospital NHS Foundation Trust Stops Patient Data Leaks With Proofpoint

    Southend University Hospital NHS Foundation Trust is one of the UK's key healthcare trusts. The challenge was an email encryption solution that integrated easily into current Exchange deployment as well as the back end IT infrastructure. Southend University selected the Proofpoint Messaging Security Gateway appliance to protect over 6000 employee...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Sep 2009

    Email Archiving: Understanding the Reasons, Risks and Rewards

    Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. Having a system in place that takes this...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Apr 2012

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Email Security and Compliance Risks: Video Webcast

    The presenter of this webcast discusses the current state of the secure email gateway market and the primary criteria organizations should consider when evaluating solutions. The presenter of this webcast speaks about the email risks that are driving enterprises to re-evaluate their current solutions and how Proofpoint can help address...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Minimal IT Budget?: Maximize ROI With Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. The presenter will discuss how in-the-cloud and new hybrid email security solutions can deliver more value than purely on-premises solutions. The presenter also explains...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Advances in SaaS Email Security: Data Loss Prevention and Beyond

    Until recently, selecting a SaaS solution for email security meant limiting the email security capabilities to spam and virus protection. Functions such as regulatory compliance, encryption and archiving were reserved for on-premise solutions due to security, trust and control issues. IT and security professionals were not ready to bet their...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    The Great Email Security Debate

    Based on "Real world" examples from Proofpoint's customer base, this web seminar replay discusses the critical factors that one should consider when evaluating email security deployment scenarios for the organization. The attendee will hear how to keep messaging infrastructure safe from spam and viruses, or prevent leaks of the organization's...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Stop Spam, Gain ROI With Virtual Appliances

    The presenter of this webcast will discusses how Proofpoint's breakthrough virtual appliance for messaging security delivers the industry's most advanced defense against spam, viruses and content security breaches - combined with the many benefits of virtualization. The latest spam and virus trends are also discussed.

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Customer Case Study Webinar: Cincinnati Bell Benefits From Proofpoint's Virtual Appliance for Messaging Security

    Virtual appliances are changing the traditional software distribution model. Independent software vendors can now package their application with the most appropriate operating system into a fully configured virtual machine, thus eliminating the set-up and configuration hurdles of new software deployment. IT organizations can now run these secure and reliable virtual...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    No Summer Vacation From Spam

    The presenter will discuss the latest email threats-including new spam techniques, phishing scams and blended threats- and how one can protect the organization, email system and end users this summer.

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Cloud Computing for Maximum Email Security

    At a time when email-borne threats continue to escalate while IT budgets shrink, enterprises seek new ways to improve security while simultaneously lowering costs. New cloud computing-based email security solutions - that multiply the power of the email security appliances one already own - can help to meet both objectives....

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Is It Time to Bench Your Anti-Spam Solution?

    The attendee of this webcast will learn how to address the threats facing the school and easily lower the Total Cost of Ownership (TCO) of the email security solution. The attende will see why schools such as City University of New York, Kent State, Oakland Unified School District, Prince William...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Lower Your TCO: Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. Advances in cloud computing and SaaS hold the key to achieving the lowest TCO and maximizing the ROI, while providing the anti-spam, anti-virus, DLP,...

    Provided By Proofpoint