Proofpoint

Displaying 1 - 10 of 16 results

  • Addressing the Cyber Kill Chain - Are you prepared?

    White Papers // Mar 2015 // provided by Proofpoint

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how ...

    Download Now
  • The New Art of War: 2014 Targeted Attacks Study

    White Papers // Dec 2014 // provided by Proofpoint

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training ...

    Download Now
  • Longline Phishing

    White Papers // Mar 2013 // provided by Proofpoint

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade ...

    Download Now
  • Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    White Papers // Mar 2013 // provided by Proofpoint

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade ...

    Download Now
  • Meeting today's data security challenges

    White Papers // Sep 2012 // provided by Proofpoint

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research ...

    Download Now
  • Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    White Papers // Sep 2012 // provided by Proofpoint

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and ...

    Download Now
  • Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    White Papers // Sep 2012 // provided by Proofpoint

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Download Now
  • Big Data Solutions to Enterprise Data Security Challenges

    White Papers // Jun 2012 // provided by Proofpoint

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats ...

    Download Now
  • What Every Enterprise Should Know about Cloud Computing and eDiscovery

    White Papers // Apr 2012 // provided by Proofpoint

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically ...

    Download Now
  • Financial Services, Regulation and the Achilles Heel of Email

    White Papers // Apr 2012 // provided by Proofpoint

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?