Proofpoint

Displaying 1-17 of 17 results

  • White Papers // Mar 2015

    Addressing the Cyber Kill Chain - Are you prepared?

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Provided By Proofpoint

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // May 2010

    Using SaaS to Reduce the Costs of Email Security

    Software-as-a-service (SaaS) email security offerings, like Proofpoint on Demand, are becoming increasingly popular. Decision makers are increasingly receptive to the notion of using third party services because they realize that security must be extremely robust, but delivered at the lowest possible cost. This whitepaper discusses the dramatic cost savings...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Jun 2012

    Big Data Solutions to Enterprise Data Security Challenges

    Enterprises today are exposed to an ever-broadening range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberat¬tacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phish¬ing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Mar 2013

    Longline Phishing - Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks

    The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Such attacks have evolved from the simple inclusion of malware as a non-disguised executable file, to more socially engineered 'phishing' style attacks, which attempt to persuade...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Sep 2012

    Meeting today's data security challenges

    The threat environment is rapidly evolving, more stringent regulatory regimes are approaching, staff want to use their own devices instead of the organisations PCs and board-level stakeholders have growing concerns over data security. How can CIOs and other executives accountable for security handle today's data security challenges? In research...

    Provided By Proofpoint

  • White Papers // Sep 2012

    Archive: SaaS v On-Premise TCO Benefits and Risk Implications

    To improve performance, companies have two choices: expand on-premise or expand through software-as-a-service (SaaS). Drawing on case studies of customer deployments, this paper examines the costs and return on investment (ROI) of Proofpoint Enterprise Archive. The paper considers these variables: - Quantifiable costs pertaining to hardware, software, storage, and...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Why You Need to Consider Cloud-Based Security in 2012

    Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access...

    Provided By Proofpoint

  • White Papers // Apr 2012

    What Every Enterprise Should Know about Cloud Computing and eDiscovery

    Proofpoint Whitepaper on the eDiscovery and ESI Implications of Cloud Computing. Some enterprises are finding that their investment in cloud computing - particularly for email storage - can be at odds with their in-house eDiscovery strategies. Cloud computing makes IT operations fast and nimble, but it doesn't necessarily make electronically...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Financial Services, Regulation and the Achilles Heel of Email

    Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • White Papers // Mar 2015

    Addressing the Cyber Kill Chain - Are you prepared?

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Provided By Proofpoint

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Provided By Proofpoint