Webinars

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats
Download this on-demand webinar, Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats, to learn about the 3 phases of the security lifecycle required to stop the most advanced threats, and how following these steps, just like "stop, drop and roll", can help you quickly put out fires before they get out of control.
» Watch this webinar!

Strategies for Defending Against Advanced Targeted Attacks
Download the on-demand webinar, Strategies for Defending Against Advanced Targeted Attacks and hear from special guest speaker Rick Holland, Forrester Research's Principal Analyst serving security and risk professional, as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks.
» Watch this webinar!

Millions of Postini Mailboxes Successfully Migrated
Download the on-demand webinar to learn about the top replacement and upgrade solution for millions of successfully migrated Postini mailboxes, including: the top 3 concerns Postini users have before they migrate and the top 3 "Aha!" moments when they switch to Enterprise-class email security. This webinar also includes a demonstration into Proofpoint's email security as recognized in the Leader's Quadrant of the Gartner Secure Email Gateway Magic Quadrant.
» Watch the webinar!

BlueCross BlueShield Case Study: Best Practices and Critical Steps to Protect and Secure Sensitive Data
BlueCross BlueShield organizations and other leading healthcare institutions are using these email encryption technologies to ensure message privacy, enforce internal policies, and comply with data protection and privacy regulations, including HIPAA /HITECH regulatory compliance.
» Watch the webinar!

Spearing the Spear Phishers: How to Reliably Defeat Targeted Attacks
Learn about the anatomy of a targeted attack, Big Data Phish-finding, Anomalytics, Sandboxing, Follow-Me Protection, and Defense beyond the gateway.
» Watch the webinar!

Don't Get Hooked by the Latest Phishing Attacks
One of today's most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails—and the frequency of these attacks typically rises around the holiday season. Learn about the latest trends in phishing attacks and how you can keep your organization safe.
» Watch the webinar!

Enhanced Email Security and Compliance for Microsoft Email Environments
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the Office 365 suite.
» Watch the webinar!

Advanced Email Security and Compliance Strategies for Financial Services Organization
Watch this web seminar replay to learn how financial services firms can improve security, protect against violations of regulations such as GLBA, FINRA, PCI and the SEC rules and prevent costly data breaches.
» Watch the webinar!

Microsoft Office 365: Meeting Encryption, Privacy and Compliance Requirements
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the forthcoming Office 365 suite.
» Watch the webinar!

The Path to SaaS: Transitioning Email Security & Compliance Functions to the Cloud
How can you minimize risks while reaping the benefits of cloud computing? Proofpoint experts discuss the pros and cons of Security-as-a-Service and how taking "the path to SaaS" can improve compliance while delivering superior security over purely on-premesis approaches.
» Watch the webinar!

Holiday Email Security Threats Webinar, 2010
During the holiday season, spammers and scammers will use the increased volume of valid commercial email during the holidays as a "cover" for spam, phishing and malware infected messages, making it easier to deceive people into responding to fraudulent email. Proofpoint email security experts explain the latest attacks and best practices for protecting your organization.
» Watch the webinar!

Control Tomorrow's Spam Risks Today: Using Machine Learning to Beat Spam
Learn more about the latest inbound email threats, recent spam trends and Proofpoint's latest technology innovations for accurately identifying spam, phishing attacks and other email-borne threats. The newest spam techniques, the continued rise of botnets, spear phishing scams, threats from social media, outbound spam detection and more are covered.
» Watch the webinar!

Live Demo: Proofpoint Enterprise Protection and Privacy
Attend a live, online demonstration of Proofpoint's email security, privacy and data loss prevention solution, Proofpoint Enterprise. Discover first-hand the powerful, easy-to-use features of Proofpoint's cloud-based solutions for both inbound and outbound email security and compliance.
» Watch the webinar!

PCI-DSS and Email Security: Securing Cardholder Data and Your Email Systems
Email continues to be the number one source of data loss risks. If your organization handles or processes credit card data, you need to ensure that your email system complies with strict Payment Card Industry standards for data security (PCI-DSS). Learn how new email security technologies can help your organization's compliance with PCI-DSS. Real-world examples of how Proofpoint customers use integrated email encryption and DLP technologies for compliance, to securely transmit sensitive data and to improve levels of service and convenience to customers.
» Watch the webinar!

Prevent a data breach: Stay out of the headlines & save money through encryption
Download this on-demand webinar to learn best practices for implementing encryption to protect data without interrupting business.
» Watch the Webinar!

Addressing Your Number 1 Security Risk: Data Privacy, Data Encryption
Sure, hackers make good movie villains, but according to the data, they aren't your number one threat. In fact, it’s the dozens or even hundreds of unencrypted laptops, thumb drives and other mobile devices moving around your network. What should you do about it? Download this on-demand webinar from healthsystemCIO.com featuring Wes Wright, SVP/CIO of Seattle Children's Hospital to find out.
» Watch the Webinar!

When Obscurity and Security are a Good Idea: How user-transparent email encryption creates better compliance
Download the on-demand webinar to learn about what policy, technology and regulatory trends are most likely to impact your enterprise in 2014 and top email encryption strategies surrounding ease of use, transparency, and policy-based vs. user driven encryption.
» Watch the Webinar!

Privacy in the Wild: Real life stories of transparent encryption and DLP
Download the on-demand webinar Privacy in the Wild as three of our experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles.
» Watch the webinar!

Best Practices to Proactively Protect and Secure Sensitive Data
Proofpoint’s data privacy experts will discuss policy-driven encryption, privacy, and information governance solutions to ensure sensitive and private information is always secure and available – whether in transit or at rest.
» Watch the webinar!

Data Protection in the Cloud
With the growing popularity of cloud-based solutions, many organizations are exploring whether Microsoft Office 365 is sufficient to address their specific data protection needs. Unfortunately, making the wrong choice now can result in lost time, effort and expense – as well as exposure to litigation and regulatory risk. How can you assess whether features within Office 365 can adequately meet your needs for data security, privacy, and information control?
» Watch the webinar!

Use Cases for Innovative Policy-Based Encryption and Content Sharing
Download this on-demand webinar to hear insights from secure messaging and encryption experts on current DLP and file sharing trends, innovative customer use cases and best practices to solving data privacy problems, and key issues and considerations to successful encryption implementation and policy-based file share.
» Watch the webinar!

Enterprise Policy-Based File Sharing
Watch now to learn more about privacy data measures your enterprise peers are deploying with the live webinar, Enterprise Policy-Based File Sharing: Methods for optimal security control and data loss prevention. Proofpoint’s Enterprise Privacy expert, Art Chavez, will highlight requirements for successful implementations of encryption and data loss solutions for email as well as provide an interactive preview to a new service from Proofpoint designed to help enterprises solve the problem of data-leaks via large file transfers which users typically conduct over consumer services. .
» Watch the webinar!

File Sharing: Getting Data Control Without Frustrating Your Enterprise Users
Learn more about measures your enterprise peers are taking as it relates to privacy of data, and the ideal requirements for solutions that make such implementations successful when deploying encryption and data loss solutions for email. We will also provide a sneak preview to a new service from Proofpoint designed to help enterprises solve the problem of data-leaks via large file exchange that users typically conduct over public clouds and consumer services.
» Watch the webinar!

Policy-Based Email Encryption
Webinar for exclusive insight into to Data Leak Prevention (DLP) and privacy of data problems organizations face and those they are looking to proactively prevent in the future. Proofpoint's Amar Doshi and Steve Buccola will highlight key considerations for thinking about encryption solutions and risk, address what an ideal solution looks like, and discuss approaches organizations are taking towards proactively protecting sensitive information efficiently and where it matters most.
» Watch the webinar!

Best Practices and Critical Steps to Protect Your Organization's Data From Security Breaches
Learn the most effective approach that Proofpoint's financial industry customers are using to apply the next generation of easy-to-use, policy-based encryption and email privacy solutions to ensure sensitive and private information is always secure – on user desktops and mobile devices.
» Watch the webinar!

BlueCross BlueShield Case Study: Best Practices and Critical Steps to Protect and Secure Sensitive Data
BlueCross BlueShield organizations and other leading healthcare institutions are using these email encryption technologies to ensure message privacy, enforce internal policies, and comply with data protection and privacy regulations, including HIPAA /HITECH regulatory compliance.
» Watch the webinar!

Simplifying your Email Encryption Search: Tips to finding the right Encryption Solution
In today's ever-changing corporate landscape of increased mobile workforces, and with government and industry regulations on the rise, it is essential for all organizations to protect sensitive and confidential data from being leaked. Join us online for a discussion on the key components to identify the right encryption solution.
» Watch the webinar!

Top 5 Enterprise Privacy Issues for 2012
Organizations that fail to comply with increasingly stringent data protection regulations, implement the right safeguards against today's well-organized attackers, or neglect best practices around data privacy face the real risks of regulatory sanctions, loss of business and brand damage. Learn what trends are most likely to impact your organization.
» Watch the webinar!

Best Practices for Navigating the Global Regulatory Landscape
Learn from Proofpoint's data privacy expert the ways to untangle the complex web of global data protection and privacy regulations. Also, hear about best practices for evaluating and buying technology solutions to address your organization's global compliance challenges.
» Watch the webinar!

Enhanced Email Security and Compliance for Microsoft Email Environments
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the Office 365 suite.
» Watch the webinar!

Research Results: Outbound Email and Data Loss Prevention 2011
Proofpoint unveils the results of its 8th annual survey on outbound email and data loss prevention issues. Each year, Proofpoint surveys more than 200 of the US's largest enterprises to uncover the surprising facts about how they manage the data loss, data privacy and compliance risks posed by email, blog, social media, mobile devices and other electronic communications streams.
» Watch the webinar!

Advanced Email Security and Compliance Strategies for Financial Services Organization
Watch this web seminar replay to learn how financial services firms can improve security, protect against violations of regulations such as GLBA, FINRA, PCI and the SEC rules and prevent costly data breaches.
» Watch the webinar!

Microsoft Office 365: Meeting Encryption, Privacy and Compliance Requirements
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the forthcoming Office 365 suite.
» Watch the webinar!

Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks
For all healthcare providers, properly secured email and other web 2.0 messaging tools hold significant potential for lowering costs while improving service delivery. Failing to appropriately protect patient health information (PHI) or meet regulatory requirements can equal large fines and strict penalties. Watch this webinar replay to learn about the top messaging and collaboration risks facing healthcare organizations today.
» Watch the webinar!

Social Media Risks in the Enterprise: Mitigating Data Loss, Compliance and Discovery Dangers
With the growing use of social media, savvy organizations are examining their policies around social media usage, content, and even retention. Learn how the proper combination of policy and technology can help you take advantage of social media while preventing improper exposure of private, confidential and regulated information and securely archive social media content for electronic discovery.
» Watch the webinar!

The Path to SaaS: Transitioning Email Security & Compliance Functions to the Cloud
How can you minimize risks while reaping the benefits of cloud computing? Proofpoint experts discuss the pros and cons of Security-as-a-Service and how taking "the path to SaaS" can improve compliance while delivering superior security over purely on-premesis approaches.
» Download it now!

2011 Predictions: Top 10 Privacy Issues
Proofpoint email security and privacy specialists discuss the policy, technology and regulatory trends that will dominate privacy discussions in the coming year and suggest actions enterprises should take to better protect sensitive, confidential and regulated information.
» Watch the webinar!

Live Demo: Proofpoint Enterprise Protection and Privacy
Attend a live, online demonstration of Proofpoint's email security, privacy and data loss prevention solution, Proofpoint Enterprise. Discover first-hand the powerful, easy-to-use features of Proofpoint's cloud-based solutions for both inbound and outbound email security and compliance.
» Watch the webinar!

PCI-DSS and Email Security: Securing Cardholder Data and Your Email Systems
Email continues to be the number one source of data loss risks. If your organization handles or processes credit card data, you need to ensure that your email system complies with strict Payment Card Industry standards for data security (PCI-DSS). Learn how new email security technologies can help your organization's compliance with PCI-DSS. Real-world examples of how Proofpoint customers use integrated email encryption and DLP technologies for compliance, to securely transmit sensitive data and to improve levels of service and convenience to customers.
» Watch the webinar!

Email Encryption: Why Now is the Time to Deploy
Breaches of confidential information aren't an "if," but a "when." More than a third of large enterprises investigated the exposure of confidential information via email in the past year. Encryption technology is essential to protecting against these risks, but solutions have traditionally been seen as costly and hard to deploy. Learn about changes in the regulatory environment and how Proofpoint's SaaS-powered email encryption enables both policy-based encryption at the gateway and desktop-to-desktop email encryption.
» Watch the webinar!

Top 5 Best Practices for Minimizing Data Loss
CISA Robert Duchouquette of SBS Security shares real-world statistics on where data loss risks reside, gives recommendations on how to focus your investment and drills down on technology considerations to best control these risks.
» Watch the webinar!

End-to-end Email Security: Ensuring Data Privacy and Compliance from the Desktop to the Gateway and Beyond
Email security and compliance experts from Proofpoint and Titus Labs explain the increasingly complex global regulatory environment, how it impacts your organization's use of email, the basics of email and document classification and how it fits into your overall messaging security strategy.
» Watch the webinar!

HIPAA and Beyond: Meeting New Healthcare Security Requirements for Email
Today's penalties for data breaches are increasingly onerous: Fines are bigger, notification requirements are more stringent and enforcement organizations have new incentives for taking action against organizations that fail to protect healthcare privacy. Learn what you need to know about the latest security, privacy and data breach regulations for health information and what to look for in a secure email solution.
» Watch the webinar!

Is Now the Time to Deploy Email Encryption?
With an escalating number of large fines being levied against corporations that don't comply with data protection regulations — and the constant stream of news stories about companies that fail to properly protect private data — now might be right the time to deploy data loss prevention and email encryption in your organization. Learn about changes in the regulatory environment and Proofpoint's breakthrough SaaS-powered, policy-based email encryption solution.
» Watch the webinar!

Information Protection with Office 365: What You Need to Know
Download this on-demand webinar from Windows IT Pro featuring an in-depth discussion with experts Paul Robichaux, senior contributing editor for Windows IT Pro, and Joe Diamond, Director of Product Marketing at Proofpoint, on everything enterprises need to know and are asking about information protection with Office 365.
» Watch the webinar!

Best Practices in Social Media Management and Archiving with guest speaker Mike Osterman
Download the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including the current state of social media adoption, and plans for 2014, the state of internal social media policies, as well as IT visibility into social media, recent regulatory guidance and legal discovery decisions impacting the use of social media, and more.
» Watch the webinar!

On-Demand Webinar: Tweets, Feeds, and Chatter: Social media and regulatory compliance in 2014
Social media is fast, ubiquitous, and can yield measurably positive impact to your business. However, regulatory requirements to govern the use of social media are evolving quickly, and improper use can lead to damaged brands, regulatory fines, and harsh eDiscovery consequences. Forrester, Inc. analyst Nick Hayes joins Proofpoint for a discussion on social media and regulatory compliance in 2014.
» Watch the webinar!

Best Practices to Proactively Protect and Secure Sensitive Data
Download the on-demand webinar where we will discuss policy-driven encryption, privacy, and information governance solutions to ensure sensitive and private information is always secure and available – whether in transit or at rest.
» Watch the webinar!

Data Protection in the Cloud
With the growing popularity of cloud-based solutions, many organizations are exploring whether Microsoft Office 365 is sufficient to address their specific data protection needs. Unfortunately, making the wrong choice now can result in lost time, effort and expense – as well as exposure to litigation and regulatory risk. How can you assess whether features within Office 365 can adequately meet your needs for data security, privacy, and information control?
» Watch the webinar!

Top 5 Considerations for Migrating On-Premises Archives to the Cloud – From Theory to Practice
Hear the top 5 concerns organizations have with moving to the cloud, what options are available to mitigate those concerns, and how those concerns have been met in real world deployments.
» Watch the webinar!

Defensible Disposition—What You Need to Know
Download the on-demand webinar and hear from industry expert Randy Khan. We will highlight Governance capabilities, including Digital ThreadTM technology that allows organizations to track, monitor, and control information – regardless of where it resides.
» Watch the webinar!

Why Relying on Self-Collection for eDiscovery Can Cost You
According to Fulbright & Jaworski's recent “9th Annual Litigation Trends Survey Report”, 72% of 392 companies surveyed indicate that they continue to rely on employee self-collection when required to fulfill obligations for eDiscovery. Most do so believing it is more efficient and cost-effective than relying on IT to collect relevant information, or investing in tools that ensure that information is properly preserved. But, relying on the action of custodians alone may not be enough – and it may end up costing you and your company.
» Watch the webinar!

Improving eDiscovery Efficiency in a Cloud-Based World
Download this on-demand webinar, Improving eDiscovery Efficiency in a Cloud-Based World as we highlight key topics in the area of risk mitigation and cost reduction that can be realized by your organization, including real customer case studies.
» Watch the webinar

Effective eDiscovery Response: How organizations can regain control over unmanaged information
Effective eDiscovery Response: How organizations can regain control over unmanaged information, to learn about specific steps organizations are taking to address today's challenges of managing information for effective eDiscovery response. The discussion will highlight recent cases and describe how organizations can meet their discovery obligations with next generation solutions that deliver immediate, secure, and efficient information access.
» Watch the webinar!

Interact & Govern Your Corporate Data Wherever It Lives: Bringing archiving and information governance together
As industry experts Randy Kahn and Darren Lee discuss the forces driving increased focus on proactive information management and how organizations balance both approaches to provide a unified solution to resolve regulatory and legal requirements.
» Watch the webinar!

Counsel vs. Console: The top 5 tough document control, compliance and eDiscovery questions you should be asking your IT team (before it's too late)
As corporate environments become increasingly regulated and litigious, document control, compliance, and eDiscovery are crucial tools for all inside counsel. If handled properly, such systems can dramatically assist in defense. Yet if IT is left to their own devices and purchase based purely on lowest cost or checkbox comparisons performed by technical staff, you may discover that your eDiscovery is falling short. Proofpoint discusses the top five toughest questions you should be asking your IT staff, before it’s too late.
Register now to view the replay.
» Watch the webinar!

Archiving in the Cloud: Looking Beyond TCO
Reducing over-all total cost of ownership of technology is important, but not if it comes at the expense of introducing risk to critical processes. This is where cloud-based archiving solutions are proving to be successful as they overcome the difficulties and limitations of legacy systems. This webinar will provide information on how the Cloud can significantly enhance the ability to handle complex regulations or frequent, unpredictable discovery requests, which enables companies to focus on their core competencies while maintaining compliant with regulations.
» Watch the webinar!

Interact & Govern Your Corporate Data Wherever It Lives - Bringing archiving and information governance together
Proofpoint will discuss the intersection of information archives and in-place information governance. Information archives centralize key business or regulated messages and files to allow for rapid search, collection, and preservation, while ensuring mandated retention policies are followed.
» Watch the webinar!

Enhanced Email Security and Compliance for Microsoft Email Environments
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the Office 365 suite.
» Watch the webinar!

Mitigating Security Concerns about Cloud Archiving and eDiscovery
Learn how to mitigate the security and privacy risks often associated with storing data "in the cloud." Proofpoint VP of Technology, Andres Kohn, examines the pros and cons of cloud storage and discovery solutions and the tradeoffs between SaaS and other deployment models. Learn the top criteria you should use when evaluating the quality and security of cloud-based service providers, with a special focus on the unique requirements for eDiscovery.
» Watch the webinar!

Microsoft Office 365: Meeting Encryption, Privacy and Compliance Requirements
Watch this 2011 web seminar replay to learn how Proofpoint's SaaS email security and compliance solutions complement and extend hosted Exchange deployments, including Microsoft BPOS and the forthcoming Office 365 suite.
» Watch the webinar!

Why Relying on Exchange 2010 Alone for Archiving Could Cost You
Proofpoint email archiving experts explain why the basic email retention and discovery features of Exchange 2010 could put you in danger of high eDiscovery costs and compliance risks. Learn best practices for preparing for the most common eDiscovery scenarios.
» Watch the webinar!

Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks
For all healthcare providers, properly secured email and other web 2.0 messaging tools hold significant potential for lowering costs while improving service delivery. Failing to appropriately protect patient health information (PHI) or meet regulatory requirements can equal large fines and strict penalties. Watch this webinar replay to learn about the top messaging and collaboration risks facing healthcare organizations today.
» Watch the webinar!

Social Media Risks in the Enterprise: Mitigating Data Loss, Compliance and Discovery Dangers
With the growing use of social media, savvy organizations are examining their policies around social media usage, content, and even retention. Learn how the proper combination of policy and technology can help you take advantage of social media while preventing improper exposure of private, confidential and regulated information and securely archive social media content for electronic discovery.
» Watch the webinar!

The Path to SaaS: Transitioning Email Security & Compliance Functions to the Cloud
How can you minimize risks while reaping the benefits of cloud computing? Proofpoint experts discuss the pros and cons of Security-as-a-Service and how taking "the path to SaaS" can improve compliance while delivering superior security over purely on-premesis approaches.
» Watch the webinar!

What Are Your Obligations to Retain Email and Other Electronic Content?
Michael Osterman of Osterman Research is featured in this email archiving webinar. He shares the latest information about the business, litigation and regulatory compliance drivers for retaining email (and other forms of electronic content) and gives practical advice for organizations that seek to address these challenges.
» Watch the webinar!

End-to-end Email Security: Ensuring Data Privacy and Compliance from the Desktop to the Gateway and Beyond
Email security and compliance experts from Proofpoint and Titus Labs explain the increasingly complex global regulatory environment, how it impacts your organization's use of email, the basics of email and document classification and how it fits into your overall messaging security strategy.
» Watch the webinar!

Live Demo: Proofpoint Enterprise Archive
Request a live, online demonstration of Proofpoint's email archiving solution. Learn how our unique SaaS hybrid archiving architecture lets your organization easily access, search and retrieve archived email data in real-time from Proofpoint's secure, state-of-the-art storage infrastructure.
» Watch the webinar!

Surviving eDiscovery: IT and Legal Team Up to Meet the Challenge
More and more organizations today are involved in litigation and being held to increasingly strict compliance standards. As a result, both IT and legal departments are feeling the pain of having to produce email in response to court subpoenas under extremely tight deadlines. Proofpoint experts discuss the initial steps for compliance and litigation readiness and provide practical advice for both legal and IT teams.
» Watch the webinar!

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary?
With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? Proofpoint email archiving experts explain why archiving solutions will continue to be necessary, despite new email retention and storage management features in Exchange 2010.
» Watch the webinar!

Defensible Disposition—What You Need to Know
Download the on-demand webinar and hear from industry expert Randy Khan. We will highlight Governance capabilities, including Digital ThreadTM technology that allows organizations to track, monitor, and control information – regardless of where it resides..
» Watch the webinar!

Interact & Govern Your Corporate Data Wherever It Lives: Bringing archiving and information governance together
As industry experts Randy Kahn and Darren Lee discuss the forces driving increased focus on proactive information management and how organizations balance both approaches to provide a unified solution to resolve regulatory and legal requirements.
» Watch the webinar!

Counsel vs. Console: The top 5 tough document control, compliance and eDiscovery questions you should be asking your IT team (before it's too late)
As corporate environments become increasingly regulated and litigious, document control, compliance, and eDiscovery are crucial tools for all inside counsel. If handled properly, such systems can dramatically assist in defense. Yet if IT is left to their own devices and purchase based purely on lowest cost or checkbox comparisons performed by technical staff, you may discover that your eDiscovery is falling short. Proofpoint discusses the top five toughest questions you should be asking your IT staff, before it’s too late.
Register now to view the replay.
» Watch the webinar!

Interact & Govern Your Corporate Data Wherever It Lives - Bringing archiving and information governance together
Proofpoint will discuss the intersection of information archives and in-place information governance. Information archives centralize key business or regulated messages and files to allow for rapid search, collection, and preservation, while ensuring mandated retention policies are followed.
» Watch the webinar!

Threats Gone Wild: Turning security events from noise into insights and action
Download the on-demand webinar, Threats Gone Wild: Turning security events from noise into insights and action, to hear from experts in advanced threat protection and response discuss comprehensive incident insight and best practices for the entire lifecycle of a threat.
» Register Now!

How's the phishing in your watering hole?: The interplay of phishing and browser-based attacks
Download the on-demand webinar, How's the phishing in your watering hole?: The interplay of phishing and browser-based attacks, where Threat Response experts discuss phishing and watering holes as part of the phishers' toolkit and an exculsive sneak peek and demo into Proofpoint's latest acquisition and what it means for Proofpoint's email security platform.
» Watch the Webinar!

Strategies for Defending Against Advanced Targeted Attacks
Download this on-demand webinar, Strategies for Defending Against Advanced Targeted Attacks and hear from special guest speaker Rick Holland, Forrester Research's Principal Analyst serving security and risk professional, as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks.
» Watch the Webinar!

Contextual Security Approach to Protection from Targeted Threats
Download this on-demand webinar where you will gain a practical understanding of typical attacker tactics that are involved in creating targeted and Longlining attacks, learn findings from recent research by security analysts, and dive into Big Data approach to predict-and-protect organizations before user’s click-and-compromise.
» Watch the webinar!

Undetected Threats: Finding and protecting against hundreds of missed attacks
Undetected Threats: Finding and protecting against hundreds of missed attacks, the live Proofpoint webinar on today's threat risks on your organization, innovations to combating threats such as Anomalytics, Preditctive Sandboxing and MLX technology, and advanced techniques organizations are using to successfully prevent hundreds of attacks that are otherwise missed.
» Watch the webinar!

Today’s Threat Landscape: Longlining and the evolution of socially engineered attacks
Wendy Nather of 451 Research and Proofpoint’s Bryan Burns hold an informative discussion on Today’s Threat Landscape: Longlining and the evolution of socially engineered attacks. This interactive webinar will take a deep dive into: emerging advanced targeted attacks, longlining, Malware-tisements, and Watering Hole attacks, and critical holes in your organization's infrastructure that poses the greatest risk to compromising security.
» Watch the webinar!

Finding the One: Combatting 2013's Most Dangerous Attacks
With over half of organizations believing they have been hit by a targeted attack in the past year, Proofpoint is challenging the approach that the enterprise security industry has traditionally taken - and exploring revolutionary methods to effectively deal with the 1 that gets in.
» Watch the webinar!

Targeted Hybrid Attacks on Organizations: 2012 & Beyond
Threats are evolving — the landscape changing; organizations no longer only face spam, virus and phishing threats but a hybrid, where the attack is highly targeted, carefully crafted, and often impossible to detect. Organizations are finding great challenges in protecting against traditional email security threats, not to mention the "moving targets" posed by advanced, highly-targeted spear-phishing campaigns.
» Watch the webinar!

Targeted Attacks on Your Key Employees: How to respond to targeted attempts to steal sensitive enterprise data
Understand how information security can respond to targeted attempts to steal sensitive enterprise data, and learn how enterprises can take control of any targeted attack situation with full visibility into spotting and combating elusive spear-phishing attacks.
» Watch the webinar!

Spearing the Spear Phishers: How to Reliably Defeat Targeted Attacks
Learn about the anatomy of a targeted attack, Big Data Phish-finding, Anomalytics, Sandboxing, Follow-Me Protection, and Defense beyond the gateway.
» Watch the webinar!

Talk Now
Try it Now
Live Demo

Webinar
Webinar Threats Gone Wild:
Turning security events from noise into insights and action
Register Now
2014 Targeted Attacks Study
Watch Now How to Detect, Predict and Eliminate Advanced Targeted Threats.
Download Now
Technology Brief
Information Governance: Taming the Data Wild West The UBM Techweb Technology Brief, Information Governance: Taming the Data Wild West
Download Now »
©2014 Proofpoint, Inc.