Glossaire de la cybersécurité
Aujourd'hui, les pirates exploitent les nouvelles dynamiques de l'entreprise pour cibler les individus sur leur lieu de travail. Garder une longueur d'avance sur les menaces les plus récentes et sur les tout derniers vecteurs d'attaque se révèle donc crucial pour pouvoir protéger l'entreprise contre les violations et la compromission des données.
Measuring the Impact of Proofpoint Human-Centric Security
Human-centric security is the force multiplier in a modern cybersecurity architecture, adapting, connecting and elevating your existing security investments.
A Buyer’s Guide to Data Security Posture Management
Choosing the right Data Security Posture Management (DSPM) solution can be overwhelming. With myriad vendors offering various capabilities, making the right decision is crucial for your organisation’s data security and compliance.
Phishing in 2025: AI, Social Engineering & the New Threat Landscape
Join our cybersecurity experts as they uncover with real examples the most cunning types of phishing attacks threatening organisations across EMEA in 2025.
Proofpoint Prime Threat Protection for Enterprise
Proofpoint Prime Threat Protection is a complete solution that helps you to defend against human-centric threats across email, cloud apps, collaboration and messaging tools and more.
Improve Data Defences With Greater Context About Data
Proofpoint DSPM discovers, classifies and protects sensitive data at scale, while reducing human-centric risks to data. It prioritises risks, assigning monetary value to data and visualising access risks. Get guided remediations to address exposures and improve compliance and efficiency.
Enterprise Prime Threat Protection
Proofpoint Prime meets organisations’ need for a comprehensive solution from a single strategic partner to stop all human-centric threats for today and tomorrow’s landscape.
Evaluator’s Guide for Data Security Solutions
A Proofpoint proof of concept (PoC) gives you a quick and easy way to get hands-on experience with our Data Security solutions.
Streamlining Microsoft 365 Email Security with Automation
Join our experts for a two-part 30-minute webinar series diving into best practices to safeguard your Microsoft 365 email system, streamline security operations, and reduce risk.
Strengthening Microsoft 365 Email Security with Advanced Threat Protection
Join our experts for a two-part 30-minute webinar series diving into best practices to safeguard your Microsoft 365 email system, streamline security operations, and reduce risk.
New Gartner® Report: Overcome<br />AI-Powered Attacks by Leveling Up Your Email Security Platform
Cybercriminals have shifted their email attack tactics. AI-powered tools have enabled them to send messages at scale for attacks like business email compromise (BEC) and account takeover (ATO). In this report, Gartner identifies some key challenges when it comes to stopping these attacks.
Best Practices for AI-Driven Email DLP
Join this 45-minute webinar to learn about a new modern, layered approach to Email Data Loss Prevention (DLP).
The Economic Benefits of Proofpoint Prime Threat Protection – ESG Report
With Proofpoint Prime Threat Protection, you can reduce costs and simplify your security stack without sacrificing protection. Prime combines threat protection, account takeover defense, impersonation protection and security education into a single, integrated platform.