Home Page

Hero Component

Happening Now

Happening Now



Choices Component

SOLUTIONS

THREAT PROTECTION

Detect, block, and respond to email and social media-based threats, and harden against data loss

COMPLIANCE

Comply easily and thoroughly with internal security controls as well as external regulatory policies

DISCOVERY

Find information quickly—whether it resides on email, IM, social media, shared drives or SharePoint

Threat Insights Component

Threat Insight

Research and commentary on malware, user actions, and other threats to information security

Mar05

What attachments?: Credential phishing with cloud-based documents

Posted by Proofpoint Staff | 0

As the use of cloud-based documents becomes more and more widespread, phishing campaigners have also been leveraging this behavior as a lure for their messages to the benefit of their effectiveness.

02 March 2015

Global, Social, Fake: UK trumps US in social media security and compliance issues

Posted by Proofpoint Staff | 0

As part of its risk intelligence and research practices, Proofpoint Nexgate recently analyzed data on social media accounts of ten of the top UK FTSE 100 brands, and found that the risks and threat activity for UK enterprise brands are trending higher.

Live Demo

Join Us for a Live Demo

Find out how Proofpoint can help your organization detect, prevent, and respond to threats.

 

3 Article Component

PROOFPOINT IN THE NEWS