Resources banner

Title - Resources Page

PROOFPOINT

Resources

Resources

Advanced options

Enterprise Governance

Enterprise Governance

Enterprise Governance

Datasheet

Download this data sheet to learn more about Proofpoint Enterprise Governance.

Proofpoint Threat Report (January 2015)

Proofpoint Threat Report (January 2015)

Proofpoint Threat Report (January 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (August 2014)

Proofpoint Threat Report (August 2014)

Proofpoint Threat Report (August 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (October 2014)

Proofpoint Threat Report (October 2014)

Proofpoint Threat Report (October 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (November 2014)

Proofpoint Threat Report (November 2014)

Proofpoint Threat Report (November 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (July 2013)

Proofpoint Threat Report (July 2013)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (November 2013)

Proofpoint Threat Report (November 2013)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (December 2013)

Proofpoint Threat Report (December 2013)

Proofpoint Threat Report (December 2013)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (July 2014)

Proofpoint Threat Report (July 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (December 2014)

Proofpoint Threat Report (December 2014)

Proofpoint Threat Report (December 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (February 2015)

Proofpoint Threat Report (February 2015)

Proofpoint Threat Report (February 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (March 2015)

Proofpoint Threat Report (March 2015)

Proofpoint Threat Report (March 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Content Control Data Sheet

Content Control Data Sheet

Datasheet

Download this data sheet to learn how Proofpoint Enterprise Content Control is the industry’s first cloud-based solution designed from the ground up to identify and remediate sensitive content sprawled across an enterprise. 

Best Practices for Migrating to Office 365

Best Practices for Migrating to Office 365

Best Practices for Migrating to Office 365

White Paper

This white paper is intended to help decision makers understand the implications of migrating to Office 365, and offers practical advice and data from O365 enabled organizations.

Sentrion MVP

Sentrion MVP

Sentrion MVP

Datasheet

Download this datasheet to learn about Proofpoint Sentrion's high-performance virtual message processor.

Sentrion Sendmail

Sentrion Sendmail

Sentrion Sendmail

Datasheet

Download this datasheet to learn about Proofpoint Sentrion's scaleable platform for enterprise messaging infrastructure and applications.

Threat Response Video

Threat Response Video

Video

Watch the video to hear from Kevin Moore of Fenwick and West as he talks about using Threat Response in real world situations.

Enterprise Archive for SEC and FINRA Compliance

Enterprise Archive for SEC and FINRA Compliance

Enterprise Archive for SEC and FINRA Compliance

Datasheet

Proofpoint Enterprise Archive allows financial organizations to govern and discover a wide range of data including email, instant message conversations, and documents, with data managed to address all requirements outlined by SEC 17a3-4. 

Archive for Financial Services

Archive for Financial Services

Webinars

Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations. 

Social Media Risk: Best Practices For Brand Protection

Social Media Risk: Best Practices For Brand Protection

Social Media Risk: Best Practices For Brand Protection

Webinars

Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they discuss Hayes' recent research into brand protection, including how organizations can mitigate social media risk and best practices to ensure that organizations remain safe when engaging with social. 

Gartner Report - Defending Against Advanced Threats

Gartner Report - Defending Against Advanced Threats

Gartner Report - Defending Against Advanced Threats

White Paper

Addressing the Cyber Kill Chain - Are you Prepared?
As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. 

Targeted Attack Protection

Targeted Attack Protection

Datasheet

Detect and block phishing, spear phishing, watering holes and other email-borne advanced threats during and after delivery

Proofpoint Enterprise Protection

Proofpoint Enterprise Protection

Proofpoint Enterprise Protection

Datasheet

Guard against advanced phish, malware, spam, and other email-borne threats

Privacy, DLP, Encryption

Privacy, DLP, Encryption

pdf
Datasheet

Privacy, DLP, Encryption

Datasheet

Industry-Leading Data Loss Prevention and Encryption to control information that leaves your organization in your emails, social media and web file sharing—and protect it from exposure at all times

Malvertising Protection

Malvertising Protection

Malvertising Protection

Datasheet

Protect your organization from malicious attackers using advertising in web pages as a delivery vehicle

Forester Research - Threat Response Webinar

Forester Research - Threat Response Webinar

Forester Research - Threat Response Webinar

Webinars

Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe.