Resource Center

Browse our library of videos, data sheets, white papers, research, and more.

Datasheet

Social Discover Data Sheet

Find fraudulent social media accounts associated with your brand

Datasheet

Social Patrol Data Sheet

Real-time protection and compliance supervision for your branded social media accounts

Video

Safeguarding Office 365 from Advanced Threats

Learn how Proofpoint can help provide superior security for your Microsoft Office 365 environment.

White Paper

Ransomware Survival Guide

Download this guide to find out what every organization needs to know about Ransomware.

Datasheet

Information Archiving

Simplify e-discovery and compliance. Avoid the headaches of managing archiving in-house. Retain, discover, access and supervise business-critical information. 

Datasheet

Enterprise Collaboration Archiving

Proofpoint Enterprise Collaboration Archiving integrates social and collaborative content into your existing information archive.

Solutions Brief

Information Protection

Find and protect your sensitive data, wherever it goes.

Datasheet

Data Discover

Reduce your exposure to data loss and compliance risk.

Datasheet

Enterprise Continuity

Email is essential for business. Traditional approaches to email continuity, designed to ensure high availability with on-premise email deployments, have proven costly and ineffective and left organizations with continued outages.

Solutions Brief

Proofpoint Essentials for SMBs

Complete defense against today’s email threats for small and mid-enterprises

Infographic

Why Cloud, Why Now

This infographic will reveal how to reduce cost, mitigate risk, and deliver value back to the business with a Next Generation Archive

Video

Solving Your Top 3 Archiving Challenges

Watch this 2 minute video to learn how to reduce cost, mitigate risk and deliver value back to the business with a next-generation archive from Proofpoint.

Solutions Brief

Advanced Threat Protection

Protect your people in email, mobile apps and social media.

Tech Brief

ET Intelligence and Splunk Technical Add-On

Identifying suspicious network activity in Splunk with ET Intelligence

Datasheet

Emerging Threats Intelligence

Enhance your security tools with more visibility, deeper research, fewer false positives, and meaningful analytics. Get fully verified threat intelligence and context around detected threats.

Datasheet

Mobile Defense

Advanced mobile protection for iOS and Android devices, apps and networks

Video

TAP Mobile Defense - Video Overview

Learn how TAP Mobile Defense provides visibility and automated workflow for managing risk in your environment.

White Paper

A CISO's Guide to Phishing and Malware

In this eBook from SecurityCurrent, Joel Rosenblatt, director of information security for Columbia University, explores real-world examples of advanced targeted attacks via email and social media demonstrating how these evolving threats are increasing an organization's business risks.

Video

Automate Your Social Media Compliance Auditing

Get a detailed look at how Proofpoint Social Discover can help you detect, audit, and archive social media content.

 

White Paper

Gartner Research – Fighting Phishing: Optimize your Defense

Download this Gartner Research report and learn effective strategies to negotiate, design and maintain an anti-phishing program. 

White Paper

The Impostor in the Machine

Learn how Proofpoint Enterprise Protection employs our dynamic classifier and quarantine functionality to allow you to quickly see, report and stop an Impostor Email attack technique.

Video

Proofpoint Solving Archiving Challenges

Solve your biggest archiving challenges. Track, classify, and control your data for streamlined discovery, simplified regulatory compliance, and fast access. Watch this video to learn about Proofpoint Archiving Solutions.

Video

Proofpoint Predictive Analytics - Video Overview

Get a detailed look at how Proofpoint Predictive Defense sandboxes malicious URLs before users can click. 

Video

Proofpoint Targeted Attack Protection Dashboard - Video Overview

Watch a comprehensive view of the Targeted Attack Protection dashboard in action. 

Video

Proofpoint Locky Demo

Learn how "Locky", a new ransomware delivered by the same actor behind many of the Dridex campaigns, is distributed via MS Word documents with malicious macros. 

Video

How Phishing Works - Video Overview

Learn how attackers utilize a compromised website to infiltrate your computer, steal your personal information and attack other computers.

Video

Cyber Security Investment - Aspen Insurance Video Testimonial

Cyber security investments can create a platform to engage and influence businesses as they become more aware of cyber threats.

White Paper

Credential Phishing: Hook, Line, and Sinker

Discover how Phishing has changed. Your people are now the primary target. Learn how your organization can detect, mitigate and stop credential phishing attacks before they succeed.

Video

Why Proofpoint - Video Overview

Learn how Proofpoint protects organizations from advanced attacks that target email, mobile apps, and social media, often stopping attacks before they reach their target on any network or device.

Video

Threat Response - Video Overview

Learn how Proofpoint's Threat Response enables organizations to verify, prioritize, and contain advanced threats and targeted attacks.

Video

Social Media Security - Video Overview

Learn how companies need to protect their growing social media programs, brand image and avoid costly compliance violations and audits.

Video

Proofpoint Advanced Threat Protection

Learn how Proofpoint’s next-generation cyber security solutions can help protect the information your people create against phishing, malware, and emerging threats before they happen. 

Video

Proofpoint By The Numbers Video

The numbers speak for themselves. Learn how Proofpoint detects, catches, and blocks today's advanced threats and email-borne attacks.

Video

Secure Office 365 With Proofpoint - Video Overview

Learn how the Proofpoint Advanced Threat Platform safeguards Office 365 and provides the tools and insight for rapid response.

Video

Are You Prepared for a Data Breach?

Learn more about the financial costs of a data breach and how Proofpoint can protect you and your organization from being hacked.

Video

Archive & Governance - Solution Overview

Learn more about Proofpoint's archive and governance solutions that address email storage management, eDiscovery, and regulatory compliance challenges.

Infographic

Is Microsoft Office 365 Secure?

The world is moving to Office 365. Don’t leave security, compliance and control up in the air. Download our infographic to get a quick glimpse into the data from our Office 365 research and learn about the top security, encryption, and archiving challenges when moving to the cloud.

White Paper

Advanced Threat Protection Enables Business eBook

Discover how stopping advanced threats protects data and the people who create it—so they have the freedom to continue innovating and connecting, moving business forward.

Threat Report

Proofpoint Threat Report (December 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

White Paper

Critical Capabilities for Enterprise Information Archiving

Download this new Gartner report, Critical Capabilities for Enterprise Information Archiving, to learn more about key findings, recommendations and what you need to know when deploying an enterprise archive solution.

White Paper

SANS Institute’s Spearphishing Survival Guide

In the SANS Spearphishing Survival Guide, the SANS Institute explores advanced email attack progression and the protection and prevention techniques your organization needs to meet the challenge of fighting today’s advanced spearphishing threats.

 

White Paper

The True ROI of Information Governance

Whitepaper by Osterman Research goes over the difficulty in making information governance effective and how to address those issues.

 

White Paper

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

App stores cannot protect enterprises from malicious and dangerous apps. Learn why these apps continue to be available on the major apps stores, for both iOS and Android, and why this will continue to be the case.

Research Report

The Value of Integrated Mobile, Social and Email Threat Defense

Download this research paper to learn how & why mobile, social and email threat vectors relate to each other from a security perspective and what you can do to make sure your organization is fully protected.

Threat Report

Proofpoint Threat Report (September 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Infographic

Email is Today's #1 Advanced Threat Vector

The greatest threat to an organization is sitting in its employee inboxes.  Download this infographic to find out more.

Webinars

Apps are sending your data all over the world. How can you defend against this?

The leaking of corporate data including simple contact data can easily lead to credential phishes and more. Download this on-demand webinar to find out how you can ensure your organization is protected. 

Threat Report

Proofpoint Threat Report (August 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Webinars

Archive Concerns with Office 365

Download this on-demand webinar and delve into how to meet your archiving, eDiscovery, and compliance needs with Office 365. 

Datasheet

Threat Response

Download this data sheet to learn how Proofpoint Threat Response automates containment to close the gap between threat detection and protection in real-time.

Webinars

The Return of the Malicious Macro, and the Economics of Cybercrime

Listen in to learn more about the economics of cybercrime and how to protect your organizations from malicious macros and other advanced threats.

Threat Report

Proofpoint Threat Report (July 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Infographic

The Cybercrime Economics Of Malicious Macros

Download our infographic to get a quick glimpse into the data from our recently released "Cybercrime Economics of Malicious Macros" report and learn more about these attacks.

 

Webinars

More Threat Vectors, More Security & Compliance Challenges

Listen in to learn how to tackle the measures financial regulators are pushing to guide financial institutions in sharpening information security practices.

Threat Report

Proofpoint Threat Report (June 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (May 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

White Paper

The Cybercrime Economics of Malicious Macros

While malicious macros aren’t that sophisticated or complicated, they are effective and most importantly – they are inexpensive, yielding a good ROI for the cybercriminals. Download the latest research from Proofpoint to learn more about the resurgence of this threat.
Podcast

Protecting Against Email Attacks

In this sponsored podcast Security Current’s Vic Wheatman speaks to Kevin Epstein, Vice President of Advanced Security and Governance with Proofpoint about combatting today’s advanced targeted attacks.
White Paper

HIPAA Security Whitepaper

Learn more about meeting the challenges of HIPAA compliance, phishing attacks and mobile security.
White Paper

Office 365: CXO's Guide to Security & Archiving Challenges

Read this Osterman Research white paper to learn more about the Office 365 environment, its applicability for organizations of all sizes, and the third party capabilities that Office 365 customers should consider to supplement the platform.

Solutions Brief

Social Media Protection

Proofpoint’s Social Protection solutions let you centrally discover, audit, and protect your firm’s social media presence.

Webinars

The Human Factor 2015 Webinar Replay

View this on-demand webinar, The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them, to learn more about the latest threats targeting organizations and how to combat them.

Infographic

Are You Prepared for a Data Breach?

Download this infographic to learn more about the financial implications of a data breach, common gaps in organizations' security posture that allow breaches in, and strategies organizations can take to minimize their attack surface. 

White Paper

Dealing with Data Breach and Data Loss Prevention

Download the latest research report from Osterman Research, Inc, in which Osterman details their latest research into top IT organizations and their preparedness for a data breach.

White Paper

Top 8 Healthcare Archiving and E-discovery Requirements

Download this white paper to learn the top concerns of healthcare providers from an archiving and e-discovery perspectivem, the major trends in litigation and regulatory investigations as well as how to respond to them, and the adoption rates and results of cloud and mobile technologies among hea

Webinars

Solving Puzzles: Threat Intelligence-Fueled Incident Response

View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats.

Webinars

Social Media Risk Management: Best Practices of Top Brands

View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc.

Webinars

Office 365: What You Need to Know

Download this on-demand webinar to learn key points to consider when looking at Office 365, including what stakeholders to engage, buying criteria, and areas that may require 3rd party support. 

Webinars

Data Breach Mitigation: Hardening Against Loss in 2015

Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how

Webinars

Stop the Bleeding: Advanced Threats and Incident Response in the Modern Enterprise

Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe.

Webinars

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?

Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, clien

Webinars

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats

Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x.

Webinars

Enabling Advanced Security and Compliance for Office 365

Download the on-demand webinar for a discussion on the top questions revolving around Office 365, complex security requirements, and protection from advanced email security threats.

Webinars

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption

Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business. 

Webinars

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance

Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance.

Webinars

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.

Webinars

Best Practices in Social Media Management and Archiving

Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidanc

Webinars

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP

Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles.

Webinars

Strategies for Defending Against Targeted Attacks

Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks.

Webinars

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014

Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them.

Webinars

Plugging the Email Security Gap

Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats.

Threat Report

Proofpoint Threat Report (April 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Webinars

Healthcare Privacy & Security

SECURING INFORMATION PRIVACY
Examines best practices for preventing cyber attacks before they happen and remediation when they do.

Research Report

The Human Factor 2016

Gain new insight into the ways attackers exploit end-users' psychology.

Threat Report

Proofpoint Threat Report (August 2014)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (October 2014)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (November 2014)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (July 2013)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (November 2013)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (December 2013)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (July 2014)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (December 2014)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (February 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Threat Report

Proofpoint Threat Report (March 2015)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

White Paper

Best Practices for Migrating to Office 365

This white paper is intended to help decision makers understand the implications of migrating to Office 365, and offers practical advice and data from O365 enabled organizations.

Datasheet

Sentrion MVP

Download this datasheet to learn about Proofpoint Sentrion's high-performance virtual message processor.

Datasheet

Sentrion Sendmail

Download this datasheet to learn about Proofpoint Sentrion's scaleable platform for enterprise messaging infrastructure and applications.

Video

Threat Response Video Testimonial - Fenwick & West

Learn how Fenwick & West LLP leveraged the Threat Response platform to consolidate all their security alert from different systems into one place. 

Solutions Brief

Enterprise Archive for SEC and FINRA Compliance

Proofpoint Enterprise Archive allows financial organizations to govern and discover a wide range of data including email, instant message conversations, and documents, with data managed to address all requirements outlined by SEC 17a3-4. 

Webinars

Archive for Financial Services

Download this on-demand webinar to learn more about the latest with Proofpoint Enterprise Archive's offerings for Financial Services organizations. 

Webinars

Social Media Risk: Best Practices For Brand Protection

Join Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc.

Datasheet

Targeted Attack Protection

Detect and block phishing, spear phishing, watering holes and other email-borne advanced threats during and after delivery

Solutions Brief

Email Protection

Protect your people from spam, malware, and even non-malware threats with accurate classification, granular control, and visibility into all email communication.

Datasheet

Email Data Loss Prevention

Industry-Leading Data Loss Prevention and Encryption to control information that leaves your organization in your emails, social media and web file sharing—and protect it from exposure at all times

Datasheet

Malvertising Protection

Protect your organization from malicious attackers using advertising in web pages as a delivery vehicle

Webinars

Forester Research - Threat Response Webinar

Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe.