Resource Center

Browse our library of videos, data sheets, white papers, research, and more.

  • White Paper

    White Paper

    The Human Factor 2017

    Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor Report.

    Highlights of this year’s report include:

    • Business email compromise (BEC) attacks rose 45% in Q4 of 2016. Attacks are shifting beyond the CEO-CFO relationship, targeting other employee groups deeper within the organization.
    • Fraudulent social media accounts became a major feature of the threat landscape in 2016. These so-called “angler phishing” attacks grew by 150% in 2016.
    • Mobile clicks on malicious URLs doubled revealing the importance of protecting devices beyond the enterprise.

    Fill out this form to get your copy.

    DOWNLOAD NOW >
  • Analyst Report

    Analyst Report

    Deploying and Managing Security in the Cloud

    Against the backdrop of new and emerging security threats in the cloud era, how do decision makers decide how best to implement security? This Osterman Research White Paper is intended to help address new and innovative ways of protecting corporate data in the cloud. Learn how a unified approach to security in the new era of cloud will enable you to:

    • Mitigate risk
    • Meet compliance requirements
    • Reduce vulnerabilities
    • Stop attacks and access to sensitive data

    Fill out the form to view the complete report.

    READ MORE >
  • White Paper

    White Paper

    The DLP Dilemma Report

    Sprawling data and a growing number of users needing access to sensitive information continues to challenge today’s enterprises. Addressing these issues without complicating your environment is key to an effective information protection program. 

    Getting the most from DLP requires a solution that goes above and beyond.  Make sure your solution meets these requirements:

    • Automated discovery and identification of sensitive content
    • Continuous monitoring
    • Automated, dynamically applied encryption

    Learn more in The DLP Dilemma. Please enter your contact information to view the complete report.

    DOWNLOAD NOW >
  • White Paper

    White Paper

    The risks of moving to Microsoft Office 365

    Most businesses have either implemented or are implementing Office 365. Exclusive research commissioned by Proofpoint of UK’s senior IT decision-makers in FTSE 100 companies and the UK public sector reveals the security risks and challenges of making this particular move to the cloud.

    Learn about why the participants listed these areas as key concerns relating to Office 365:

    64% - blocking unknown threats (e.g. attachment-based malware attacks)
    52% - application/system performance
    45% - ensuring regulatory compliance
    45% - blocking known threats (e.g. malware or viruses)

    In addition, the Report also addresses Office 365 business continuity around this mission-critical app – if Office 365 is down, is your workforce staying productive with unsanctioned webmail services that carry their own risks?

    Download the ‘Securing Microsoft Office 365: The inside track to threat protection’

    DOWNLOAD NOW >
  • White Paper

    White Paper

    Ad Hoc to Coordinated

    There are many different security incident response plans. They range from the most formal, coordinated processes advocated by NIST and SANS to those created on the fly for a specific purpose—the ad hoc kind. Under pressure and trying to save time, IT teams often labor under ad hoc investigation techniques that don’t contain the whole problem.

    Using the Proofpoint four-step incident response process will help your team bridge the gap between makeshift efforts to a coordinated incident response effort. Each step offers you increased situational awareness for better response.

    Download this white paper to learn about the benefits of each step, the barriers to address as well as the risks you may create when opting to save time by cutting corners.

    DOWNLOAD NOW >
  • White Paper

    White Paper

    What You Don’t See Could Be Hurting Your Organization

    The visibility gap has become one of cybersecurity’s biggest and fastest-growing problems. Organizations are not seeing the malicious emails that are opened off their network or the social media accounts impersonating a brand or the mobile apps that siphon sensitive data from personal devices. And that means cyber attackers getting through, stealing data, reputations and money.  

    Download the white paper and read about:
    • Why security teams are looking for threats in the wrong places
    • Six factors that contribute to the costs of a data breach—beyond the value of lost data
    • A three-pronged approach to bridging the visibility gap and protecting your organization

    Improve your vision. Get your copy of the white paper now.

    Blindspots Visibility WP Cover

    DOWNLOAD NOW >
  • Analyst Report

    Analyst Report

    Best practices for social media management and archiving

    The use of social media in the work place is growing rapidly. However, management of social media and archiving of its content has not kept pace with the rapid growth in its use. The result has been a number of problems for which most organizations are inadequately prepared.

    In this analyst report by Osterman Research, learn more about these issues:

    • Most organizations are not archiving the business records sent through and stored in social media. This leaves them vulnerable to an inability meet compliance obligations or respond effectively to data production requests for ediscovery or regulatory examination.
    • Social media represents an easy way for malware to enter an organization and create significant damage, but decision makers are not sure whether or not their organization has been infiltrated.
    • Most organizations have published a social media policy, but most of these policies are not sufficiently detailed and thorough to protect the organization from the varied ways in which social media can be used.
    READ MORE >
  • Analyst Report

    Analyst Report

    Best Practices for Dealing with Phishing and Ransomware

    Phishing and ransomware are serious threats that can cause enormous damage to an organization’s finances, data assets and reputation. This white paper can help you reduce the chance of a successful phishing or ransomware attack and minimize the consequences if an attack breaches your defenses.

    Learn about:

    • Security issues that concern decision makers
    • Why phishing and ransomware are so successful
    • The effectiveness of current solutions
    • Seven steps to combat phishing and ransomware

    Please enter your contact information to view the complete report.

    READ MORE >
  • Analyst Report

    Analyst Report

    Best Practices for e-discovery and Regulatory Compliance in Office 365

    While Microsoft is making forward strides with its e-discovery capabilities, there are a number of limitations and weaknesses in its approach. Osterman Research recommends that every organization evaluate the capabilities of third-party vendors and select the right approach in light of their requirements profile.

    To download this white paper, please complete the form.

    READ MORE >
  • Analyst Report

    Analyst Report

    Next-Generation Archiving

    What can your organization do with an archiving solution – an on-premises or cloud- based system that will ingest email and other electronic content, index this information, place it into archival storage, and allow the search and production of relevant content from that archive?

    This white paper discusses the benefits of next-generation archiving, and some of the results of a survey that was conducted for this paper.

    50-50-data-charts_1.jpg

    READ MORE >
  • Analyst Report

    Analyst Report

    IDC Technology Spotlight

    Enterprises are in the midst of a juggling act and many are struggling to keep all the balls in the air. Business leaders are balancing demands for greater collaboration and productivity, while at the same time,trying to keep pace with the ever evolving and tightening regulatory environment governing their business practices.

    This IDC Technology Spotlight discusses the impact of regulation on the financial services industry and the integral role that technology can play in simplifying and automating compliance initiatives. This paper will also describe Proofpoint’s Intelligent Supervision software and its ability to address the challenges financial services firms face in monitoring corporate data, reviewing it in an efficient manner, and taking meaningful action.

    Download this report by completing the form to the right.

    READ MORE >
  • Analyst Report

    Analyst Report

    Gartner Magic Quadrant Report Enterprising Information Archiving

    Gartner, Inc. positions Proofpoint in the Leaders Quadrant in its 2016 Magic Quadrant for Enterprise Information Archiving.

    The Gartner Magic Quadrant provides a qualitative analysis of technology players within a specific market. Using a rigorous evaluation process, the companies are placed into one of four categories: leaders, challengers, niche players, and visionaries. Leaders have the highest combined measures of Ability to Execute and Completeness of Vision. They may have the most comprehensive and scalable products.

    Please enter your contact information to view the complete Gartner Magic Quadrant for Enterprise Information Archiving 2016 report.

    This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Proofpoint.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    Press Release
    Blog

    READ MORE >

Pages