Resource Center

Browse our library of videos, data sheets, white papers, research, and more.

  • Data Sheet

    Data Sheet

    Emerging Threats Intelligence

    Proofpoint ET Intelligence™ is the industry’s most timely and accurate source of threat intelligence.

    DOWNLOAD NOW >
  • Data Sheet

    Data Sheet

    Mobile Defense

    Enterprises face growing threats from malicious Wi-Fi hotspots and millions of apps on employee-owned devices. These apps can include malware and “riskware” – apps that might not be overtly malicious but exhibit behavior that puts enterprise data at risk.

    DOWNLOAD NOW >
  • Video

    Video

    TAP Mobile Defense Overview

    Learn how TAP Mobile Defense provides visibility and automated workflow for managing risk in your environment.

    WATCH NOW >
  • Analyst Report

    Analyst Report

    A CISO guide to Phishing and Malware

    Malware has come a long way and has since developed from a hacker “proof of concept” to an annoyance to a major source of fraud, intellectual property theft, and espionage. 

    Download the our guide today to learn how you can protect your company from Malware and Phishing attacks.

    READ MORE >
  • Video

    Video

    Automate Your Social Media Compliance Auditing

    Get a detailed look at how Proofpoint Social Discover can help you detect, audit, and archive social media content.

     

    WATCH NOW >
  • Analyst Report

    Analyst Report

    Gartner Report: Critical Capabilities for Enterprise Information Archiving

    IT architects are deploying enterprise information archiving (EIA) products to support four use cases including compliance, improve operational efficiency, enable e-discovery and/or allow end users to archive and retrieve their own content.

    To support each of these use cases, IT leaders must understand the “critical capabilities” of available EIA products. This new research paper from Gartner provides information on these capabilities.

    See why we scored highest in these capabilities. 

    *Gartner Critical Capabilities for Enterprise Information Archiving, Alan Dayley, Julian Tirsu, 13 February 2017.

    This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Proofpoint.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    READ MORE >
  • Video

    Video

    Solving Archiving Challenges

    Solve your biggest archiving challenges. Track, classify, and control your data for streamlined discovery, simplified regulatory compliance, and fast access. Watch this video to learn about Proofpoint Archiving Solutions.

    WATCH NOW >
  • Video

    Video

    Predictive Analytics Overview

    Get a detailed look at how Proofpoint Predictive Defense sandboxes malicious URLs before users can click. 

    WATCH NOW >
  • Video

    Video

    Targeted Attack Protection Dashboard

    Watch a comprehensive view of the Targeted Attack Protection dashboard in action. 

    WATCH NOW >
  • Video

    Video

    Proofpoint Locky Demo

    Learn how "Locky", a new ransomware delivered by the same actor behind many of the Dridex campaigns, is distributed via MS Word documents with malicious macros. 

    WATCH NOW >
  • Video

    Video

    How Phishing Works

    Learn how attackers utilize a compromised website to infiltrate your computer, steal your personal information and attack other computers.

    WATCH NOW >
  • Video

    Video

    Aspen Insurance Customer Testimonial

    Cyber security investments can create a platform to engage and influence businesses as they become more aware of cyber threats.

    WATCH NOW >

Pages