Resource Center

Browse our library of videos, data sheets, white papers, research, and more.

  • White Paper

    White Paper

    Credential Phishing: Hook, Line, and Sinker

    Your people are now the primary exploit target. You need to protect them the way they work and identify assets and risks before you are compromised.

    With an increasing amount of sensitive and confidential information—and an expanding attack surface of devices, cloud apps, and mobile locations—you cannot afford to rely on traditional defenses.

    This white paper is intended to help you understand how Proofpoint Targeted Attack Protection helps you detect, mitigate, and respond to credential phishing attacks before they succeed.

    Some of the topics covered include:
    • How Phishing Works: Trends and Tactics
    • Who Attackers Target: Moving Targets
    • Why Phishing Attacks Succeed: Exploiting Human Nature
    • How to Stop Phishing Attacks: Recommendations

    Please enter your contact information to view the complete report.

    DOWNLOAD NOW >
  • Video

    Video

    Why Proofpoint

    Learn how Proofpoint protects organizations from advanced attacks that target email, mobile apps, and social media, often stopping attacks before they reach their target on any network or device.

    WATCH NOW >
  • Video

    Video

    Threat Response Overview

    Learn how Proofpoint's Threat Response enables organizations to verify, prioritize, and contain advanced threats and targeted attacks.

    WATCH NOW >
  • Video

    Video

    Social Media Security

    Learn how companies need to protect their growing social media programs, brand image and avoid costly compliance violations and audits.

    WATCH NOW >
  • Video

    Video

    Proofpoint Advanced Threat Protection

    Learn how Proofpoint’s next-generation cyber security solutions can help protect the information your people create against phishing, malware, and emerging threats before they happen. 

    WATCH NOW >
  • Video

    Video

    Proofpoint By The Numbers

    The numbers speak for themselves. Learn how Proofpoint detects, catches, and blocks today's advanced threats and email-borne attacks.

    WATCH NOW >
  • Video

    Video

    Are You Prepared for a Data Breach?

    Learn more about the financial costs of a data breach and how Proofpoint can protect you and your organization from being hacked.

    WATCH NOW >
  • Video

    Video

    Archive and Governance Solution

    Learn more about Proofpoint's archive and governance solutions that address email storage management, eDiscovery, and regulatory compliance challenges.

    WATCH NOW >
  • Infographic

    Infographic

    Is Microsoft Office 365 Secure?

    The world is moving to Office 365. Don’t leave security, compliance and control up in the air. Download our infographic to get a quick glimpse into the data from our Office 365 research and learn about the top security, encryption, and archiving challenges when moving to the cloud.

    VIEW HERE >
  • Threat Report

    Threat Report

    Proofpoint Threat Report - December 2015

    The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

    VIEW HERE >
  • Analyst Report

    Analyst Report

    SANS Institute’s Spearphishing Survival Guide

    Spear phishing is a targeted email scam with the sole purpose of obtaining unauthorized access to sensitive data. Cybercriminals are using social media, mobile apps and other sources to effectively personalize messages and websites going undetected to steal your confidential data. 

    In the SANS Spear phishing Survival Guide, the SANS Institute explores advanced email attack progression and the protection and prevention techniques your organization needs to meet the challenge of fighting today’s advanced spearphishing threats.

    Please enter your contact information to view the complete report.

     

    50-50-data-teams_1.jpg

    READ MORE >
  • Analyst Report

    Analyst Report

    The True ROI of Information Governance

    According to various industry articles and vendor marketing materials, most organizations are struggling with the problem of too much electronic data—how much of it there is, what it contains, who has access to it, where it is currently stored, and how long it should be kept.  In other words, how to govern it more effectively when you face an increased rate of data accumulation, increased total volume of data, and a lack of effective managment of data.

    These problems drive up costs and risk.

    In this white paper by Osterman Research you will learn:

    • The origins of the "information problem"

    • Information governance challenges

    • Information governance metrics

    • Calculating costs

    To download this white paper, please complete the form.

    READ MORE >

Pages