Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager Recorded: May 26 2017 26 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Ransomware – The Billion Dollar Thief
    Ransomware – The Billion Dollar Thief Ryan Kalember, SVP Cybersecurity Strategies Recorded: May 18 2017 64 mins
    With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.

    Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.

    - The latest attacks, including WannaCry and its variants
    - The challenges in combating Ransomware
    - Tips and suggestions to mitigate WannaCry and other Ransomware attacks
  • Advanced Email Security - Email Protection Live Demo
    Advanced Email Security - Email Protection Live Demo Proofpoint Recorded: May 4 2017 40 mins
    Advanced Email Strategy Series - Email Protection

    Cyber attacks are increasing and diversifying—with new variations appearing all the time, many targeting new vectors. Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. This is the first in a series of three demos about our Email Protection Suite. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Protecting Your Users on Office 365
    Protecting Your Users on Office 365 Duane Kuroda, Group Product Marketing Manager Recorded: May 3 2017 63 mins
    Organizations around the world are moving to Office 365 to reap the benefits of this amazing collaboration platform. But bad actors continue to target end users with advanced threats that can slip through gaps in your security infrastructure. If you’re already a Proofpoint customer, you know the powerful protection our solutions offer. Learn how to leverage that protection to ensure security for your employees on Office 365.

    Whether you’re considering a migration or already using Office 365, join us for this webinar to learn about:

    · Key threat types targeting end users
    · Best practices for blocking and responding to advanced threats
    · How Proofpoint can protect your organization before, during, and after your move to Office 365
  • Threat Protection for Office 365 - Live Demonstration
    Threat Protection for Office 365 - Live Demonstration Proofpoint Recorded: Apr 27 2017 55 mins
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
  • How to Build An Advanced Email Security Strategy
    How to Build An Advanced Email Security Strategy Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint Recorded: Apr 27 2017 46 mins
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • How to Build an Advanced Email Security Strategy
    How to Build an Advanced Email Security Strategy Mark Guntrip, Product Marketing Director, Proofpoint Recorded: Apr 4 2017 57 mins
    Build an advanced email security strategy that empowers you to see, block, and respond to all email threats.

    Register now and learn:
    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
    • Key steps to building an email security strategy that adapts to threats as they evolve
    • How to respond to security risks faster at a reduced cost
  • Proofpoint Enterprise Archive  Live Demo
    Proofpoint Enterprise Archive Live Demo Proofpoint Archive Recorded: Mar 9 2017 47 mins
    Proofpoint Offers Leading Archive, Compliance, and e-discovery Capabilities

    Get up to speed on the archiving and eDiscovery compliance challenges that enterprises face — and the Proofpoint solution that meets them.

    Watch security experts take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving. The solution features:

    - Powerful policy management capabilities that ensure information meets internal and regulatory-driven requirements
    - Fully automated eDiscovery response for real-time search, legal hold management, and legal team collaboration
    - Effective strategies for building internal support to control archived content
  • How to Fight the Next Generation of Targeted BEC Attacks
    How to Fight the Next Generation of Targeted BEC Attacks Ryan Terry, Product Marketing Manager at Proofpoint Recorded: Mar 8 2017 57 mins
    Highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today.  This is not news.
     
    But things are changing.  New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
     
    Join us for a live webinar on Wednesday, March 8th at 10am PST where you will learn:
    -  Why email spoofing works
    -  Current BEC trends and attack methods
    -  How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox

Embed in website or blog