Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Pourquoi sécuriser sa messagerie sous Office 365 ?
    Pourquoi sécuriser sa messagerie sous Office 365 ? Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint Recorded: Jun 21 2018 38 mins
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Malware of the Week | It's a Blast from the Past
    Malware of the Week | It's a Blast from the Past Proofpoint Recorded: Jun 20 2018 7 mins
    Every week Proofpoint's researchers report on the active threats making their way around the Internet and the threats commonly missed by security vendors.

    This week on Malware of the Week:

    Get your flannel ready because the Threat of The Week was a 90's blast from the past with Shankar's Virus. A polymorphic virus discovered in 1999 that can cause Microsoft Word to no longer function and change computer time.

    The Miss of The Week was a cryptocurrency miner called CoinHive. Emails lead victims to websites with JavaScript code on them that use the unsuspecting victim's own computer to mine Monero cryptocurrency.
  • Live Demo: Email Fraud Defense by Proofpoint
    Live Demo: Email Fraud Defense by Proofpoint Neil Hammet, Email Fraud Specialist Recorded: Jun 19 2018 47 mins
    Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.


    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Malware of the Week - Proofpoint Caught a RAT
    Malware of the Week - Proofpoint Caught a RAT Proofpoint Recorded: Jun 15 2018 12 mins
    Every week Proofpoint's researchers report on the active threats making their way around the Internet. Join us each week for a brief roundup of

    - What threat is making waves this week and another that is commonly missed by security vendors


    THS WEEK on Malware of the Week:

    We saw a highly targeted RAT/Stealer that is making it’s way around the Internet. RAT (remote access trojan) is the terminology for a banking trojan that can take control of your users' systems
  • Tools for Email Fraud Defense | Live demo
    Tools for Email Fraud Defense | Live demo Alex Fryback, Product Manager at Proofpoint Recorded: Jun 13 2018 25 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution.

    Learn how EFD can help you:

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • 360 Degrees of Email Fraud Defense | Why Email Fraud Still Works
    360 Degrees of Email Fraud Defense | Why Email Fraud Still Works Ryan Terry - Sr Security Strategist, Email Fraud Defense Recorded: Jun 6 2018 43 mins
    You likely know that email fraud is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success? Proofpoint researchers have uncovered the latest email fraud trends, tactics, and techniques that are impacting organizations around the world.

    Join us and learn:

    • Why organizations haven’t solved one of the oldest email scams
    • The strategies needed to stop these attacks before they reach your employees, customers, and business partners
    • What a best practice email fraud solution should include
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
    Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint Recorded: Jun 5 2018 54 mins
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst Recorded: May 24 2018 44 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • The Challenges of Archiving - Archive Solution Live Demo
    The Challenges of Archiving - Archive Solution Live Demo Kieran Stewart, Archive Specialist & Jason Colvin, Senior Engineer Recorded: May 17 2018 55 mins
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable.

    They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Threat Actors Follow The Money | 2018 Human Factor Report
    Threat Actors Follow The Money | 2018 Human Factor Report Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: May 9 2018 59 mins
    The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    Join Proofpoint Director of Threat Intelligence as we discuss:

    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services

Embed in website or blog