Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Leverage Remote Browser Isolation (RBI) to Enhance Your Company’s DLP Strategy Sunil Ravi, Chief Security Architect at Versa Networks As enterprises adjust to a hybrid workforce, their remote users are exposed to threats on the open internet that put their corporate data at risk in w... 9 months ago | 61 mins Der Faktor Mensch 2022 Henning Hanke & Jan Mahler, Proofpoint Germany Der Faktor Mensch 2022: Personenzentrierte Cybersicherheit vor dem Hintergrund zunehmender Anwenderrisiken Bedenken Sie: Wenn es sich bei 10 % Ihrer ... 11 months ago | 46 mins El factor humano 2022 Fernando Anaya, Country Manager & Manuela Muñoz, Named Account Manager, Proofpoint - Spain El factor humano 2022: Ciberseguridad centrada en las personas para una era de riesgos asociados a los usuarios Tenga en cuenta el siguiente dato: S... 11 months ago | 43 mins Le facteur humain 2022 Loic Guezo, Senior Director, Cybersecurity Strategy & Davide Canali, Senior Threat Manager, Proofpoint EMEA Le facteur humain 2022 : Cybersécurité centrée sur les personnes en ces temps où le comportement des utilisateurs pose un risque plus important que ja... 11 months ago | 45 mins Il fattore umano 2022 Antonio Ierano & Pailo Tosi, Proofpoint Italy Il fattore umano 2022: Sicurezza informatica incentrata sulle persone in un’era in cui il comportamento degli utenti rappresenta un rischio più grande... 11 months ago | 62 mins Uncover and Deter Sophisticated Attacks with Security Observability Keshav Kamble, Co-Founder & CTO, Joseph Feiman - Chief Strategy Officer Discover applications, microservices and API across your application ecosystem. Detect and monitor runtime processes, database calls and API calls. Id... 8 months ago | 47 mins Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 10 months ago | 49 mins Live Demo - Email Fraud Defense ( APAC / APJ ) Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email Fr... 3 years ago | 39 mins Product Demo: Mobile Phishing Protection Matthew Sywulak Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoin... 2 years ago | 30 mins Live Demo: Email Fraud Defense Ash Valeski, Director Product Management, Proofpoint Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. Proofpoint Email ... 4 years ago | 31 mins Load more