Hi [[ session.user.profile.firstName ]]
Sort by:
    • „E-Mail Archivierung mit Proofpoint Enterprise Archive“
      „E-Mail Archivierung mit Proofpoint Enterprise Archive“ Horst Speichert, Rechtsanwalt und Thorsten Mahn, Pre-Sales Specialist bei Proofpoint Upcoming: Mar 9 2017 1:00 pm UTC 60 mins
    • Der Druck für Unternehmen, Compliance-Vorgaben einzuhalten und gesetzlichen Regularien Folge zu leisten, wird auch im Jahr 2017 weiter steigen.
      Erfahren Sie von Rechtsanwalt Horst Speichert unter anderem, welche geänderten Anforderungen durch die neuen Archivierungsgrundsätze der GoBD entstanden sind. Wir informieren Sie außerdem, wie Proofpoint Sie mit Hilfe der revisionssicheren E-Mail-Archivierungslösung bei der Einhaltung der gesetzlichen Regularien unterstützen kann.

      Webcast Themen:
      • Gesetzliche Rahmenbedingungen und geändert Anforderungen der neuen Archivierungsgrundsätze der GoBD, Rechtsanwalt Horst Speichert
      • Einhaltung der Compliance und gesetzlicher Vorschriften dank granularer, anpassbarer Richtliniendefinitionen sowie vollautomatisierter Prozesse
      • Schnelle und zuverlässige Informationssuche über verschiedene Zeiträume und Speicherorte hinweg
      • Verschlüsselung sämtlicher Daten mit einem NUR Ihnen bekannten Schlüssel
      • Geringe Betriebskosten und schnelle Implementierung

      Wir freuen uns darauf, Sie im Webcast begrüßen zu dürfen.

      Ihr Proofpoint-Team

      Read more >
    • How to Leverage Proofpoint and Splunk
      How to Leverage Proofpoint and Splunk Alok Ojha and Jeff Burstein from Proofpoint and Vijay Chauhan from Splunk Recorded: Jan 31 2017 6:00 pm UTC 34 mins
    • By integrating Proofpoint Emerging Threat® (ET) intelligence, to include email and social media together with Splunk’s analytics-driven platform, visibility is now expanded across your entire organization, enabling your teams to delve into granular new use cases.

      Register now to attend this live webinar on January 31st at 10:00 a.m. PT to get a closer look at the benefits of the integration. You’ll learn how joint customers of Proofpoint and Splunk will be able to:

      * Ingest logs from Proofpoint Email Protection and Social Media Protection for increased visibility into email and social threats

      * Leverage Proofpoint Emerging Threats (ET) Technical Add-On (TA) to enhance Splunk correlation rules and search, using the Adaptive Response framework

      * Simplify incident investigation, discovery and hunting

      * Create consolidated reports for both security and compliance

      We’ll also take you “behind the scenes” to demonstrate how the technology works and why our partnership is truly Better Together!

      Read more >
    • BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together
      BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together Proofpoint Recorded: Oct 4 2016 5:00 pm UTC 43 mins
    • Join us for second monthly Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers.

      This session will focus on how Proofpoint and Palo Alto Networks combine to combat the ever-changing threat landscape.

      The threat landscape is constantly morphing and changing. New threats and techniques are being used by hackers to continually target the enterprise through multiple attack vectors. In this technical session, we will discuss the themes and changes in the threat landscape, sample attacks we’ve seen in the wild, and methods to secure your company in this environment. Proofpoint and Palo Alto Networks have integrated their top-tier security solutions to stop these evolutionary threats.

      We will have live discussions where we will share attack tactics, forensic information, integration details and platform strategies you can use to keep your networks safe.

      Topics covered will include:
      • Overview of today’s threat landscape
      • Thwarting innovative attacks with combined threat intelligence
      • Integration flow and details
      • Automated protection and threat prevention across your infrastructure

      Read more >
    • Kudelski Security Introduces Proofpoint Solutions to Defend their Customers
      Kudelski Security Introduces Proofpoint Solutions to Defend their Customers Kudelski Security and Proofpoint Recorded: Dec 1 2016 5:30 pm UTC 36 mins
    • Email, the most utilized business application in the world, is also the number one source for cybersecurity attacks today. In fact, according to Wired Magazine, an estimated 91% of hacking attacks begin with a phishing email.

      While establishing a strong perimeter to protect your organization is a step in the right direction, the attackers are ultimately targeting people and the data they create. Join Kudelski Security as they welcome their newest partner, Proofpoint Inc, who will discuss the right approach to combating cybersecurity attacks by focusing on the human factor.

      Join Covered in the one hour session will be:

      - Overview of the Proofpoint solution
      - Proofpoint’s integration with Palo Alto Networks
      - Opportunity to assess your current email security environment for strength and accuracy in blocking advanced attacks

      At the conclusion on the webinar, there will also be the opportunity to win an Apple iPod Mini2 with WiFi (32 GB). Make sure to register today!

      Read more >
    • Proofpoint-Webcast „Mobile Defense“
      Proofpoint-Webcast „Mobile Defense“ Marc Lindenblatt, Presales Engineer, Proofpoint Recorded: Dec 8 2016 9:00 am UTC 38 mins
    • Unternehmen weltweit stehen vor der wachsender Bedrohung durch bösartige Wi-Fi Hotspots und Millionen von Apps auf Mitarbeiter-Geräten. Diese Apps können Malware enthalten oder es kann sich um "riskware“-Apps handeln. Diese sind nicht offensichtlich bösartig, sondern zeigen ein „Verhalten“, das Unternehmen gefährdet und zu Datenverlust, Diebstahl von Zugangsdaten und das Abschöpfen privaten Informationen führen kann.

      Proofpoint Targeted Attack Protection for Mobile (TAP) erkennt und blockiert schadhafte Apps und solche, die unter anderem zu Phishing-Attacken führen und sensible Daten offenlegen können. Entdecken Sie außerdem Geräte-Exploits und gefährliche WLAN-Zugriffspunkte. Mobile Defense wird mit Ihren MDM- und EMM-Tools integriert, um Ihre mobilen Benutzer zu schützen.

      Handeln Sie jetzt!

      • Erkennen und kontrollieren Sie riskante Apps
      Sie erhalten vollständige Übersicht über das Verhalten der Apps in Ihrer Umgebung sowie vollständige Kontrolle darüber, wenn sie sich daneben benehmen.

      Darüberhinaus kann Mobile Defense über invidividuelle Apps hinausblicken und eine vollständige Ansicht der weiteren mobilen Gefahrenlandschaft bieten.

      • Erkennen und schützen Sie sich vor WiFi-Angriffen
      Mit unserer optionalen Client-App für iOS und Android erkennen Sie Wi¬Fi-Angriffe und schützen Benutzer davor.

      • Erkennen Sie Geräteanomalien und Bedrohungen
      Unsere Client-App für iOS und Android erkennt Geräteanomalien, wie z. B. abnormale CPU-Nutzung, unbekannte Konfigurationsprofile und Manipulation der Dateisysteme, die Zero¬day-Bedrohungen darstellen.

      Mehr dazu in unserem Webcast:
      „Mobile Defense“ | 8.12.16 um 10 Uhr | Sprecher: Marc Lindenblatt

      Registrieren Sie sich am besten noch heute!

      Mit besten Grüßen,
      Ihr Security-Team von Proofpoint

      Read more >
    • Proofpoint Canada Interactive Tech Talk: Incident Response
      Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Recorded: Sep 6 2016 5:00 pm UTC 56 mins
    • This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

      Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

      Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

      •Dashboard – see all your critical threats, open incidents and more all at a glance
      •Incident Scoring – scores are automatically adjusted as new details are discovered
      •Incident Workflow – assign incidents to analysts and collaborate in an incident
      •Incident Details – view all the collected data about an incident in one place
      •List Management – add and remove identities and hosts to/from quarantine and containment lists
      •Event Sources – view threat detection systems that will be generating alerts
      •Device Updates – view devices and update schedules for your existing infrastructure
      •Reporting – view real-time trends about malware, infected users, CNC IPs and much more

      Read more >
    • Proofpoint Archiving, Compliance and eDiscovery Live demo
      Proofpoint Archiving, Compliance and eDiscovery Live demo Proofpoint Recorded: May 18 2016 7:55 pm UTC 43 mins
    • ROOFPOINT OFFERS LEADING ARCHIVE, COMPLIANCE, AND EDISCOVERY CAPABILITIES.

      Financial services firms face the world’s most stringent and complex regulatory pressures. Proofpoint Intelligent Supervision introduces a new level of efficiency and control for even the largest financial services organizations. With a fully integrated archive and supervision solution, Proofpoint provides comprehensive capture, review and reporting for complete visibility into email, Bloomberg, IM, collaboration and social data, making regulatory audits and investigations simple and straightforward.

      Read more >
    • Proofpoint Privacy Live Demo
      Proofpoint Privacy Live Demo Proofpoint Recorded: May 19 2016 6:00 pm UTC 54 mins
    • Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

      Join us as we answer the following questions

      How can I track and understand where sensitive data resides?
      How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
      How can my organization maintain compliance when it comes to sensitive data?

      Read more >
    • Ransomware Survival Guide
      Ransomware Survival Guide Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Aug 30 2016 5:00 pm UTC 61 mins
    • What every organization needs to know before, during, and after a ransomware attack.

      Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

      Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

      Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

      •Why ransomware is surging.
      •Where it comes from.
      •What to do before, during, and after an attack.
      •Should you pay or not? What to consider.

      Exploit kits don’t stop. Neither should your business.

      Read more >
    • Migrating from Intel Security McAfee Email Protection?
      Migrating from Intel Security McAfee Email Protection? Mark Guntrip, Group Product Marketing Manager, Proofpoint Recorded: Nov 19 2015 9:00 pm UTC 58 mins
    • Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.

      Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.

      Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.

      Read more >
    • Eradicating Malware Emails After Delivery
      Eradicating Malware Emails After Delivery Duane Kuroda, Group Product Marketing Manager at Proofpoint Recorded: Dec 13 2016 7:00 pm UTC 57 mins
    • Cyber criminals continue to innovate and find ways to bypass security. By apply social engineering, rapid software updates and VM evasion techniques, or even poisoning links after emails are sent, criminals find ways to get malicious email delivered and even clicked on.

      Join us for this live webinar, we’ll look at the techniques attackers use to get through security defenses and a new countermeasure for clawing back delivered and internally forwarded malicious emails.

      You will also learn:
      • How bad actors bypass security to get malicious email into the inbox
      • Which business pressures increase the ability of attackers bypassing security measures
      • How other enterprises are taking-on and drastically reducing the impact of malicious email that bypassed security

      Read more >
    • Live Demo: Protecting Your Healthcare Data from Attack
      Live Demo: Protecting Your Healthcare Data from Attack Proofpoint Recorded: Feb 9 2017 7:00 pm UTC 45 mins
    • You know the situation: healthcare is becoming one of the primary targets for cyber attacks. What will it take to protect your organization? Find out by attending a live demo of Proofpoint Information Protection Suite.

      Learn about our products:

      •Email Data Loss Prevention to help you quickly discover exposed sensitive and confidential data and quickly resolve any issues
      •Email Encryption to ensure your clinicians and patients’ messages and attachments are communicated securely
      •Data Discover that provides the visibility to accurately discover, monitor and protect sensitive data on file shares, data stores and SharePoint sites

      The demo will include a live Q&A.

      Read more >
    • Exploit Kits Don't Stop, Neither Should Your Business.
      Exploit Kits Don't Stop, Neither Should Your Business. Proofpoint Recorded: Dec 8 2016 12:30 am UTC 41 mins
    • Exploit kits don’t stop. Neither should your business with CERT Australia.

      Ransomware has one goal: to get your money. It locks away files until payment is made.
      Webinar invitation: December 8th at 11:30am AEST

      Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

      •Ransomware evolution
      •Why ransomware is surging
      •Where it comes from
      •How are actors bypassing common security controls
      •Should you pay or not? What to consider
      •CERT recommended migrations

      Read more >
    • Live Demo | Protecting your Information, DLP, Privacy
      Live Demo | Protecting your Information, DLP, Privacy Proofpoint Recorded: Oct 19 2016 6:00 pm UTC 49 mins
    • Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

      Join us as we answer the following questions

      How can I track and understand where sensitive data resides?
      How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
      How can my organization maintain compliance when it comes to sensitive data?

      Read more >