Hi [[ session.user.profile.firstName ]]
Sort by:
    • Migrating from Intel Security McAfee Email Protection? Migrating from Intel Security McAfee Email Protection? Mark Guntrip, Group Product Marketing Manager, Proofpoint Recorded: Nov 19 2015 9:00 pm UTC 58 mins
    • Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.

      Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.

      Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.

      Read more >
    • Catching Credential Phish Catching Credential Phish Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Nov 18 2015 6:00 pm UTC 54 mins
    • Preventing credential theft in today’s threat landscape requires far more than strong authentication and malware detection. The majority of breaches now start with credential phish, and there is a reason why most advanced threats start with phishing – because it works!

      Catching credential phish is still not easy. Email remains the easiest way to reach almost all people, and tools like social media and mobile applications are broadening the attack surface – enabling phishing attacks to be even more complex and targeted. It is more vital than ever for organization to elevate their ability to stay ahead of cybercriminals.

      Proofpoint has unparalleled visibility into the advanced threats, including credential phish and polymorphic attacks, that are aimed at leading global organizations today. Only Proofpoint provides a product suite and advanced threat platform that is aimed at protecting the way people work today.

      Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn:
      • The anatomy of credential phish
      • The top phishing lures seen in today’s threat landscape
      • The modern techniques that Proofpoint uses to catch credential phish and empower organizations
      to protect people from handing over the keys to your corporate data

      An Information Week Dark Reading webinar with UBM sponsored by Proofpoint

      Read more >
    • Cybersecurity Predictions for 2016: Targeting the human factor Cybersecurity Predictions for 2016: Targeting the human factor Patrick Wheeler, Director, Threat Security at Proofpoint Recorded: Dec 16 2015 6:00 pm UTC 42 mins
    • The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.

      In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.

      Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.

      Learn how your organization must demand solutions that enable you to:
      • Take measures to secure data
      • Effectively track incidents and remediate incidents
      • Report out on compliance status

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      intelligence
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Mike Smart, Proofpoint Recorded: Sep 29 2015 10:00 am UTC 59 mins
    • Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
      If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
      It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
      Cyber Kill Chain® is a registered trademark of Lockheed Martin

      Read more >
    • “Minority Report” Security: Predicting & Stopping Targeted Threats with Big Data “Minority Report” Security: Predicting & Stopping Targeted Threats with Big Data Amar Doshi, Director Product Marketing & Strategy, Proofpoint Recorded: Sep 12 2013 5:00 pm UTC 55 mins
    • Targeted malware campaigns have evolved significantly from traditional simple inclusion of malware as non-disguised executable files to more social engineered “phishing” style attacks. More than 30% of unwanted email at peak times coming into an organization are seen to have malicious intent – malicious URLs, attachments and credential-seeking attacks. Repeated Longlining campaigns have flooded organizations with phishing threats by working around existing security controls. A new Big Data approach becomes critical in stopping the impact of these on incident management, brand impact, and data loss.

      Join Amar Doshi for a discussion on “Minority Report” Security: Predicting & Stopping Targeted Threats, which will cover:

      · Typical attacker tactics that are involved in creating targeted and Longlining attacks

      · Findings from recent research conducted by Proofpoint security analysts

      · A Big Data approach to predict-and-protect organizations before user’s click-and-compromise

      Read more >
    • Cloud and the Marketing Minefield: Is the Channel Rising to the Challenge? Cloud and the Marketing Minefield: Is the Channel Rising to the Challenge? Ian Moyse, Sales Director, Workbooks.com; Danielle Campbell, Marketing Manager, Proofpoint; Ying Zhang, Marketing, BrightTALK Recorded: May 2 2013 9:00 am UTC 45 mins
    • Cloud adoption is huge for the channel right now. Fact. From 2008 to 2013 there has been an impressive 25% growth in cloud sales and it shows no signs of slowing anytime soon. The question is, what effect is this growth having on channel marketing approaches and have you adopted your strategy not only to make the most from this opportunity but also to overcome any issues it poses?
      Cloud as a term has been incredibly hyped and over-marketed in the past 24 months and as such it is becoming increasingly difficult to differentiate ourselves using such a generic term. However, the name ‘cloud’ does undeniably carry some weight and credibility, with the word’s ability to quickly identify what can be seen as a trend-setting use of technology.

      So, if you are marketing cloud solutions in today’s industry what do you need to know? What approaches should you consider? Would you stick to the same old marketing techniques and approaches that had worked or do they need a modern twist? Are customer-buying profiles the same? And if not, how do you market successfully to these changes?

      This impactful session will deliver insight into the realities of end user and channel buying approaches, their feelings towards cloud and what marketing approaches will best gain their attention.

      Read more >