Hi [[ session.user.profile.firstName ]]
Sort by:
    • Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Canada Interactive Tech Talk: Incident Response Proofpoint Upcoming: Sep 6 2016 5:00 pm UTC 60 mins
    • This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

      Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

      Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

      •Dashboard – see all your critical threats, open incidents and more all at a glance
      •Incident Scoring – scores are automatically adjusted as new details are discovered
      •Incident Workflow – assign incidents to analysts and collaborate in an incident
      •Incident Details – view all the collected data about an incident in one place
      •List Management – add and remove identities and hosts to/from quarantine and containment lists
      •Event Sources – view threat detection systems that will be generating alerts
      •Device Updates – view devices and update schedules for your existing infrastructure
      •Reporting – view real-time trends about malware, infected users, CNC IPs and much more

      Read more >
    • Proofpoint Archiving, Compliance and eDiscovery Live demo Proofpoint Archiving, Compliance and eDiscovery Live demo Proofpoint Recorded: May 18 2016 7:55 pm UTC 43 mins

      Financial services firms face the world’s most stringent and complex regulatory pressures. Proofpoint Intelligent Supervision introduces a new level of efficiency and control for even the largest financial services organizations. With a fully integrated archive and supervision solution, Proofpoint provides comprehensive capture, review and reporting for complete visibility into email, Bloomberg, IM, collaboration and social data, making regulatory audits and investigations simple and straightforward.

      Read more >
    • Proofpoint Privacy Live Demo Proofpoint Privacy Live Demo Proofpoint Recorded: May 19 2016 6:00 pm UTC 54 mins
    • Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

      Join us as we answer the following questions

      How can I track and understand where sensitive data resides?
      How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
      How can my organization maintain compliance when it comes to sensitive data?

      Read more >
    • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Upcoming: Aug 30 2016 5:00 pm UTC 60 mins
    • What every organization needs to know before, during, and after a ransomware attack.

      Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

      Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

      Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

      •Why ransomware is surging.
      •Where it comes from.
      •What to do before, during, and after an attack.
      •Should you pay or not? What to consider.

      Exploit kits don’t stop. Neither should your business.

      Read more >
    • Migrating from Intel Security McAfee Email Protection? Migrating from Intel Security McAfee Email Protection? Mark Guntrip, Group Product Marketing Manager, Proofpoint Recorded: Nov 19 2015 9:00 pm UTC 58 mins
    • Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.

      Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.

      Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.

      Read more >
    • Information Protection, DLP, Encryption Demo Information Protection, DLP, Encryption Demo Proofpoint Recorded: Jul 28 2016 6:00 pm UTC 54 mins
    • No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.

      Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.

      - Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
      - Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
      - Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments

      Read more >
    • Archiving, Compliance, & eDiscovery Demo Archiving, Compliance, & eDiscovery Demo Proofpoint Recorded: Aug 5 2016 5:00 pm UTC 53 mins
    • Get up to speed on the compliance risks enterprises will face in 2016 for archiving and eDiscovery with our live demonstration. See for yourself the technology that positioned Proofpoint as a leader in Gartner's 2015 Magic Quadrant for Enterprise Information Archiving.

      Take a deep dive into archiving for Proofpoint's solution for archive and compliance including:

      Powerful policy management capabilities to ensure that information is managed in accordance with internal and regulatory-driven requirements.
      Efficient eDiscovery response with a fully automated system for real-time search, legal hold management and legal team collaboration.
      Strategies that were effective in building internal support for control of archived content.

      Read more >
    • Protect Your Office 365 Email from Three Key Threats Protect Your Office 365 Email from Three Key Threats Catherine Hwang, Proofpoint Product Marketing Recorded: Jul 8 2016 4:00 pm UTC 63 mins
    • Find the Email Threats Lurking in Your Office 365 Environment

      As you look to migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop exploding threats such as business email compromise and ransomware.

      Join Catherine Hwang, Proofpoint Product Marketing, in a live Redmond webinar to hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored.

      See attacks for what they really are.
      Whether broad or targeted, Proofpoint safeguards your Office 365 users with superior efficacy against BEC, ransomware and other email attacks.

      Read more >
    • Email Security Peace of Mind with Threat Discover | Live Demo Email Security Peace of Mind with Threat Discover | Live Demo Proofpoint Recorded: Jun 22 2016 6:00 pm UTC 31 mins
    • Over 90% of targeted attacks happen through email. Discover what threats may already be lurking in your Microsoft Exchange or Office 365 environment through Proofpoint’s Threat Discover for Email tool. With a quick and simple setup, security professionals can identify malicious URL and attachment-based threats residing in their Microsoft Exchange environment. Find out how Proofpoint solutions can also help prevent and respond to attacks such as these uncovered by Threat Discover.

      Join Proofpoint’s Alok Ojha, Director of Product Management, as he provides an exclusive demo of Threat Discover for Email including:

      • Installation and setup of the Threat Discover VM
      • Performing scans for threats in your email environment
      • Finding email campaigns and top targeted departments
      • Exporting results for further analysis

      Read more >
    • How to Defend Against Email Fraud - in partnership with CSO How to Defend Against Email Fraud - in partnership with CSO Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint Recorded: Aug 25 2016 1:10 am UTC 55 mins
    • Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

      These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

      Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

      Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

      · How cybercriminals craft Email Fraud messages and where they get their information
      · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
      · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
      · What kind of business controls can be put in place to protect against Email Fraud manipulations

      Read more >
    • Mobile Security Protection | Proofpoint Live Demo Mobile Security Protection | Proofpoint Live Demo David Jevans Recorded: Apr 27 2016 6:00 pm UTC 59 mins
    • Gartner stated that they expect 75% of mobile security breaches to come through mobile apps instead of the OS, but few are talking about the risk, how it happens, and how to be protected from the mobile risk.

      Join us for a live demonstration of TAP Mobile Defense, the newest addition to the Proofpoint Advanced Threat Platform, as we discuss and demonstrate the technology including:

      •Why these dangerous mobile apps get through app stores
      •How to immediately see the risks facing your organization due to mobile apps
      •What countries are receive your sensitive data from your mobiles apps
      •How to take action against these mobile threats via few easy clicks and configurations

      Read more >
    • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint Recorded: May 31 2016 8:00 am UTC 40 mins
    • Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

      Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
      Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

      Erfahren Sie in dem Webcast
      • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
      • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
      • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen

      Read more >
    • The Impostor in the Machine The Impostor in the Machine Mark Guntrip, Proofpoint Product Marketing Manager Recorded: Apr 20 2016 5:00 pm UTC 52 mins
    • Organizations around the world of all sizes are becoming more aware of the threat that malware and attacks can pose to their business. However, one newer breed of attack, impostor email, otherwise known as business email compromise (BEC) or CEO fraud, has moved away entirely from using malicious URLs or attachments to try and infect victim’s machines. These highly targeted threats are using social engineering to trick employees to send money, or personal information out of the organization.

      Learn how this threat attempts to steal from your organizations and how Proofpoint protects organizations from the threat of impostor email.

      Read more >
    • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 6:00 pm UTC 62 mins
    • Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.

      While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.

      Key takeaways include:
      • Why the shift to Office 365 increases criticality of email security
      • Common pitfalls to avoid in the planning stages
      • Key security capabilities to protect from advanced threats

      Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

      Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.

      Read more >
    • People Make the Best Exploits: How Threats Prey on the Human Factor People Make the Best Exploits: How Threats Prey on the Human Factor Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Mar 16 2016 10:15 pm UTC 59 mins
    • Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

      That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

      Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

      This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

      In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

      Who is being targeted, and who is falling victim
      What attackers are sending, and which lures are working
      When threats arrive, and when people are most likely to click

      Read more >
    • Catching Credential Phish Catching Credential Phish Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Nov 18 2015 6:00 pm UTC 54 mins
    • Preventing credential theft in today’s threat landscape requires far more than strong authentication and malware detection. The majority of breaches now start with credential phish, and there is a reason why most advanced threats start with phishing – because it works!

      Catching credential phish is still not easy. Email remains the easiest way to reach almost all people, and tools like social media and mobile applications are broadening the attack surface – enabling phishing attacks to be even more complex and targeted. It is more vital than ever for organization to elevate their ability to stay ahead of cybercriminals.

      Proofpoint has unparalleled visibility into the advanced threats, including credential phish and polymorphic attacks, that are aimed at leading global organizations today. Only Proofpoint provides a product suite and advanced threat platform that is aimed at protecting the way people work today.

      Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn:
      • The anatomy of credential phish
      • The top phishing lures seen in today’s threat landscape
      • The modern techniques that Proofpoint uses to catch credential phish and empower organizations
      to protect people from handing over the keys to your corporate data

      An Information Week Dark Reading webinar with UBM sponsored by Proofpoint

      Read more >
    • Cybersecurity Predictions for 2016: Targeting the human factor Cybersecurity Predictions for 2016: Targeting the human factor Patrick Wheeler, Director, Threat Security at Proofpoint Recorded: Dec 16 2015 6:00 pm UTC 42 mins
    • The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.

      In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.

      Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.

      Learn how your organization must demand solutions that enable you to:
      • Take measures to secure data
      • Effectively track incidents and remediate incidents
      • Report out on compliance status

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Mike Smart, Proofpoint Recorded: Sep 29 2015 10:00 am UTC 59 mins
    • Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
      If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
      It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
      Cyber Kill Chain® is a registered trademark of Lockheed Martin

      Read more >