Hi [[ session.user.profile.firstName ]]
Sort by:
    • Migrating from Intel Security McAfee Email Protection? Migrating from Intel Security McAfee Email Protection? Mark Guntrip, Group Product Marketing Manager, Proofpoint Recorded: Nov 19 2015 9:00 pm UTC 58 mins
    • Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.

      Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.

      Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.

      Read more >
    • Mobile Security Protection | Proofpoint Live Demo Mobile Security Protection | Proofpoint Live Demo David Jevans Recorded: Apr 27 2016 6:00 pm UTC 59 mins
    • Gartner stated that they expect 75% of mobile security breaches to come through mobile apps instead of the OS, but few are talking about the risk, how it happens, and how to be protected from the mobile risk.

      Join us for a live demonstration of TAP Mobile Defense, the newest addition to the Proofpoint Advanced Threat Platform, as we discuss and demonstrate the technology including:

      •Why these dangerous mobile apps get through app stores
      •How to immediately see the risks facing your organization due to mobile apps
      •What countries are receive your sensitive data from your mobiles apps
      •How to take action against these mobile threats via few easy clicks and configurations

      Read more >
    • The Impostor in the Machine The Impostor in the Machine Mark Guntrip, Proofpoint Product Marketing Manager Recorded: Apr 20 2016 5:00 pm UTC 52 mins
    • Organizations around the world of all sizes are becoming more aware of the threat that malware and attacks can pose to their business. However, one newer breed of attack, impostor email, otherwise known as business email compromise (BEC) or CEO fraud, has moved away entirely from using malicious URLs or attachments to try and infect victim’s machines. These highly targeted threats are using social engineering to trick employees to send money, or personal information out of the organization.

      Learn how this threat attempts to steal from your organizations and how Proofpoint protects organizations from the threat of impostor email.

      Read more >
    • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecuritywith Guest Speaker Kelley Mak, Forrester Analyst Upcoming: May 3 2016 6:00 pm UTC 60 mins
    • Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


      While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


      Key takeaways include:
      • Why the shift to Office 365 increases criticality of email security
      • Common pitfalls to avoid in the planning stages
      • Key security capabilities to protect from advanced threats

      Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

      Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.

      Read more >
    • People Make the Best Exploits: How Threats Prey on the Human Factor People Make the Best Exploits: How Threats Prey on the Human Factor Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Mar 16 2016 10:15 pm UTC 59 mins
    • Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

      That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

      Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

      This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

      In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

      Who is being targeted, and who is falling victim
      What attackers are sending, and which lures are working
      When threats arrive, and when people are most likely to click

      Read more >
    • Motivation und folgen betrügerischer e-mails und was sie dagegen tun können Motivation und folgen betrügerischer e-mails und was sie dagegen tun können Marc Lindenblatt, Presales Engineer Proofpoint Upcoming: May 31 2016 8:00 am UTC 60 mins
    • Erfahren Sie in unserem Live-Webcast am 31. Mai, wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.

      Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

      Erfahren Sie in dem Webcast
      • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
      • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
      • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen

      Read more >
    • Catching Credential Phish Catching Credential Phish Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Nov 18 2015 6:00 pm UTC 54 mins
    • Preventing credential theft in today’s threat landscape requires far more than strong authentication and malware detection. The majority of breaches now start with credential phish, and there is a reason why most advanced threats start with phishing – because it works!

      Catching credential phish is still not easy. Email remains the easiest way to reach almost all people, and tools like social media and mobile applications are broadening the attack surface – enabling phishing attacks to be even more complex and targeted. It is more vital than ever for organization to elevate their ability to stay ahead of cybercriminals.

      Proofpoint has unparalleled visibility into the advanced threats, including credential phish and polymorphic attacks, that are aimed at leading global organizations today. Only Proofpoint provides a product suite and advanced threat platform that is aimed at protecting the way people work today.

      Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn:
      • The anatomy of credential phish
      • The top phishing lures seen in today’s threat landscape
      • The modern techniques that Proofpoint uses to catch credential phish and empower organizations
      to protect people from handing over the keys to your corporate data

      An Information Week Dark Reading webinar with UBM sponsored by Proofpoint

      Read more >
    • Cybersecurity Predictions for 2016: Targeting the human factor Cybersecurity Predictions for 2016: Targeting the human factor Patrick Wheeler, Director, Threat Security at Proofpoint Recorded: Dec 16 2015 6:00 pm UTC 42 mins
    • The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.

      In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.

      Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.

      Learn how your organization must demand solutions that enable you to:
      • Take measures to secure data
      • Effectively track incidents and remediate incidents
      • Report out on compliance status

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      intelligence
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage Mike Smart, Proofpoint Recorded: Sep 29 2015 10:00 am UTC 59 mins
    • Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
      If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
      It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
      Cyber Kill Chain® is a registered trademark of Lockheed Martin

      Read more >
    • Umfassender Schutz vor aktuellen Angriffen via Locky, Dridex und Co. Umfassender Schutz vor aktuellen Angriffen via Locky, Dridex und Co. Hans Irlacher, Manager Presales, Proofpoint und Dr. Markus a Campo, Senior Advisor Informationssicherheit, Experton Group Recorded: Apr 12 2016 8:00 am UTC 61 mins
    • Sind Unternehmen Cyberkriminellen ausgeliefert oder gibt es noch funktionierenden Schutz?

      Erfahren Sie in unserem Live-Webcast am 12. April wie aktuelle Cyberangriffe funktionieren und wie proaktiver Schutz vor Advanced Threats aussieht.

      Der Schutz vor Cyberangriffen wie mit der aktuellen Erpressungs-Malware „Locky“ ist derzeit eines der Top-Themen von Sicherheitsbeauftragten. Informieren Sie sich wie Cyberkriminelle heute und vorgehen und wie umfassender Schutz für Mitarbeiter, Unternehmen und die Unternehmensmarke funktioniert.

      • Einschätzung der Bedrohungslage seitens Dr. Markus a Campo, Senior Analyst Informationssicherheit, Experton Group: Angriffsvektoren, Massenangriffe vs. gezielte Attacken, kommende Herausforderungen bei Mobile, Social, User Awareness, IoT
      • Aktuell Angriffe auf Kliniken sowie Industrie und Wirtschaft – so legt die Ransomware “Locky” Organisationen in Deutschland und weltweit lahm
      • Unabhängig davonüber welche Angriffsvektoren – heutige Cyberattacken haben eins gemeinsam: Sie zielen auf den Mensch als Angriffsfläche ab: Ergebnisse des „Faktor Mensch Berichte 2016“
      • Wie proaktive Schutzmechanismen und automatisierte Reaktion bei Security Vorfällen Unternehmen schützen
      • Zusammenfassung und Q&A

      Read more >
    • “Minority Report” Security: Predicting & Stopping Targeted Threats with Big Data “Minority Report” Security: Predicting & Stopping Targeted Threats with Big Data Amar Doshi, Director Product Marketing & Strategy, Proofpoint Recorded: Sep 12 2013 5:00 pm UTC 55 mins
    • Targeted malware campaigns have evolved significantly from traditional simple inclusion of malware as non-disguised executable files to more social engineered “phishing” style attacks. More than 30% of unwanted email at peak times coming into an organization are seen to have malicious intent – malicious URLs, attachments and credential-seeking attacks. Repeated Longlining campaigns have flooded organizations with phishing threats by working around existing security controls. A new Big Data approach becomes critical in stopping the impact of these on incident management, brand impact, and data loss.

      Join Amar Doshi for a discussion on “Minority Report” Security: Predicting & Stopping Targeted Threats, which will cover:

      · Typical attacker tactics that are involved in creating targeted and Longlining attacks

      · Findings from recent research conducted by Proofpoint security analysts

      · A Big Data approach to predict-and-protect organizations before user’s click-and-compromise

      Read more >