Hi [[ session.user.profile.firstName ]]

Proofpoint by the Numbers

Learn why Proofpoint is a next-generation cybersecurity company that empowers organizations to protect the way their people work today. From targeted attack protection and enterprise information archiving to mobile app and social media security, the numbers speak for themselves.
Recorded Mar 24 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Presentation preview: Proofpoint by the Numbers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What To Do About Information Archiving, eDiscovery and Compliance Now Nov 15 2016 6:00 pm UTC 60 mins
    Cheryl McKinnon, Principal Analyst at Forrester, Martin Tuip, Senior Product Manager at Proofpoint
    Legal and compliance pressures continue to evolve in the face of today’s data growth. Couple this with recent market consolidation and email migrations, and companies are looking for new ways to retain, search and make sense of their data in order to meet modern eDiscovery and compliance challenges. Overcoming the limitations in legacy solutions and understanding if the alternatives are “good enough” is a top of mind concern. We invite IT leaders, compliance professionals and legal teams to join us for a webinar, “What To Do About Information Archiving, eDiscovery and Compliance Now” on November 15th, 2016. Guest speaker, Forrester’s Cheryl McKinnon, Principal Analyst serving Enterprise Architecture professionals, will share trends, pitfalls and best practices for gaining deep insight into your data to reduce risk and enable better decision making. Live Q & A will follow.
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Recorded: Oct 20 2016 40 mins
    David Jevans, VP Mobile Security, Proofpoint
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Live Demo | Protecting your Information, DLP, Privacy Recorded: Oct 19 2016 49 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • BrightTALK: Proofpoint Canada Tech Talk Webinar: Better Together Recorded: Oct 4 2016 43 mins
    Join us for second monthly Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers.

    This session will focus on how Proofpoint and Palo Alto Networks combine to combat the ever-changing threat landscape.

    The threat landscape is constantly morphing and changing. New threats and techniques are being used by hackers to continually target the enterprise through multiple attack vectors. In this technical session, we will discuss the themes and changes in the threat landscape, sample attacks we’ve seen in the wild, and methods to secure your company in this environment. Proofpoint and Palo Alto Networks have integrated their top-tier security solutions to stop these evolutionary threats.

    We will have live discussions where we will share attack tactics, forensic information, integration details and platform strategies you can use to keep your networks safe.

    Topics covered will include:
    • Overview of today’s threat landscape
    • Thwarting innovative attacks with combined threat intelligence
    • Integration flow and details
    • Automated protection and threat prevention across your infrastructure
  • Business Email Compromise in Higher Education Recorded: Sep 28 2016 52 mins
    Cyber attackers are going phishing in your network pond.
    Learn how you can keep your people from taking the bait.

    Nowadays there are as many ways to communicate as there are things to say. Even so, email continues to be the primary method to connect with others, and the preferred vector for cyber-attacks. The latest threat targeting higher learning institutions comes from Business Email Compromise, an emerging but sophisticated cyber-attack consisting of low-volume campaigns of highly targeted phishing emails.

    In part 3 of our three-part Webinar series, we’ll take a deep dive into Business Email Compromise and explore the various approaches attackers are using to execute campaigns targeting higher education institutions. You’ll learn the indispensable tactics you need to protect your higher learning environment from Business Email Compromise phishing attacks. Register Now.
  • Responding to Cross Vector Attacks Recorded: Sep 21 2016 59 mins
    Open environments are great for innovation and higher learning.
    They’re also ideal for cross vector cyber attacks.

    One of the greatest challenges that security teams of higher learning institutions face is the growing number of sophisticated attackers leveraging multiple threat vectors to target faculty and students. There is no question that open network environments drive innovation but this equally makes it possible for cyber attacks to wreak havoc on day-to-day operations.

    In part 2 of our three-part webinar series, gain insight into cross-vector attacks and why they’re so challenging for universities to monitor. Learn how to arm yourself with ways to best respond when cross-vector attacks threaten your environment and users

    Complimentary On-Site Threat Assessment for All Attendees
  • Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense Recorded: Sep 15 2016 49 mins
    David Jevans, VP Mobile Security
    Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
  • Security for the Higher Education Threat Landscape Recorded: Sep 14 2016 63 mins
    A whole new batch of threats are descending on your campus, and we’re not talking about the freshmen.
    Universities face a cyber threat landscape that is unlike anything most companies endure. Beyond the burdens that staff and administrators put on the network, every year incoming students present a brand new set of challenges that push network security to its breaking point.

    Join us for part one of a three-part webinar series and explore how higher learning organizations gauge and mitigate the risk of intrusion by cyber threats. Learn what makes the higher education landscape so unique and how you can best protect against the threats that target your network through email, social media and mobile.
  • Proofpoint Canada Interactive Tech Talk: Incident Response Recorded: Sep 6 2016 56 mins
    This is the first installment of the Proofpoint Canada Technical Webinar Series, brought to you by engineers, for engineers. This session will focus on incident response.

    Far too often security teams spend their time manually researching a detected security threat using a variety of disconnected tools. Proofpoint Threat Response provides a single pane of glass designed from the ground up for the incident response process. By bringing all the relevant threat information together in one place and helping analysts identify important relationships Threat Response streamlines the workflow required to rapidly respond after threat detection.

    Please join us along with fellow Proofpoint customers for a session to discuss our threat response components including:

    •Dashboard – see all your critical threats, open incidents and more all at a glance
    •Incident Scoring – scores are automatically adjusted as new details are discovered
    •Incident Workflow – assign incidents to analysts and collaborate in an incident
    •Incident Details – view all the collected data about an incident in one place
    •List Management – add and remove identities and hosts to/from quarantine and containment lists
    •Event Sources – view threat detection systems that will be generating alerts
    •Device Updates – view devices and update schedules for your existing infrastructure
    •Reporting – view real-time trends about malware, infected users, CNC IPs and much more
  • How Banking Trojans Work and How to Stop Them Recorded: Sep 1 2016 42 mins
    Samantha MacLeod, ME Bank and John Baird, Deutsche Bank
    Because they are so lucrative, Banking Trojans have emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. From Dridex to Ursnif, Banking Trojans have been targeting Australian organizations with frightening effectiveness – lurking on victims' computers until they can grab banking details and login credentials which are then used to commit online fraud.

    When business accounts are involved, the potential losses can surge into the millions. Do you know how to detect and stop them before they hit your balance sheet?

    Please join CSO Australia and Proofpoint for an interactive webinar that will feature Samantha MacLeod, General Manager of Cyber Security from ME Bank and John Baird, Director, Global Technology Production at Deutsche Bank to discover:
    •A business perspective on Banking Trojans and how you can increase awareness
    •How to stop Banking Trojans before they hit your business
    •And other steps you can take
  • Ransomware Survival Guide Recorded: Aug 30 2016 61 mins
    Jennifer Cheng Director, Product Marketing, Proofpoint
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • How to Defend Against Email Fraud - in partnership with CSO Recorded: Aug 25 2016 55 mins
    Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint
    Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

    These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

    Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

    Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

    · How cybercriminals craft Email Fraud messages and where they get their information
    · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
    · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
    · What kind of business controls can be put in place to protect against Email Fraud manipulations
  • Archiving, Compliance, & eDiscovery Demo Recorded: Aug 5 2016 53 mins
    Get up to speed on the compliance risks enterprises will face in 2016 for archiving and eDiscovery with our live demonstration. See for yourself the technology that positioned Proofpoint as a leader in Gartner's 2015 Magic Quadrant for Enterprise Information Archiving.

    Take a deep dive into archiving for Proofpoint's solution for archive and compliance including:

    Powerful policy management capabilities to ensure that information is managed in accordance with internal and regulatory-driven requirements.
    Efficient eDiscovery response with a fully automated system for real-time search, legal hold management and legal team collaboration.
    Strategies that were effective in building internal support for control of archived content.
  • Information Protection, DLP, Encryption Demo Recorded: Jul 28 2016 54 mins
    No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.

    Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.

    - Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
    - Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
    - Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
  • Protect Your Office 365 Email from Three Key Threats Recorded: Jul 8 2016 63 mins
    Catherine Hwang, Proofpoint Product Marketing
    Find the Email Threats Lurking in Your Office 365 Environment

    As you look to migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop exploding threats such as business email compromise and ransomware.

    Join Catherine Hwang, Proofpoint Product Marketing, in a live Redmond webinar to hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored.

    See attacks for what they really are.
    Whether broad or targeted, Proofpoint safeguards your Office 365 users with superior efficacy against BEC, ransomware and other email attacks.
  • Email Security Peace of Mind with Threat Discover | Live Demo Recorded: Jun 22 2016 31 mins
    Over 90% of targeted attacks happen through email. Discover what threats may already be lurking in your Microsoft Exchange or Office 365 environment through Proofpoint’s Threat Discover for Email tool. With a quick and simple setup, security professionals can identify malicious URL and attachment-based threats residing in their Microsoft Exchange environment. Find out how Proofpoint solutions can also help prevent and respond to attacks such as these uncovered by Threat Discover.

    Join Proofpoint’s Alok Ojha, Director of Product Management, as he provides an exclusive demo of Threat Discover for Email including:

    • Installation and setup of the Threat Discover VM
    • Performing scans for threats in your email environment
    • Finding email campaigns and top targeted departments
    • Exporting results for further analysis
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Recorded: May 31 2016 40 mins
    Marc Lindenblatt, Presales Engineer Proofpoint
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
  • Visibility into the Modern Threat Landscape: Thinking Beyond the Network Recorded: May 26 2016 47 mins
    Ryan Kalember, Cybersecurity Strategist, Proofpoint
    Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
  • Proofpoint Privacy Live Demo Recorded: May 19 2016 54 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • Proofpoint Archiving, Compliance and eDiscovery Live demo Recorded: May 18 2016 43 mins

    Financial services firms face the world’s most stringent and complex regulatory pressures. Proofpoint Intelligent Supervision introduces a new level of efficiency and control for even the largest financial services organizations. With a fully integrated archive and supervision solution, Proofpoint provides comprehensive capture, review and reporting for complete visibility into email, Bloomberg, IM, collaboration and social data, making regulatory audits and investigations simple and straightforward.
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Proofpoint by the Numbers
  • Live at: Mar 24 2016 11:35 pm
  • Presented by: Proofpoint
  • From:
Your email has been sent.
or close