InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Prevent Insider-Led Data Leaks Without Compromising User Privacy

Presented by

Itir Clarke, Manager of Product Marketing and Nirav Shah, Staff Product Manager

About this talk

The powerful forces of the cloud and mobility have spurred greater collaboration and more distributed workforces. With this development, companies have greater pressure than ever to protect their highly sensitive data at the endpoint, monitor risky behaviors and users, and respond quickly and effectively to insider-driven incidents. Join our live demo as our experts show the latest improvements in Proofpoint Insider Threat Management (ITM) and Endpoint Data Loss Prevention (Endpoint DLP) to can help solve these problems. In this 30-minute demo, we'll show you how to: - Maintain user and data privacy and meet growing privacy compliance standards - Protect sensitive and regulated data (such as social security, driver license, bank account and credit card numbers among others) - Protect against data leakage risks and mitigate insider threats from compromised, malicious or negligent users
Proofpoint

Proofpoint

85684 subscribers826 talks
Protect people. Defend data.
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Related topics