proofpoint

Results 1 - 25 of 35Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in todays stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behrden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behrden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Ransomware ist eine alte Bedrohung, die jngst ein fulminantes Comeback machte. Diese Art von Malware, deren Namen auf dem englischen Wort fr Lsegeld (ransom) beruht und auf die Zahlung verweist, die nach dem dem Kidnapping der Dateien von den Opfern geleistet werden muss, entwickelte sich schnell zu einem der beliebtesten Cyberangriffe. Nahezu ein Viertel aller E-Mail-Angriffe mit schdlichen Dokumentdateien enthalten derzeit einen Ransomware-Stamm namens Locky.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsofts native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsofts native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketers playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everythingattackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that cant be patched: people. Thats why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employees inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPRfailure to do so will lead to significant disruption of business. Whats more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisations investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsofts native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsofts native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Aprs des annes de ngociations, le rglement gnral sur la protection des donnes (RGPD) de l'Union europenne prendra effet le 25 mai 2018. Il abrogera la directive europenne relative la protection des personnes physiques l'gard du traitement des donnes caractre personnel, vieille de 22 ans.
Tags : 
personne concerne, donnes caractre personnel, responsable du traitement, sous-traitant, violation de donnes
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Nach langjhrigen Verhandlungen wird die Datenschutz Grundverordnung der Europischen Union am 25. Mai 2018 in Kraft treten und die 22 Jahre alte EU-Datenschutzrichtlinie ersetzen. Hauptziel der neuen Verordnung ist es, den EU-Brgern die Kontrolle ber ihre personenbezogenen Daten zu geben. Sie reguliert, wie ihre Daten erfasst, verarbeitet, gespeichert, gelscht und verwendet werden drfen. Alle (lokalen und internationalen) Unternehmen, die in Europa geschftlich ttig sind und personenbezogene Daten von EU-Brgern verarbeiten, mssen diese neuen Regelungen einhalten.
Tags : 
datensubjekt, personenbezogene daten, datenverantwortlicher, datenverarbeiter, datenschutzverletzung
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirs, utilisent des outils automatiss pour puiser des informations sur leurs cibles dans les profils souvent publics disponibles sur les mdias sociaux. Ils savent donc o vous travaillez. De mme, le poste que vous occupez, vos centres d'intrt, vos loisirs, votre situation matrimoniale ou encore vos prcdents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour laborer des messages convaincants qui vous incitent cliquer sur une pice jointe ou une URL malveillante. Si vous tombez dans le pige, une charge active malveillante est injecte dans votre systme.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die hufig ffentlich zugnglich sind) nach Informationen ber ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen uerst berzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schdliche URL oder angehngte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, fr sicherheitsteams
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le pige tendu par un imposteur est plus facile qu'il n'y parat. Imaginez le scnario suivant : vous travaillez pour une importante socit qui a rcemment procd plusieurs acquisitions. Votre travail consiste rgler les factures. Un matin, vous recevez un message de votre PDG actuellement en dplacement. Il vous demande de virer des fonds afin de pouvoir entamer les ngociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu' la conclusion de l'accord.
Tags : 
directeur oprationnel, directeur financier, ressources humaines, service financier, gestion des salaires
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden hufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als Spoofing bezeichneten Methode werden die Opfer getuscht und davon berzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschftspartner stammt. Der Betrger fordert den Empfnger zur Ttigung einer berweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : 
geschftsfhrer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
    
Proofpoint
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from todays advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Dec 21, 2018
If youre like most IT leaders, youre invested heavily in the latest security tools. Yet youre still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. Youre spending more time dealing with a growing volume of threats. And youre seeing a shrinking return from your security investments. Thats because most of todays attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security, secure instant messaging, web service security, mobile data systems, wireless messaging, data protection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : 
proofpoint mlx, spam detection, email security, phishing attack, saas, messaging security, anti spam, anti spyware, anti virus, phishing, secure instant messaging
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages, email security, messaging, search and retrieval
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security, backup and recovery, email security, data protection, search and retrieval
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Tags : 
proofpoint, enterprise data protection, email encryption, security, data loss prevention, email security, encryption, data protection, messaging
    
Proofpoint
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.