Back to Search Begin New Search Save Search Auto-Notify
Enhance Network and Security Efficiency
Today, advanced cyber-attack campaigns are perpetrated by a variety of actors with motives ranging from profit to espionage. Given the dynamic nature of these campaigns, it has become nearly impossible for organizations to keep pace with the changing threat landscape. Network intrusion detection and prevention systems and next-generation firewalls are sold with limited security signatures. Proofpoint ET Pro is a timely and accurate rule set fo...
June 15, 2021
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Proofpoint Spotlight: Protecting SLED A...
Attackers are constantly evolving their tactics to target state and local governments and educational institutions and districts. They combine multiple vectors—email, cloud accounts and trusted third parties—to spread malware, harvest credentials and steal money. Because attackers are persistent and continually upping their game, you need an integrated, layered approach to defending against email and cloud threats. Join us at Proof...
May 13, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Information Protection for the Modern P...
How do you define the security perimeter when the work world as we know it has changed? With work-from-anywhere, data is everywhere and now people are the new security perimeter. Whether negligent, compromised or malicious, insider risk is on the rise. According to the latest Verizon Data Breach Report, insiders have driven 30% of all recent data breaches. Traditional Enterprise Data Loss Prevention (DLP) tools often miss insider incidents. Wi...
March 2, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint Tech Talk: Reduce Risk with...
With so many employees working remotely during these unprecedented times, a careless mistake or simple lack of caution could cost your organization millions of dollars in damages. Now more than ever before, there’s a stronger need to assess user behavior, determine its impact on risk, and put in place practical steps to prevent malicious attacks. Proofpoint Security Awareness Training addresses these challenges by helping you identify ri...
January 6, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Proofpoint Tech Talk: Reduce Risk with...
Today’s threat landscape is constantly evolving. Threats targeting people are on the upswing and show no signs of slowing down in 2021. Protect your most important asset—your people— with a people-centric approach to security and by ensuring your users know what to do when faced with a real threat by providing them with targeted education. In this interactive event, you’ll hear from thought leaders who will share their...
December 16, 2020
Organizer: Proofpoint
Location: Virtual
Add Favorite
Adopt People-Centric Information Protection
In today's current cybersecurity landscape, information protection has become more difficult, and traditional tools aren't well-designed for the modern environment. Data doesn't lose itself. It always involves a person - whether it's a negligent, compromised, or malicious user.A people-centric approach to enterprise DLP can succeed where legacy DLP solutions have failed, and with Proofpoint's people-centric DLP platform, it brings together the...
December 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Uncover Hidden Threats in Your O365 Env...
All email, cloud, and compliance solutions are not created equal. As organizations move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these "good enough" features may not be good enough for your organization. New tools introduce new complexities, and new threats use social engineering to target people instead of infrastructure. Proofpoint's unique people-centric solutions...
November 18, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
A Holistic People-Centric Approach to I...
Your agency is facing a world today that is more global, transient, and connected than ever before. Traditional cybersecurity solutions are focused on outside-in. Modern security programs need to complement traditional security solutions with a solution that looks inside-out. Proofpoint's ObserveIT Insider Threat Management (ITM) correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data bre...
November 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Mitigate Risk and Improve Security with...
With 94% of breaches starting with an email attack, it's more important than ever to protect your users from targeted phishing and malware attacks.Join us on November 5th, to learn how SailPoint and Proofpoint can detect and protect you against modern threats like ransomware, phishing, Business Email Compromise, and Employee Compromise while identifying and protecting your agency's vulnerable identities and their access to your most sensitive...
November 5, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
People-Centric Security for Cloud Services
Working safely and securely from remote locations has never been more important. However, legacy methods of remote access can open potential security risks. With most remote work happening over cloud-based email and other SaaS apps such as Office 365, G Suite, and Box, this leaves your remote workforce vulnerable as these apps contain sensitive data, which must be protected. The path to better cloud application security lies in an integrated a...
August 11, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search