Proofpoint Pty Ltd Whitepapers


Sort by: Date | Company | Title


The definitive email security ebook
By Proofpoint Pty Ltd | 27/10/2017

The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount.

Learn how to prevent the top email fraud tactics including:

Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Download the Definitive Email Security Strategy Guide now.

Download this now


Preventing, Detecting, and Responding to Advanced Email-based Attacks
By Proofpoint Pty Ltd | 25/10/2017

This new report examines how Proofpoint offers Advanced Email Security as a complete solution for email threats and email continuity. In depth review of our multilayered approach to offer clear visibility into all an organization’s email threats, along with the ability to respond to and stop those threats.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Business Email Compromise Survival Infographic
By Proofpoint Pty Ltd | 19/10/2017

Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected. BEC uses emails from fraudsters posing as an executive. They ask the victim to wire money or disclose sensitive information. Only later do the victims realize that the email didn’t come from the executive.

Download this now


Business Email Compromise Survival e-Guide
By Proofpoint Pty Ltd | 19/10/2017

Business email compromise (BEC), or impostor email, doesn't use malware attachments or malicious URLs, making it invisible to even "next-generation" email defenses. Safeguard your critical information and secure all the avenues that BEC attackers pursue.

This BEC Survival Guide can help you: Understand how BEC works and why it succeeds Prepare for and prevent attacks Know what to look for in a complete solution that stops BEC and other targeted threats Download your copy now and start building your BEC defenses.

Download this now