Whitepapers


Sort by: Date | Company | Title


Getting Started with DMARC
By Proofpoint Pty Ltd | 19/10/2017

The cost of Business Email Compromise (BEC), and Impostor email has risen to $5.3B and is impacting employees, business partners and customers of organisations around the world.

In order to protect all the groups that are targeted by BEC requires deep visibility into email, and the expertise to build and deploy email authentication policy. Proofpoint Email Fraud Defense (EFD) is designed to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organisation, into sending money and other sensitive information to the attacker. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and spoofing.

In this guide, you will learn:

What DMARC is and how it works The benefits of DMARC Key stats and success stories Step-by-step implementation instructions

Download this now


The Human Factor Report 2017 Infographic
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Ransomware Survival e-Guide
By Proofpoint Pty Ltd | 19/10/2017

By any measure, the WannaCry ransomware strain has already become one of the largest cybersecurity attacks in history. And it’s still going strong with new variants emerging every day. Fortunately, you can protect yourself against WannaCry, Petya, and other ransomware strains. Read this guide to learn: Why ransomware is surging What to do before, during, and after a ransomware attack Why you shouldn't pay ransoms—and why you may have to What free decryption tools can't protect you How to stop ransomware at the gates

Download this now


Business Email Compromise Survival Infographic
By Proofpoint Pty Ltd | 19/10/2017

Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected. BEC uses emails from fraudsters posing as an executive. They ask the victim to wire money or disclose sensitive information. Only later do the victims realize that the email didn’t come from the executive.

Download this now


Business Email Compromise Survival e-Guide
By Proofpoint Pty Ltd | 19/10/2017

Business email compromise (BEC), or impostor email, doesn't use malware attachments or malicious URLs, making it invisible to even "next-generation" email defenses. Safeguard your critical information and secure all the avenues that BEC attackers pursue.

This BEC Survival Guide can help you: Understand how BEC works and why it succeeds Prepare for and prevent attacks Know what to look for in a complete solution that stops BEC and other targeted threats Download your copy now and start building your BEC defenses.

Download this now


Secure Your Network Smarter and Faster
By Insicon | 16/10/2017

In today’s complex and constantly changing environment, network administrators need complete visibility into network behaviour to maintain a robust security posture.

This paper covers information on applications, users, and threats, allowing you to quickly neutralize risks and make smarter and faster security decisions.

Download this now


5 Internal Cybersecurity Challenges of Digital Cohesion
By Insicon | 16/10/2017

The cybersecurity threat landscape is rapidly evolving. Organisations seeking to transform digitally must grapple with 5 major challenges. Here is how Juniper’s SDSN can eliminate your biggest cybersecurity fears.

Download this now


Outsmarting Malware
By Insicon | 16/10/2017

This paper discusses a modern approach to cybersecurity that uses adaptable machine learning algorithms combined with several anti-malware technologies to find and foil advanced threats. It compares how these components work and their respective attributes to help you determine best practices for the threat prevention component of your organisation's security strategy.

Download this now


The Total Cost of Ownership of Cloud- and Premise-Based Contact Centre Platforms
By Genesys | 4/10/2017

This report looks at the five-year cost comparisons for technology infrastructure deployment.

Download this now

Market Place