SUNNYVALE, Calif. & SAN FRANCISCO--(BUSINESS WIRE)--RSA Conference 2024 – Proofpoint, Inc., a leading cybersecurity and compliance company, today unveiled two industry-first innovations that redefine ...
SUNNYVALE, Calif., Oct. 01, 2021 (GLOBE NEWSWIRE) -- Proofpoint, Inc., a leading cybersecurity and compliance company, today announced that for the second straight year it has been named the winner of ...
During Proofpoint Protect 2025, company leaders detailed how AI is being used in phishing trends and in cyber-defense tactics.
SUNNYVALE, Calif.--(BUSINESS WIRE)--Proofpoint, Inc., a leading cybersecurity and compliance company, announced today it was recently named a leader in all categories of the KuppingerCole Analysts AG ...
Cybersecurity firm Proofpoint Inc. today announced the general availability of Adaptive Email Data Loss Prevention, a service that automatically detects and prevents accidental and intentional data ...
Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. SAN JOSE, Calif. -- Stellar Cyber, the ...
Proofpoint’s approach to AI supports both product innovation and internal skill development, helping teams and partners strengthen collaboration and effectiveness.
SUNNYVALE, Calif., Jan. 22, 2020 (GLOBE NEWSWIRE) -- Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced it has achieved Federal Risk and Authorization ...
NEW YORK (Reuters) - The last time email could be called a sexy business, Facebook founder Mark Zuckerberg was celebrating his tenth birthday. Yet Proofpoint Inc, a $1.6 billion market cap email ...
An email campaign comprising millions of messages a day has been observed distributing a direct LockBit 3.0, also known as LockBit Black, ransomware payload, warned security experts working with the ...
Cybersecurity and compliance company Proofpoint has announced several new features and capabilities in its security solutions to help thwart threats across the most critical stages of the cyberattack ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results