You're invited


Proofpoint Spotlight

This event has already taken place. Please visit proofpoint.com/events for upcoming events near you.


Transactional emails are an essential part of doing business. But unfortunately, many legacy relay tools don’t work well in today’s cloud- and SaaS-driven environments.

Messaging teams send DMARC-compliant emails to increase their deliverability—but many of their SaaS partners don’t use DKIM authentication, which is a critical DMARC component. At the same time, security teams want better visibility and centralized control over the applications that send these emails. And infrastructure teams want to migrate these services to the cloud. With legacy tools, all three of these teams struggle with system-generated emails.

Join us for this session as we discuss Proofpoint Secure Email Relay and how this cloud-based solution can help you overcome all of these challenges and more.

You’ll learn how to:

  • Migrate email relay functionality to the cloud
  • Centralize control and provide DKIM signing for third-party SaaS applications
  • Reduce risks from compromised relay services
  • Separate user-generated emails from application-generated emails

We’ll also be covering Proofpoint Virtual Takedown services, which help you mitigate look-alike domain abuse. This includes:

  • Assisting with reviewing look-alike threats sending email or mocking up fake websites
  • Mitigating threats across a multitude of block-list providers for email or web
  • Requesting hard-takedowns from the domain registrar

Agenda

  • 1:00PM-1:05PM
    Introductions
  • 1:05PM-1:35PM
    Secure Email Relay for Protecting Application Mail
  • 1:35PM-1:50PM
    Virtual Takedown to Mitigate Look-alike Domain Abuse
  • 1:50PM-2:00PM
    Q&A

Featured Speakers

Mike Schenck

Mike Schenck

Sr. Sales Specialist,
Proofpoint, Inc.








Anthony Bean

Technical Sales Specialist,
Sender Security and Authentication,
Proofpoint, Inc.








Arnold Harden

Director of Sender Security and Authentication
Proofpoint, Inc.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.