Securing Personal Webmail and Browsing

Zoom | Tuesday, May 4, 2021 | 1:00PM-1:30PM ET

Attackers are relentless when pursuing their victims. When they can’t reach targets through their corporate email accounts, they go after the second most popular threat vector, personal email accounts. For this reason, employee personal web use has historically introduced significant security, productivity, and privacy challenges to an organization’s security posture.

Proofpoint Targeted Attack Protection (TAP) Isolation separates web content to provide corporate users with safe and anonymous access to webmail and internet browsing while protecting the endpoint and the corporate network. Powered through Proofpoint’s cloud service, it’s simple for IT to deploy, manage, and support, while simultaneously improving user satisfaction. These capabilities also meet compliance needs by enabling employers to establish a filtered, proxied, anonymous, and secure internet service for personal webmail and browsing use as required by GDPR.

During this Tech Talk, we'll share:
  • A beginning to end setup of TAP Isolation
  • An overview of Proofpoint Protection Server configuration
  • How to configure rules to redirect user sessions into isolation
  • A quick demo of TAP Isolation

Proofpoint Tech Talks are 30-minute technical discussions brought to you by engineers, for engineers. They cover a range of topics and feature technical deep dives, demos, customer stories, and live Q&A with Proofpoint experts.

FEATURED SPEAKER

Kurt Eckert
Kurt Eckert | Cloud Security Solutions Architect, Proofpoint, Inc.

Kurt is the Solutions Architect responsible for the Proofpoint Isolation product line. He has over 30 years of experience in Information technology working in virtually every area and has worked in the security field for the last 10. He has been at Proofpoint for 2.5 years and has worked at Cisco and Riverbed as well as a number of startups.

Who Should Attend

This event is suitable for mid-level information security management (IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.