STEP BACK AND RELAX

Step back and relax

Today, your people are your new perimeter. And cybercriminals' target of choice.

Perimeter-only strategies are a thing of the past. Digital transformation and the cloud have forever altered our infrastructures, while mobile technologies and remote access have changed your people’s workstyles.

It's time to shift your strategy to defending your users—wherever and however they work.

Join us for a 4 week summer program where we will share with you insightful talks and research on topics such as:

  • How to protect email as the #1 threat vector: email & how to root out ransomware
  • What are the five myths of social engineering
  • How to defend your organisation from Insider Risks – including malicious, compromised, and careless users
  • How to implement people-centric compliance and archiving solutions

Protect Your People

Cybersecurity in Action: Protect Your People

Email and the cloud are today’s primary attack vectors. Fight back with an intelligent, holistic
and people-centric approach that blocks attacks, secures cloud accounts and educates users.


2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg
Raising the Bar on Email Security

The attackers have made it clear who they’re after: Your people. According to the 2021 Verizon Data Breach Investigations Report, 85% of breaches involve human error. 

Watch now

2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg
Stop Ransomware at the Root

Ransomware is growing by 300% a year, with 75% of Ransomware attacks starting with a phishing email. Reduce the risk by stopping the initial attack.

Watch now

2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg
Mitigating your Email Risk in 365

Malicious messages sent from Microsoft 365 targeted almost 60 million users in 2020. With email being the number one point of entry for cyber threats, this puts everyone at risk, not just Microsoft customers.

Watch now

analyst-report-icon-2-128x128.png
Initial Access Leads to Ransomware

Preventing ransomware today largely has shifted from a direct email threat to an indirect threat where email is only part of the attack chain. 

Read now

white-paper-128x128.png
Microsoft misses Blog Series

Cyberattacks cost organisations millions of dollars every year and cause frustration for information security teams and users alike. 

Read now

infographic-128x128.png
Ramsomware Hub

Take the next step and explore our library of content to help you protect your organisation against Ransomware attacks.

Read on

Defend Your Data

Cybersecurity in Action: Combat Data Loss

Prevent data loss from malicious, negligent or compromised users by correlating content, behaviour
and threats for better insight and streamlined investigations. 



The Great Resignation has created more challenges for Security teams as it increases the risks for data loss.
Legacy DLP solutions crumble in the cloud. They’ve become inefficient, lack context and hinder IT team productivity.
54% of security professionals listed managing legacy infrastructure among the top 3 challenges with their DLP.
For many companies, he DLP strategy and investments could be misaligned due to major shifts in remote work. 
Your Journey Towards a Rapid and Accurate Response Starts Here.

Stay Ahead of Attackers

Cybersecurity in Action: Security Culture Starts with People

Software is only the beginning—security works best when it’s ingrained in the culture of your organisation.
Here are the cybersecurity resources and insights you need to build a cybersecurity culture at your organisation now and beyond.



2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg

Voice of the CISO Report 2022

The year cybercrime went primetime. Our findings from over 1,400 CISOs across 14 countries

Watch Now 

2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg

State of the Phish 2022

An in-depth look at the latest threat landscape - from phishing, to business email compromise, to ransomware.

Watch Now

2022-New-Perimeters-Issue2-Email-Print-Thumbnail.jpg

Peer-to-Peer Wisdom  

A look into what the market is saying about the role of Security Awareness Training. 

Read on

event-icon-2-128x128.png

Security Awareness Kit

Raise user awareness with a curated selection of resources to support your user’s recognition of social engineering and other cybersecurity threats.

Access free Awareness Kit now

webinar-icon-3-128x128.png

Social Media Awareness Kit

Poorly maintained social media accounts and oversharing are common in this age. Raise user awareness with a curated selection of awareness resources.

Access Free Awareness Kit now

solution-brief-128x128.png

Cyber Security Hub

Discover the latest cybersecurity resources and insights you need to build a cybersecurity culture for now and beyond.

Read on

One last thing...  Proofpoint on the BBC News.

Ryan - BBc.jpg
Sherrod.jpg

BBC News: Live interview -
Proofpoint's Ryan Kalember appeared on a live broadcast to discuss recent Twitter account hacks.
BBC News: Live Interview -
Sherrod DeGrippo from Proofpoint's Threat Research team appeared on a live broadcast to discuss the recent Iranian linked cyber hack.

Form title goes here

Form intro content goes in here