Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's new

The State of Data Loss Prevention

Data Loss Prevention has regained prominence in recent years due to large scale breaches and increasingly stringent regulatory requirements. Vendors with varying tech heritages have been lining up to employ new technologies and techniques against this seemingly never-ending problem.
Blog
•Mar 31, 2025

Partner POV | Unlocking Cybersecurity Excellence in 2025 with Proofpoint

Proofpoint's human-centric security platform helps your customers protect their people and defend their data.
Partner Contribution
•Feb 4, 2025

Partner POV | Adaptive Email Security

Augment Proofpoint's core email security with a fully integrated layer of behavioral AI.
Partner Contribution
•Oct 24, 2024

Adopt a More Human-Centric Approach to Cybersecurity with Proofpoint | Meet the Chief

Roughly 95 percent of cyber incidents can be traced back to human error – a clear signal that a mature cyber strategy requires so much more than tooling. In this episode of Meet the Chief, we talk with Proofpoint CEO Sumit Dhawan about why Proofpoint is taking a more human-centric approach to cyber and how AI is changing the equation – from both the defender and attacker perspective.
Webinar
•Jul 10, 2024 • 9am

Adopt a More Human-Centric Approach to Cybersecurity with Proofpoint | Meet the Chief

Roughly 95 percent of cyber incidents can be traced back to human error – a clear signal that a mature cyber strategy requires so much more than tooling. In this episode of Meet the Chief, we talk with Proofpoint CEO Sumit Dhawan about why Proofpoint is taking a more human-centric approach to cyber and how AI is changing the equation – from both the defender and attacker perspective.
Video
•0:34
•Jul 8, 2024

Partner POV | Voice of the CISO

The 2024 Voice of the CISO report also highlights the increased risk of cyberattacks due to remote and hybrid work, as well as the growing sophistication of cyber threats. While CISOs feel more concerned about cyberattacks, they also feel better prepared to deal with the consequences.
Partner Contribution
•Jul 3, 2024

Partner POV | What's the Best Way to Stop GenAI Data Loss? Take a Human-Centric Approach

The release of Proofpoint DLP Transform provides a modern alternative that helps CISOs protect data while allowing users to access GenAI tools.
Partner Contribution
•May 1, 2024

That One Time You Sent It To The Wrong Person

Everyone has sent an email to the wrong person at one time or another. It can be a laughable mistake or cause a real negative business impact. Let's explore how misdirected email protection can reduce this risk.
Blog
•Apr 22, 2024

Partner POV | Break the attack chain - protect people, defend data

The top 3 cybersecurity risks are people-centric. Learn how Proofpoint helps organizations break the attack chain.
Video
•0:50
•Mar 7, 2024

Partner POV | Insider Threat Mitigation: 5 Best Practices to Reduce Risk

Insider threats, which involve authorized individuals misusing their access to data or systems, have become a top concern for security leaders.
Partner Contribution
•Jan 22, 2024

Partner POV | Proofpoint's 2024 Predictions: Brace for Impact

Looking ahead to 2024, cyber criminals are expected to increasingly target digital supply chain vendors and use aggressive social engineering tactics. Defenders must adopt proactive and adaptive strategies to counter these evolving threats and focus on breaking the attack chain.
Partner Contribution
•Jan 4, 2024

Partner POV | Google and Yahoo Set a Short Timeline to Meet New DMARC Policy & Setup Requirements. Are You Ready?

Google and Yahoo are implementing new email authentication requirements starting in 2024 to reduce fraudulent and low-value emails. Proofpoint offers solutions and services to help companies meet these requirements and protect their brand reputation.
Partner Contribution
•Dec 15, 2023

Partner POV | How to Better Secure and Protect Your Microsoft 365 Environment

Increasing sophistication of email threats, the need to augment Microsoft 365's native security with advanced solutions, the deployment models for email security, and the benefits of combining pre-delivery and post-delivery protection, benefit from a multilayered approach to enhance email security for Microsoft 365 environments.
Partner Contribution
•Oct 29, 2023

Break the attack chain with Proofpoint

Protect your people from advanced email attacks and identity-based threats. Defend sensitive data from theft, loss and insider threats.
Video
•0:50
•Sep 5, 2023

Proofpoint People-Centric Overview

Proofpoint is focused on people-centric security because at its core, security is a people problem. People interact with applications, cloud resources and data. Proofpoint can help you think beyond securing your number one threat vector.
Video
•7:39
•May 30, 2023

Proofpoint

Proofpoint helps organizations protect their people. Our integrated suite of cloud-based solutions helps mitigate targeted threats to make their users more resilient against cyber attacks.

16 Followers

At a glance

15Total
8Articles
4Videos
2Blogs
1Event
What's related
  • Security
  • Identity and Access Management
  • Cybersecurity Risk & Strategy
  • Data Security
  • Endpoint Security
  • Meet the Chief
  • WWT Presents
  • Blog
  • Cloud
  • Cloud Security
  • Network Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies