> Research Library > Proofpoint > Why You Need to Consider Cloud-Based Security in 2012

Why You Need to Consider Cloud-Based Security in 2012

White Paper Published By: Proofpoint
Published:  Apr 06, 2012
Type:  White Paper
Length:  16 pages

An Osterman Research White Paper

Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access to corporate data resources, protecting these critical resources and platforms should be at the top of virtually IT decisionmaker's "must-do" list.

Read this white paper from Proofpoint and Osterman Research to learn:

  • Why the use of cloud-based security capabilities is increasing at a faster pace than use of on-premise security servers and appliances
  • Why most IT decision makers continue to view security as a top-of-mind issue, resulting in security spending and analysis of new security models as a leading priority in most organizations.
  • How the number, sophistication and consequences of email, Web and other threats is increasing and will require more advanced, faster and more efficient ways of dealing with them.

Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security, spam, osterman research, proofpoint, whitepaper, white paper, email archiving, email security, cloud, report

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee