Hear what the analysts say
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-building-business-case-itm-blue.jpg.webp?itok=G-9VDjSl)
Analyst Report
Frost and Sullivan, Building a Business Case for Insider Threat Management
The Cybersecurity Leader's Guide to Understanding, Communicating, and Mitigating the Risk.
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-forrester-mitigating-blue.jpg.webp?itok=TgCNsQ8n)
Analyst Report
Forrester, Best Practices: Mitigating Insider Threats
Discover Forrester’s recommendations on how to build an insider threat program.
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-2022-Cost-Of-Insider-Threads-blue.jpg.webp?itok=QRnB-pd3)
Analyst Report
Ponemon, Cost of Insider Threats Global Report
Learn how insiders impact your data, your employees & your bottom line.
Combat data loss and insider risk
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-2A-ITM-cover-10-biggest-and-boldest-blue.jpg.webp?itok=Z9IWhB28)
E-BOOK
The 10 Biggest and Boldest Insider Threats
Explore some of the biggest attacks and what you can do to avoid similar threats.
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-modern-blueprint-for-itm-blue.jpg.webp?itok=wqZYLXK7)
E-BOOK
Redefining Data Loss Prevention (DLP)
Learn about redefined DLP for the way modern organisations work.
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-cover-anatomy-of-investigation-blue.jpg.webp?itok=d8i9UaHu)
E-BOOK
The Anatomy of an Insider Threat Investigation: A Visual Guide
Learn how to speed up both proactive and reactive investigations.
Develop your own programme
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-getting-started-dlp-blue.jpeg.webp?itok=2pjLKnWp)
E-Book
Getting Started with Data Loss Prevention and Insider Threat Management
As the nature of work has evolved, data loss has only grown more challenging. Insider threats, external attackers or misconfigured cloud services have led to a rising problem, one that calls for a new, people-centric approach to data loss prevention (DLP).
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-modern-blueprint-for-itm-blue.jpg.webp?itok=wqZYLXK7)
E-BOOK
A Guide to Setting Up Your Insider Threat Management Program
Best practices to set up, operationalise and scale your program for success.
![ITM Starter Pack](/sites/default/files/styles/webp_conversion/public/featured-cards/pfpt-ITM-ESG-report-analyzing-blue.jpg.webp?itok=daCtz0he)
REPORT
ESG, Analysing the Economic Benefits of Proofpoint Insider Threat Management
Learn how to validate the benefits of Proofpoint ITM.