90% of business compromises start with an email, defend your users today
Protect Your Entire Company From Phishing, Malware, Spam and Spoofing
Utilizing Real Time Anti-Phishing Feeds with No Per User Fees
Advanced threat defense to protect against malicious links in emails
Business Compromise Email
Stop whale phishing and domain name spoofing
Keep 99% of malware, spyware, spam and viruses out of your inbox
Get your critical mail into the inbox with an optional DKIM Signed Outbound SMTP service
Short Term Email Archiving
Redeliver emails to your server even if it has been deleted, for up to 24 hours.
Email Backup MX
30 Day Queue Retention Time
Email is the number one vector for sophisticated threats that are targeting your organization. These days its people rather than infrastructure that are the targets. Traditional spam filtering struggles to keep up with these new attacks, leaving your company at risk, which is why we are introducing Advanced Threat Defense, a layered approach to message security.
Attacks including malware, ransomware and phishing are becoming more common and more sophisticated every day. This is why Advanced Threat Defense includes the features your need in one integrated solution to secure your users from Spam, Malware, Ransomware, Phishing and Malicious Attachments. Our classification engine detects and defends against these threats in real-time with the highest possible level of accuracy.
Business Compromise Email / Domain Spoofing Protection
Cyber Enabled Financial Fraud is on the rise globally. At its core, Business Email Compromise BCE is a modern-day variation of the oldest trick in the con artist’s handbook, the art of deception. The motivation for BEC is typically financial, with the end goal of tricking an employee with finance access into making wire transfers to bank accounts thought to belong to trusted partners of the business, except the money ends up in accounts controlled by criminals.
These attacks are extremely sophisticated and these are the techniques that they use, and that Advanced Threat Defense protects against.
Bogus e-mails believed to be from a trusted sender prompt victims to reveal confidential information to the BEC perpetrators. This may include the names of internal people, their extension numbers or other information that would make the phishing emails seem even more legitimate. These could be questions about the accounting practices, what software is being used for accounting or even if a CEO is attending a conference.
Spoofed Domain Names
Slight variations on legitimate addresses trying to fool victims into thinking fake accounts are legitimate. The victim thinks he is corresponding with their CEO, but that is not the case. And when wire transfer instructions are provided, the victim typically complies with the transfer request.
Used to infiltrate company networks and gain access to legitimate e-mail threads about billing and invoices. Malware also allows criminals undetected access to a victim’s data, including passwords and financial account information.
Advanced Threat Defense includes:
Zero Hour Malware and Ransomware Protection
Unlimited Inbound Message Volume
Domain Name Spoofing Protection
Malicious Attachment Blocking
Activity logs – Real time access to the mail queue and click reporting.
30 Day Backup queue – 30 Days of MX backup service included.