Advanced Email Security, powered by Perception Point, helps prevent all email-borne threats, including spam, phishing, BEC and impersonation attempts, ATO, malware, APTs, and zero days before reaching end users with multiple protection layers. It also enhances compliance and increases visibility into all actions performed by the admin users and the Incident Response team with a comprehensive audit log.
The anti-spam engines act as the first line of defense, applying anti-spam and reputation-based filters, including IP reputation checks, to email upon receipt — to block malicious or unwanted communication.
All emails are then recursively unpacked into smaller, individual components like URLs and files by anti-evasion technology. This process detects malicious embedded or hidden content. The URLs and files are separately run in multiple versions and patterns through the subsequent security layers to catch any hidden threats.
Advanced Email Security leverages powerful threat intelligence from six market-leading sources, combined with Perception Point’s technology that scans URLs and files in the wild to stay ahead of emerging threats.
Anti-phishing engines apply URL reputation filtering from four market-leading sources, combined with a unique image recognition technology that detects unknown, malicious URLs based on logos and images used on the webpage.
To catch payload-less attacks (BEC), such as impersonation attempts, look-alike domains, and display-name deceptions, Advanced Email Security leverages machine learning algorithms with IP reputation, sender policy framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-Based Message Authentication Reporting and Conformance (DMARC) record checks.
In order to prevent ATO, Advanced Email Security stops attackers from infiltrating the organization via credential phishing, analyzes end user patterns and behaviors to detect anomalies, prevents attackers from spreading malicious content to other users, and provides incident management of every account takeover attempt.
Known malware is stopped with the help of best-in-class, signature-based detection technologies, specifically developed to prevent email-borne threats, that act as another layer of protection on top of users’ local anti-malware solution.
The last line of defense is the next-generation dynamic scanning that prevents advanced threats that evade conventional defenses such as zero days and APTs. The unique, CPU-level technology acts earlier in the kill chain than any other solution to block attacks at the exploit phase by analyzing the applications’ execution flow during runtime to identify deviations from standard flow based on assembly code.
Moreover, service providers have access to a dashboard that provides a holistic view of the threat landscape across organizations with forensics data for each email, proactive insights on threats seen in the wild, and analysis of any file or URL on which the service delivery team needs forensics.
With the incident response service, you also gain access to cyber analysts that monitor all customer traffic and malicious intent with ongoing reporting and ongoing support, including handling false positives, remediating, and releasing when required.