View
Sorting
Products found: 75
Agari Phishing Response
Challenges of Phishing Incident Response
SOC Time is Valuable While employee reported phishing is important for breach threat intelligence, these reports can overwhelm Security Operations Center analysts due to the sheer number of reported phishing incidents—the majority of which turn out to be false. Many organizations receive tens of thousands of phishing incident reports per year, requiring analysts to correlate data from five or more tools, sift through tedious email logs, and then manually remove emails one by one from inboxes. Manual Phishing Incident Response is Inefficient It can take Security Operations Center analysts five hours or more to manually triage, investigate, and remediate a single phishing incident manually. With the average cybercriminal exfiltrating data from a breach within hours, that precious time can be the difference between preventing a breach and losing millions. The Agari Advantage- Prevent Impersonation. Keep your CEO and other key executives safe by preventing email impersonation by attackers.
- Block Zero-Day Attacks. Stop never-seen-before attacks from exploiting security gaps within your organization.
- Detect Account Takeovers. Discover attacks from compromised email accounts before they result in financial or information loss.
Key Capabilities
Contain and Remediate Incidents Automatically in Minutes By streamlining response times and automatically removing malicious emails from inboxes, Agari Phishing Response contains breaches in minutes instead of months. Agari Phishing Response provides an end-to-end automated phishing playbook that integrates with Microsoft Office 365 to handle employee phishing reports, triage them, discover similar phishing campaign emails, perform forensic analysis, and then automate the remediation process.Allot Communications Secure Service Gateway
- See how well your mission-critical applications are performing and supporting user productivity
- Control application performance and improve Quality of Experience according to business priorities
- Keep malicious or unauthorized user/application traffic off your network
- Neutralize threats and ensure ongoing performance of business applications
- Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage
- Troubleshoot and resolve network issues in real time
- Simplify and automate your operations
- Reduce opex and TCO
AnubisNetworks MPS
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
AppRiver Email Security
- Modern dashboard that spotlights phishing and malware threats
- Real-time protection from phishing and malware
- Proprietary technology that protects against conversation hijacking
- Maximizes or limits user control options
- Over 60 filtering techniques
- Office 365-compatible
- Efficiently filters quarantine with convenient declutter feature
- Viewable or searchable quarantined messages for a domain
- Downloadable messages for further analysis
- Full security management with Two-Factor authentication (2FA)
Avanan
- Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
- Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
- Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
- Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
AVG Technologies Internet Security
Protect your personal files and your private life
Malware doesn’t just affect your PC anymore — it’s gotten personal. Through ransomware and webcam spying, hackers can get to your most personal files and photos, or even peep into your home. AVG Internet Security now comes with new Webcam Protection and Ransomware Protection features to secure your personal files — and your private life.Features
Computer Protection Our advanced antivirus scans for, removes and flat-out stops viruses, ransomware, spyware, rootkits, Trojans, and other nasty malware — and because it all happens in real time, we can catch threats before they reach you. We secure your USB and DVD drives just as quickly, too. Our favorite bit? It updates your security automatically, and uses advanced Artificial Intelligence (AI) and real-time analysis to help stop even the newest threats from getting near you. Web & Email Protection Your email has never been safer. Our Email Shield technology specifically targets email attachments to stop threats, wherever they may come from — malicious senders or friends sending malware out unknowingly. Your online security is guaranteed with real-time link & download scanning, and protection against unsecure Wi-Fi spots. If you click it, we scan it — with our best internet security software, you always know your way is clear. Hacker Attacks Protection Our Enhanced Firewall gives you full control over exactly who and what comes in and out of your PC. And our Ransomware Protection provides an extra layer of protection against ever-increasing ransomware attacks. That means nobody messes with any of your private data, files, photos, and passwords — no hackers, no ransomware, nothing. Privacy Protection Keep peeping Toms and suspicious applications from accessing your webcam, encrypt and hide your most private photos and files, or permanently shred documents you’re done with. Payments Protection Whether browsing, banking, or shopping, this is the added internet protection you need. We block spam and scams, and even help you avoid fake copycat websites, to prevent you from accidentally giving our passwords or credit card numbers to the bad guys.Axigen Business Mail Server, Calendaring & Collaboration
Business-class Messaging
Powerful technology at your service... Axigen's high-performance mail server technology is specifically built to provide you with fast & secure email communication (via Axigen SmartProcessing™ & Axigen GrowSecure™), while ensuring effective space management (via intelligent Axigen UltraStorage™). ...adapted to work the way you do Available on both Windows & Linux OS, the Axigen messaging solution for business adds to this powerful technology just the right touch of everything: email, calendaring & collaboration, all backed-up by efficient 24x7 technical support.Calendaring & Collaboration
Schedule meetings & organize tasks Organize your business with effective time-management tools such as personal & public calendars, tasks & notes, available from WebMail, MS Outlook & iCal (Webcal) compatible clients. Share & delegate Share personal email & calendar folders, contacts, appointments & tasks with co-workers. Reserve common company resources, such as meeting rooms & projectors.Local & Remote Access
Native connectivity with MS Outlook Communicate using MS Outlook, while taking full advantage of Axigen's calendaring & collaboration - via our Outlook Connector (including offline work, advanced search & filters etc). Ajax "Refreshless" WebMail with desktop-like usability Offers you keyboard navigation & shortcuts, drag-and-drop, "Live" email list view, frequent folders, email filters, out-of-office messages, individual Blacklist / Whitelists. Mobile WebMail interface Access your WebMail account from mobile devices with Internet access to check emails, compose / delete messages, set permissions on folders & much more. Other POP / IMAP desktop clients Alternatively, send & receive emails from many other popular POP3 / IMAP email clients, such as Mozilla Thunderbird or Apple Mail. Brandable & localized standard WebMail interface A fast & friendly web interface, with HTML email composer, temporary email addresses (account aliases) & RPOP connections. Easily brandable & localized in your native language (over 25 languages available), with several skins to be used at the end-user's choice.Wireless Mobile Sync
With ActiveSync®-enabled devices Synchronize your email, contacts, calendars or tasks by using Axigen's built-in Exchange ActiveSync® support for mobile devices. With BlackBerry® smartphones Gain instant access to relevant data such as email messages, contacts or calendars, regardless of time & location, from your BlackBerry® smartphone, via the AstraSync™ or the NotifySync™ client.Extensive Security Toolset
Multi-layer security The Axigen mail server guarantees secure reception, transit & delivery of email. Protect your confidential data with an extensive set of defensive tools. AntiVirus & AntiSpam integration For extra email protection, you can extend Axigen's standard ClamAV & SpamAssassin defensive tools by integrating any of the available commercial Antivirus & AntiSpam apps.Axway MailGate
- Centralized management means you can have MailGate SC up and running quickly, processing close to two million messages per hour
- A powerful management dashboard provides real-time visibility into email traffic, network attacks, spam statistics, message queues, content filtering, and more — even across multiple instances or virtual environments
- Automated report generation, data export for custom reporting, and advanced message tracking save time and improve visibility
- Sandboxing removes suspicious attachments from the mail flow, opening them in a secure isolated environment
- URL Evaluation analyses URL’s embedded in messages, identifying those that may link to a payload or attempt credential-jacking
- Scan and analyze email and shared file content and more than 300 types of attachments, including multiple levels of embedded archive files and hidden document text
- Set up simple checkbox filters to identify personal and financial data, including Social Security or personal identification numbers, banking/trading (CUSIP), and credit/debit card numbers
- Use the financial services lexicon to scan for personal financial information, including statements, account numbers, PINs, and trade confirmations
- Use the HIPAA lexicon to scan for PHI, including patient identifiers, medical diagnostics and procedures, drug names, and treatment phrases
- Define policies that automate gateway-to-gateway email encryption for any remote domain
- Enforce TLS or S/MIME connections with remote domains, hostnames, partner sites, or IP addresses
- Receive automatic alerts on TLS attempts and failures
- Deliver secure email to any recipient without the need for desktop software, using MailGate SC’s Secure Mailbox capability
Barracuda Email Security Gateway
Barracuda Sentinel
Identify and Secure Your Highest-Risk Individuals Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. Part of a Complete Email Protection Platform With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. Sentinel Detects Threats that Email Security Gateways Can't Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. Protect Your Business Against Account Takeover Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. Features Stop Targeted Attacks with AI
- Prevent Spear Phishing
- Prevent BEC and CEO Fraud
- Detect Employee Impersonation
- Stop Zero-Day Phishing
- Detect Web Impersonation
- Stop Inbound Spoofing
- Continuous Learning
- Exportable Reports
- Alerting for Account Takeover
- Prevent Account Takeover Infiltration
- Detect Compromised Emails
- Delete Emails Sent Internally
- Notify External Recipients
- Lock Attackers Out of Accounts
- Prevent Third Party Domain Spoofing
- Automated DMARC Reporting
- DMARC Aggregation and Visualization
- DKIM/SPF Configuration and Troubleshooting
- Better Email Deliverability
- Spoofed Email Reports
- Detect Misconfigured Legitimate Senders
- Protects Customer Brands
- Exportable Reports
- Lightweight Architecture
- Instant Setup
- Works with Any Gateway
- Historical Assessment
- Test Employee Security Awareness
- 80 Real-World Templates
- Simulate Impersonation and BEC
- AI Determines Employee Risk
BitDam
- Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
- 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
- Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
- Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
- Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
- Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
- Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
- Cloud Storage
- Instant Messaging
CelloPoint Secure Email Gateway
Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.
Benefits:
- Protects against spam, viruses, spyware, and other malware
- Affordable protection is simple and reliable
- Reduces administrative overhead
- Intuitive Management GUI
Tier One: Anti-spam Protection
Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:
- Denial of Service (DoS) Protection
- SMTP Rate Limit
- Bounce Back Protection
- Directory Harvest Attack (DHA) Prevention
- Sender IP Reputation Analysis
- SMTP Transaction Check
- Virus, Phishing and Spyware Scanning
- Intelligent Content Analysis (ICA)
- Heuristics Rule
- Bayesian Analysis
- Violation Check
Tier Two: Anti-Virus Filtering
A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.
Tier Three: Anti-APT-URL Protection
To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:
Static Black/Whitelist Database
Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.
Dynamic URL ToC (Time of Click) Scanning
To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.
Tier Four: Anti-APT-File Protection
To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:
Dynamic Sandbox Scanning
Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.
Full-system emulation
Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.
Correlation Analysis and Threat Scores
Threat Level Analysis that commands SEG to either block or release certain mails.
Professional Summary Report
Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.
High-performance, Easy Deployment
Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.
Cisco Email Security
Clearswift SECURE Email Gateway
CORE Security
Introducing CORE Security
When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.CORE Base
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Quarterly
- System hardening
- Next-generation firewall
- Advanced DDoS mitigation: Standard (20 Gbps)
CORE Enterprise
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation: Enhanced (250 Gbps)
- 24/7 SIEM services
CORE Platinum
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Managed Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation
- Pro (Terabit+)
- 24/7 SIEM services
- Intrusion Prevention System (IPS)
Bolt-on CORE Security™ Services
In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:- Data loss prevention (DLP)
- Web application firewalls (WAF)
- Penetration testing
- URL filtering (Virtual Desktops only)
- Email spam filtering and antivirus (Exchange only)
- Compliance consultancy
CyberX Platform
EgoSecure Data Protection
F-Secure Messaging Security Gateway
F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate antispam solution* along with capabilities for email firewall, antivirus, and secure messaging. Depending on company traffic type Messaging Security Gateway can remove as much as 99.5% of spam.
Key features:
- Secures your network against spam, phishing, viruses, virus outbreaks, denial-of-service attacks, directory harvest attacks right at the gateway.
- Machine learning technology provides highly effective spam protection and outstanding end-user quarantines, safe lists and block lists.
- Outstanding virus protection with automatic updates of virus signatures and rules.
- High-performance and scalable solution proven in the most demanding email infrastructures.
FireEye Email Security
FireEye Security Suite
FireEye Security Suite is designed for organizations with 100-2000 users. It protects multiple attack vectors to break the chain of events that often leads to data loss and business disruption.
Security Suite features FireEye Network Security, NX Edition
Secure networks with the integrated Intrusion Prevention System (IPS) and detect advanced malicious network attacks such as zero-day attacks and signature-less malware. Multi-Vector Virtual Execution (MVX) Engine
Cloud MVX engine detonates suspicious artifacts that don't match signature-based indicators and disrupts advanced malicious network attacks. FireEye Email Security, Cloud Edition
Arrests the first line of attack by stopping viruses, spam, zero-day malware, advanced URL threats and low-volume, highly-targeted phishing attacks. Email Sender Impersonation Detection
Blocks malware-less impersonation attacks and protects organizations from hard to detect CEO fraud scams and financial loss. FireEye Endpoint Security, Essentials Edition
Last line of defense with an antivirus engine, behavioral analysis and machine-learning managed by a single unified agent. Endpoint Protection Against Signature-Free Vulnerability Exploits
Ability to assess and analyze endpoint behavior to reveal and block application exploits.
FireEye solutions included in the Security Suite
- Network Security: defend networks, data and users with today’s fastest, most reliable cyber-attack protection.
- Endpoint Security: proactively detect, prevent and analyze known and unknown threats on any endpoint.
- Email Security: proactively detect and stop all types ofemail-borne threats.
- FireEye Helix: simplify, integrate and automate security operations to stop threats faster.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.