View

Sorting

Products found: 1

logo
Offer a reference bonus
1.00

The Email Laundry Full Stack Email Security

Impersonation Detection To protect users from Impersonation type email attacks like CEO Fraud or Business Email Compromise The Email Laundry provides a range of methods to customers on its Full Stack Email security service to counter these attacks.
  • Friendly Name filters to protect against social engineering impersonation attacks on mobile and desktop devices.
  • Protection against social engineering attacks like whaling, CEO fraud, business email compromise or W-2 fraud.
  • Instant action from The Email Laundry Threat Intelligence Network and Security Analyst teams
  • Protects against Newly Registered and Newly Observed Domains to catch the first email from a newly registered domain.
  • Protects against Display name spoofing and attacks targeting phones
  • Protects against “looks like” and “sounds like” versions of domain names
Threat IntelligenceUsing our unique combination of in-house developed tools like real-time blacklists, AS rankings, passive DNS, and more; stop ransomware, phishing, and other dangerous attacks before they reach your company. Connection Filtering Our service uses a variety of tests and checks to rate each connection and identify if it seems authentic such as IP reputations, if the domain exists in DNS, domain SPF, and other custom filters. Content Filtering Emails are scanned for suspicious content and attachment types such as .pdf, .exe, .js, etc, that are often linked with malicious attacks. Content that appears to be dangerous or spam will be scored and either be quarantined or discarded, depending on its risk. Multi-layered Encryption To ensure complete protection, we use multiple layers of encryption to secure our clients, including opportunistic TLS encryption. We also offer PDF encryption and secure portal encryption as additional services for users who require them. Security Policies We supply default cyber security policies, DLP policies, and other important corporate security policies, as well as allow companies to add and edit security policies specific to their company and/or users. Shared Security Feeds These feeds help us to identify what potential harms are being sent at that moment and allow us to adjust our systems to better protect our clients from reported malicious email attacks.
... Learn more
-
ROI-
-
14
13

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.