Filter Results By:
Products
Applications
Manufacturers
-
product
Automatic Phishing Mitigation Module
IronTraps
Phishing Forensics, automatically executed by IronScales servers upon reports of suspicious email, includes analysis of the number and skill ranking of the responders, Multi AV, Sandbox Scan, and other proprietary analyses which determine the mitigation response.Automatic Mitigation Response at the Gateway and Endpoints may consist of enterprise-wide quarantine, disabling of links and attachments, removal of email etc., as pre-configured by the SOC team.Intrusion Signature is generated with each attack to the endpoints and to the SIEM.Optional 1-Click Response An immediate directive triggered manually by the SOC team to the IronScales servers.
-
product
Email Phising & Malicious attachments Online Analyzer
φhishXposed
PhishXposed is an online service that analyzes suspicious Emails and facilitates thequick detection of phishing emails and malicious attachments.
-
product
Email Security Solution
Email Trust Platform
Agari's Email Trust Platform, deployed by Fortune 1000 companies and government agencies, is the only solution that effectively stops phishing by identifying the true sender of emails. Agari's proprietary analytics engine and email telemetry network provides unparalleled visibility into more than 10 billion email messages per day across 3 billion mailboxes. This insight drives the company's Trust Analytics machine learning engine, which uniquely enables enterprises to stop phishing attacks against their employees and customers.
-
product
Security Education Platform
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.
-
product
IP and Website Tracer
Visual IP Trace
Trace an IP address or web site back to its origin/location. There can be many reasons why anyone would want to trace an IP address or web site, everything from verifying a web sites location to avoid any potential phishing attempts, to verify a customers order, tracking a potential hack attempt and so on.
-
product
Social Engineering With Physical & Logical Attack
LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls.