Filter Results By:

Products

Applications

Manufacturers

Showing results: 1 - 6 of 6 items found.

  • Automatic Phishing Mitigation Module

    IronTraps - IronScales

    Phishing Forensics, automatically executed by IronScales servers upon reports of suspicious email, includes analysis of the number and skill ranking of the responders, Multi AV, Sandbox Scan, and other proprietary analyses which determine the mitigation response.Automatic Mitigation Response at the Gateway and Endpoints may consist of enterprise-wide quarantine, disabling of links and attachments, removal of email etc., as pre-configured by the SOC team.Intrusion Signature is generated with each attack to the endpoints and to the SIEM.Optional 1-Click Response An immediate directive triggered manually by the SOC team to the IronScales servers.

  • Email Phising & Malicious attachments Online Analyzer

    φhishXposed - CyberHat

    PhishXposed is an online service that analyzes suspicious Emails and facilitates thequick detection of phishing emails and malicious attachments.

  • Email Security Solution

    Email Trust Platform - Agari

    Agari's Email Trust Platform, deployed by Fortune 1000 companies and government agencies, is the only solution that effectively stops phishing by identifying the true sender of emails. Agari's proprietary analytics engine and email telemetry network provides unparalleled visibility into more than 10 billion email messages per day across 3 billion mailboxes. This insight drives the company's Trust Analytics machine learning engine, which uniquely enables enterprises to stop phishing attacks against their employees and customers.

  • Security Education Platform

    Wombat Security Technologies

    Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.

  • IP and Website Tracer

    Visual IP Trace - Visualware, Inc.

    Trace an IP address or web site back to its origin/location. There can be many reasons why anyone would want to trace an IP address or web site, everything from verifying a web sites location to avoid any potential phishing attempts, to verify a customers order, tracking a potential hack attempt and so on.

  • Social Engineering With Physical & Logical Attack

    LGMS

    LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls.

Get Help