Vendor Cofense

Cofense

Stop Phishing Attacks in Their Tracks.

For the malicious emails that still make it past the perimeter and  to the user inbox, our service is there to protect you.

 

Providing users with a one-click, cloud-based solution, to report suspicious emails to a team of on-demand email security experts, who analyse the content and inform the user if their email and its content is safe to open or if it should be immediately quarantined.

Engage and Empower your Employees

Proactively engage and empower your employees with a one-click solution to immediately report suspicious emails and remove the risk of users trying to determine if an email is or is not malicious.

Our on-demand experts inspect and analyse suspicious email and inform users if the content is safe to open or if it is malicious and should be quarantined. When malicious content is found, your security teams are notified about the ‘qualified’ phishing attempt and provided with the actionable intelligence they need to shut it down as well as help mitigate further phishing attempts.

By Actively engaging your workforce in reporting suspicious emails, combined with true-to-life simulation training, encourages good security practices and will help your business achieve the highest levels of malicious email identification and email security defence.

Defence and Response as a Service

Our innovative Phishing Defence and Response capability is provided as a service, alleviating the burden of ownership associated with products you have to buy, maintain and provide the staff to operate.

Human-Vetted Analysis

Our service will help your business significantly lower the risk posed by phishing attacks, as our experts take on the burden of identifying malicious emails for your workforce. Our human-vetted analysis provides the highest standards of malicious email identification and our service objectives ensure your business continuity is not impacted. 

  • Security Infrastructure 29% 29%
  • Data Governance 21% 21%
  • End Point Security 91% 91%

Overview

Many organisations facing the increasing volume and complexity of email phishing attacks today have insufficient visibility into those that successfully make it to the user inbox. This inevitably leaves businesses exposed to unnecessary risks as users take on the responsibility of determining if they should open an email or click its content.

Our experts then use a combination of technologies and human expertise to quickly and reliably establish which reported emails are malicious….ie if opening or clicking the content would likely lead to a system being compromised, information being disclosed, a breach of regulatory compliance or a violation of data export controls.

Each time a malicious email is discovered, we immediately contact the SOC or Incident Response team at our customer and provide all the details of the identified threat together with documented IOCs and recommended actions to remediate and quarantine.  Additionally, users receive email feedback to what they reported, thanking them and confirming the threat if they were correct in what they reported, or returning the email to them, as an attachment, if deemed safe to open.

%

of verified phish are found in environments using secure email gateways (SEGs)

More Information

Videos and Downloads

Contact Us

Like to talk? Send us a note and we’ll call or email you right back.

Request a demo

Like to see more?  Register here to request a demo.