Connect with us

Hi, what are you looking for?

HEADLINES

Menlo Security launches email phishing isolation to target total elimination of malware infection, credential loss

Menlo Security, a pioneer of cloud-based security isolation technology, announced a new phishing prevention solution expanding the Menlo Security Isolation Platform (MSIP) to stop email threats including malicious links, credential theft and weaponized attachments.

Menlo Security, a pioneer of cloud-based security isolation technology, announced a new phishing prevention solution expanding the Menlo Security Isolation Platform (MSIP) to stop email threats including malicious links, credential theft and weaponized attachments. 

menlo

Majority of enterprise cybersecurity attacks begin through targeted email phishing attacks. These attacks spread from user end points to infect enterprise systems with malware that is subsequently leveraged to steal credentials, intellectual property and customer data. These breaches result in costs to the enterprise that range from millions to even billions of dollars in damages and tarnished reputation.

Current email security approaches, utilizing “good vs. bad” schemes to detect phishing and embedded malware, fail to stop targeted threats that can compromise thousands of users for weeks or even months before being recognized and removed. Existing security products simply fail to detect every malicious link and cannot protect every individual.

Further exacerbating this problem, legacy security solutions generate frequent incident alerts, requiring security professionals to continuously rule out false positives, resulting in severe strain on over-worked and understaffed cyber security teams.  

Advertisement. Scroll to continue reading.

The Menlo Security Phishing Isolation solution was developed in collaboration with Fortune 500 customers, to specifically address prevention shortfalls in existing secure email gateway products.

Available either on-premises, as-a-service via the cloud, or as part of a managed security service,  the solution scales to address the needs of both large enterprise and smaller companies looking to eliminate phishing risk from their environments.

Menlo Security Phishing Isolation is integrated with existing email infrastructure including Exchange, Gmail and Office 365. By leveraging patented Adaptive Clientless Rendering (ACR) technologies, the solution enables enterprise-wide deployment of isolation security without the need to deploy or manage endpoint software, reducing risks without impacting the user experience.

The MSIP Phishing Isolation solution makes it safe for users to click on email links and attachments without the risk of infection from malware exploits. With this unique approach, users can safely view sites with input-field restrictions that eliminate credential theft, while providing configurable messages that enhance corporate phishing awareness training.

“Email persists as the top malware infection vector for enterprises, resulting in many forms of theft and fraud,” said Poornima DeBolle, co-founder and chief product officer of Menlo Security. “Adding phishing Isolation capabilities to the MSIP creates the only phishing prevention solution that completely eliminates targeted spear-phishing attacks and drive-by exploits by isolating all email links and attachments. By stopping this top infection vector, Menlo enables CISOs to report definitive progress against malware attacks to their boards of directors, while also freeing up precious cyber security incident-response resources within their teams.”

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement