HackDig : Dig high-quality web security articles for hacker

The first spear phishing protection solution driven by real-world intelligence

2016-02-02 16:30
<p>Today we announced a new solution that I believe will transform how organizations counter spear phishing attacks. We call it <a href="https://www.phishlabs.com/t2-spear-phishing-protection/">T2 Spear Phishing Protection</a>, and it takes advantage of our deep insight into phishing attacks to prepare organizations for the real-world attacks they're most likely to be targeted with, and then mitigate those attacks before damage is done. To do this, it enlists employees in the defensive network and uses our 24/7 SOC to analyze and respond to threats. &nbsp;</p> <h3>Why did we launch T2 Spear Phishing Protection?</h3> <p>With the vast majority of data breaches being attributed to spear phishing attacks, it was&nbsp;clear to our team that organizations need a better way to fight back against these threats.&nbsp;Email filtering, anti-malware, and other security technologies have proven insufficient&nbsp;because, fundamentally, phishing&nbsp;is as much a social engineering problem&nbsp;as it is a technology problem. With our extensive experience investigating and stopping phishing attacks for many of the world's leading&nbsp;companies, we're very well-equipped to help organizations address both of those problems. That's why we launched T2 Spear Phishing Protection.</p> <h2>What is included in T2 Spear Phishing Protection?</h2> <p>&nbsp;<img alt="T2 Spear Phishing Protection" src="http://info.phishlabs.com/hubfs/blog-files/T2.jpg" style="width: 320px;" title="T2 Spear Phishing Protection" width="320"></p> <ul> <li><a href="https://www.phishlabs.com/t2-spear-phishing-protection/employee-defense-training/">T2 Employee Defense Training</a>, which conditions employees to spot and report phishing emails.</li> <li><a href="https://www.phishlabs.com/t2-spear-phishing-protection/analysis-and-mitigation/">T2 Analysis and Mitigation</a>, which provides analysis and response to reported threats by our 24/7 Security Operations Center.</li> <li><a href="https://www.phishlabs.com/t2-spear-phishing-protection/threat-intelligence/">T2 Threat Intelligence</a>, which provides an automated, machine-readable feed of targeted attack information gathered from across our client base and research operations.</li> </ul> <p>T2 Employee Defense Training and T2 Analysis and Mitigation services are available now. T2 Threat Intelligence will be released in early Q2.&nbsp;</p> <p>All of these services use our insight into the phishing landscape. For example, T2 Employee Defense Training uses simulation content that is based on the real-world phishing attacks we see targeting businesses. The services integrate tightly to provide comprehensive protection, but they can also be used separately with existing defenses organizations already have in place.</p> <h2>How does T2 Spear Phishing Protection help?</h2> <p>We determined that fighting back against spear phishing attacks would require a solution that starts by transforming people from security liabilities into security assets. It's not possible to remove the vulnerability to social engineering. Human beings are going to make&nbsp;mistakes. But what if when an employee does fall for a phishing email, the attack had already been&nbsp;reported by other employees that were also targeted? That changes the situation and allows for faster detection of phishing attacks that make it past security controls and into user inboxes.&nbsp;</p> <p>So, the first&nbsp;objective we set out to accomplish was to make it easy for organizations to condition their users to recognize and report phishing attacks -- effectively enlisting them in their defensive network.&nbsp;With T2 Employee Defense Training, we provide a fully-managed phishing simulation and training service that helps organizations do that.&nbsp;</p> <p>But what happens after employees report attacks? Those reports aren't going to analyze themselves, and the last thing most organizations want is a new influx of tickets for their IT helpdesk. And it doesn't do any good if those reports sit in a queue and never undergo quality analysis. That's where T2 Analysis and Mitigation comes into play, providing a robust&nbsp;process and team of experts proficient at analyzing phishing attacks. Our Security Operations Center&nbsp;actively mitigates more than 6,000 phishing attacks every month. Investigating and responding to phishing attacks is right in their wheelhouse.&nbsp;</p> <p>The intelligence we gather through investigating and shutting down attack infrastructure adds value as well. T2 Threat Intelligence provides this information in an automated, machine-readable feed so that it can be readily integrated into security controls and analytics platforms. This allows organizations to block attacks more proactively and improve their resiliency against targeted threats.&nbsp;</p> <p>T2 Spear Phishing Protection makes it possible for organizations to deploy these capabilities quickly and truly transform their security posture against spear phishing attacks.&nbsp;</p> <p>&nbsp;</p> <img src="http://track.hubspot.com/__ptq.gif?a=326665&amp;k=14&amp;r=http%3A%2F%2Fblog.phishlabs.com%2Fthe-first-spear-phishing-protection-solution-driven-by-real-world-intelligence&amp;bu=http%253A%252F%252Fblog.phishlabs.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important">


Source: gilletni-dlrow-laer-yb-nevird-noitulos-noitcetorp-gnihsihp-raeps-tsrif-eht/moc.sbalhsihp.golb

“The first spear phishing protection solution driven by real-world intelligence”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud