Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to protect email servers, gateways, and clients from threats such as network intrusion, social engineering, and data loss. - Encrypt and authenticate email traffic - Protect against messages from fraudulent sources (spoofing), unsolicited bulk messages (spam), and attempts to solicit privileged information (phishing) - Prevent the transmission of data by type, origin, or destination - Disable embedded malware and URL links
255 results
The Abnormal cloud-native email security platform utilizes behavioral AI to identify and stop never-before-seen attacks that evade traditional security tools. Where legacy email security solutions rely on rules and policies to identify attacks, Abnormal delivers a fundamentally-different approach that precisely detects and then automatically remediates email threats. Abnormal integrates with Microsoft 365 or Google Workspace via API and starts working immediately to develop an organizational baseline of known-good behavior. Incoming messages that deviate from the baseline are remediated within milliseconds to ensure end users cannot open or engage with them. Eliminating all the difficulties of deploying email security, the Abnormal solution integrates in minutes, does not interrupt email flow, and uncovers the full spectrum of attacks. Add-ons to the inbound email security product automate security operations, detect account takeovers, and increase employee productivity.
Proton Mail is the world's largest secure email service, developed by CERN and MIT scientists. We are open source and protected by Swiss privacy law. As a privacy-focused email service, Proton Mail uses end-to-end encryption, and offers full support for PGP and standalone email clients via Proton Mail Bridge. It offers a Gmail-like user interface, secure compatibility with other email providers, and does not track its users. Namely, Proton Mail cannot read the content of any of its users' emails stored encrypted on our servers (this applies to attachments too).
Email and collaboration tools are indispensable for effective business communication, facilitating streamlined interaction among teams, partners, and customers. However, these tools are also prime targets for cybercriminals. The increasing sophistication of BEC and phishing schemes (often leading to account takeover), brand impersonation tactics, and malware attacks pose a constant threat to organizations of all sizes. To combat these evolving threats, businesses must adopt robust email security solutions that not only shield against attacks but also dynamically adapt to mitigate the human errors that often give hackers an open door. That’s where Mimecast comes in. Its threat protection solutions ensure your business collaboration remains secure against even the most advanced attacks, allowing you to focus on what matters most: growing your business.
Security Posture Management improves the risk posture of cloud email environments by helping security teams understand and take action on configuration gaps. No painful manual efforts, spreadsheets, or PowerShell scripts are needed to perform discovery and mitigate risk. Abnormal automatically increases your risk visibility by building behavioral profiles of the applications, people, and tenants connected to your cloud email environment. Armed with this knowledge, the platform monitors them for high-risk configuration drifts, including privilege escalations, new third-party apps, and conditional access policy exceptions.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Traditional approaches to managing user-reported phishing emails are highly manual, lack intelligence, and provide limited context. As a result, IT teams and security analysts waste time in a cumbersome and inefficient workflow, missing higher-impact attacks. The AI Security Mailbox add-on to Abnormal Inbound Email Security completely automates your user-reported email workflow and frees up analyst time. In fact, customers have experienced an 80% reduction in time spent reviewing user-reported emails and SOC analysts save 4,900 hours annually.
Sublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control. The open platform allows security teams to have transparency and flexibility in their email environment to spend less time on email-originated incidents. Advanced teams can customize detections, threat hunt, extend Sublime into their SIEM or SOAR, and collaborate with other teams.