olay müdahale özelliğini kullanın
Provide rapid intervention to the incidents
A solution product that helps the IT team prioritize and manage potentially malicious
e-mails reported by personnel. E-mail threats are quickly identified and intervened.
With Outlook Add-in, you can perform suspicious e-mail transactions on e-mail basis without the need for additional requirement.
- Detecting and deleting suspicious e-mail on basis of personnel
- The process of quarantining and removing suspicious e-mail
- Passive and active link address in suspicious e-mail
Detecting and deleting suspicious e-mail for all users with one click with exchange integration
Automated E-mail Analysis
Automatic analysis and tagging of e-mail threat with YARA rules.
- Header Analysis
- Body Analysis
- File Analysis
Providing automatic group from suspicious e-mail which includes same header, attached file, URL and sender address.
It provides you to automatically respond to events depending on the rules you create or independently.
- Create an action for all e-mails
- Create an action specifically for the tags
- Create a special action for e-mails that do not have tags
- Create manual action for using manual analysis
Personnel detects the suspicious e-mail with phishing simulation and education, so they help prevent vulnerability.
- Office 365
Include your personnel in security with Phishing Report Add-in.
Analysis of e-mail with Threat Intelligence Resources and Virus Total
Performing quick and easy analysis with the domain, IP, URL and hash information of suspicious e-mail in integrated intelligence resources