Powered by Smartsupp

Email security

91% of cyber attacks start with a phishing email. So email security is one of the most important things that you need to care about.

FULL STACK EMAIL SECURITY

To protect users from Impersonation type email attacks like CEO Fraud or Business Email Compromise, Spam Titan provides a range of methods to customers on its Full Stack Email security service to counter these attacks.

  • Friendly Name filters to protect against social engineering impersonation attacks on mobile and desktop devices.
  • Protection against social engineering attacks like whaling, CEO fraud, business email compromise or W-2 fraud.
  • Instant action from the Spam Titan Threat Intelligence Network and Security Analyst teams
  • Protects against Newly Registered and Newly Observed Domains to catch the first email from a newly registered domain.
  • Protects against Display name spoofing and attacks targeting phones
  • Protects against “looks like” and “sounds like” versions of domain names
 

SHIELD YOUR BUSINESS FROM TARGETED EMAIL ATTACKS

EARLY THREAT DETECTION

We monitor and analyse traffic from around the world to identify abnormal or criminal elements. This threat intelligence allows us to prevent attacks before they reach your customer’s inbox.

CONTENT FILTERING

Emails are scanned for suspicious content and attachment types such as .pdf, .exe, .js, etc, that are often linked with malicious attacks. Content that appears to be dangerous or spam will be scored and either be quarantined or discarded, depending on its risk.

CONNECTION FILTERING

Our service uses a variety of tests and checks to rate each connection and identify if it seems authentic such as IP reputations, if the domain exists in DNS, domain SPF, and other custom filters.

IMPERSONATION DETECTION

Domain names, display names, message headers, and content, are all inspected for impersonation tactics, defending against impersonation attacks like CEO fraud.

ADVANCED URL DEFENCE

URLs, linked landing pages, and source code are extensively examined for credential harvesting, fake login pages, and other phishing indicators.