Software security company Menlo Security has introduced a new phishing prevention solution to stop e-mail threats including malicious links, credential theft and weaponised attachments.
According to the company, current e-mail security approaches, utilising "good versus bad" schemes to detect phishing and embedded malware, fail to stop targeted threats that can compromise thousands of users for weeks or even months before being recognised and removed.
The solution eliminates credential theft and drive-by exploits caused by e-mail attacks, says Greg Maudsley, senior director, product marketing at Menlo Security in a blog.
By integrating cloud-based phishing isolation with existing mail server infrastructure such as Exchange, Gmail, and Office 365, all e-mail links can be transformed to pass through the Menlo Security Isolation Platform, he adds.
Existing security products simply fail to detect every malicious link and cannot protect every individual, says Menlo Security.
Poornima DeBolle, co-founder and chief product officer at Menlo Security, says e-mail persists as the top malware infection vector for enterprises, resulting in many forms of theft and fraud.
Menlo Security says the vast majority of enterprise cyber security attacks begin through targeted e-mail phishing attacks.
These attacks spread easily from user end points to infect enterprise systems with malware that is subsequently leveraged to steal credentials, intellectual property and customer data, it says.
These high level breaches result in costs to the enterprise that range from millions to even billions of dollars in damages and tarnished reputation, says Menlo Security.
Mimecast says every 24 hours 156 million scam e-mails are sent - targeting individuals and businesses. It says 91% of all hacking begins with an e-mail-based phishing or spear-phishing attack.
Today's security products effectively address application and access security, but traditional e-mail and Web security products are only addressing a fraction of the 85%, says Maudsley.
This is due, in large part, to the difficulty in detecting and preventing targeted spear phishing attacks, says Maudsley.
Share