Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
Email Security has certainly come a long way. With cloud messaging now the standard versus the legacy on premise approach (Lotus Notes anyone?) the strategy of securing these clouds has also experienced a revolution.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
A huge problem plaguing the cybersecurity industry is lack of people and resources. Throughout my career I’ve never been in a position where I felt “Hey, I think I’ve got too many resources!” Especially as organizations look at the new post-COVID-19 world we all live in, talent and funding are at a premium. According to a recent (ISC)2 survey, COVID-19 forced (already time-strapped) cybersecurity workers off some or all of their typical security duties to assist with other IT-related tasks, and cybersecurity incidents have increased since the transition to remote work. As (ISC)2’s CEO noted in one interview, “We are outnumbered—the people that are doing bad things, whether it’s a nation-state type of activity or cybercrime—the good guys and gals were vastly outnumbered prior to the pandemic … It has a compounding effect to what was already a challenge…”
It is in that spirit that we at Area 1 Security recognized that our customer’s security operations would benefit from a new solution to the people problem. Enter: Horizon PhishGuard™. With Horizon PhishGuard, we give our customers and cybersecurity VARs and MSSPs dedicated resources from our own team of phishing experts to enhance Business Email Compromise (BEC) fraud response, deep dive email threat hunting, and overall automation of their email security.
What is Active BEC Fraud – and Who Can Prevent it?
Active fraud in progress must be dealt with swiftly and accurately. With Business Email Compromise (BEC), the mix of social engineering, exploitation of business processes and executives as lures creates additional challenges for security staff. Security teams are burdened with providing the proof that what looks like normal business processes are actually fraud attempts.
Imagine this scenario. After weeks of silently observing, an attacker hijacks a conversation between a trusted vendor and your finance team concerning a new CEO-backed business venture. The attacker attempts to divert funds to an attacker-controlled account.
In order to stop this sophisticated Type 3 BEC attack, you’ll need to 1) detect this attack in the first place, 2) confirm this is an actual malicious attack, and 3) provide enough forensic evidence to convince executives this isn’t a typical business transaction. Even without the time-sensitive nature, this in itself can be a laborious process for many security teams with overflowing to-do lists. It also shows how a trusted security partner can provide value and help expedite the process by providing preemptive fraud notification and packaged forensics as proof of an attack. This service frees up security investigation cycles, helps security teams report back to superiors, and gives customers time advantage over the attacker.
A True Customer Partnership
In my time as a CISO I came to rely heavily on my trusted security partners to enhance my team’s ability to perform mission critical protections. The only problem? I didn’t have anybody watching my email. Email being the prime target for most security incidents and breaches, I needed a large portion of my full time employees’ time dedicated to triaging email submissions from my end users. I didn’t have a large team, nor did I have the funding for additional FTEs to support the email analysis. Needless to say, I needed a program like Horizon PhishGuard.
I wasn’t the only one craving a program like PhishGuard. We at Area 1 Security have been talking with our customers about how to better serve them. All would agree that they needed extra eyes looking actively to defend against BEC and email-based financial fraud. As we built out our framework for PhishGuard, we focused on our main goal: true customer partnership.
We strive to be the trusted voice that our customers and cybersecurity VARs and MSSPs can go to when they need support. We want to establish meaningful partnerships with our customers and partners so they can all succeed in the fight against phish!
Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 14 years in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types
Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) THE biggest game in college basketball history, we are here to crown the 2022 March Hackness winner!
https://www.area1security.com/wp-content/uploads/2022/03/Champion-Banner_2.png10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-31 06:00:292022-04-28 08:49:23Area 1 Security Announces the Most Spoofed Brand of 2021
Area 1 Security’s Sixth Annual March Hackness: The Perfect Phishing Bracket is here! Learn who made the list of the top brands that attackers use in phishing lures.
https://www.area1security.com/wp-content/uploads/2022/03/SocialBanner_Blog_MarchHackness2021_2500x1000-Copy-2.jpg10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-26 20:45:192022-04-28 08:51:272022 March Hackness: The Return of the Phishing Bracket