Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
A cybersecurity analyst or engineer wakes up every morning, flips on their laptop, and defends others from attacks, responding at the speed of lightning to beat cyber villains, and with unmatched adaptability and agility stops cyber villains from getting into your inboxes and organizations – all while calling it just a normal day at the office.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
Hello again, Area 1 family! Your friendly neighborhood Email Security Product team is here with another installment of the Area 1 Product Update blog. We’re halfway through the year! Where does the time go, am I right?
Since our last update, our amazing engineers have been cranking out some awesome features and improvements. We’re extremely proud of everything we have accomplished and hope you feel the same way!
We wanted to give you a glimpse of what our future looks like. The key word I would use to describe it would be visibility. We want to ensure our customers have the best possible view of their data. With that being said…
On to the updates!
First up, we’re so excited to share with you a highly-anticipated and advanced jump forward for usability. With our new Enhanced Detection Context, our users can now see WAY more context in a detection. We see this not only as an overall usability improvement, but a gateway into enhancing our customer’s overall security mindset.
These newfound insights can help our more advanced customers by showcasing new information but still giving them the ability to grab the deep rich detail from the original email and metadata.
Enhanced Detection Context also gives more junior analysts the ability to learn why an email is malicious and help train them to be better tuned into looking for patterns and malicious markers throughout their day.
After all, what do you buy a tool for? Confidence in its ability to solve your problem! That’s what we’re doing with Enhanced Detection Context. We’re taking our commitment of accountability seriously, that’s why you now see what we see — exact reasons and specific threats that triggered a malicious detection, all at-a-glance. This gives you the confidence to know that when we make a determination on an email, you know we mean it.
Stay tuned for additional enhancements to our context over the coming weeks.
Next up, introducing the BULK disposition! We’ve taken a giant leap forward in identifying the ever elusive “gray mail” in our customer environment. With BULK, we can now allow our customer administrators to have even more granular control over what makes it to the end user’s inbox.
Think of a scenario where that annoying newsletter you swear you never signed up for with an unsubscribe link buried at the bottom in a statement about how important it is to never unsubscribe! That’s the mail we’re after with the BULK disposition.
We’re also excited to announce that the Disposition Hierarchy has been updated to no longer require dependant dispositions when selecting what you want to quarantine. Now administrators can freely select exactly which disposition they want to see quarantined and nothing more.
With the release of Post Delivery Response (PDR) our customers are further protected from an attack. With PDR, customers can automatically retract messages that may have been delivered as a benign message but have since had a disposition change to malicious based on new information. That new information could be anything from a user submitted phishing attack or a benign link within an email that has now been weaponized post delivery.
This added layer of protection ensures that our customers are always protected when it comes to their inboxes.
Speaking of always protected…
Our PhishGuard customers can now view all of their reporting directly from the Horizon portal. Under the PhishGuard tab, you’ll find a new “Reports” tab. This is where new reports and findings will be populated as they happen. Previous reports will also live here for historical viewing.
Additional Horizon Features Released:
Admin Quarantine Update: We’ve also released a backend feature that gives our customers the ability to release an email from Admin Quarantine in its original form. No more sending zip files to the end user!
API Update: Our API is now fully accessible so end users no longer need to whitelist their IP space within Horizon!
As usual, if you have any questions or need assistance with any of the new features that we’ve talked about today, reach out to your account team at [email protected].
Additional Area 1 Fun Stuff
As always, if you have any cool ideas or features you’d like to see that we should know about, please reach out to your Area 1 account team. Let your voice be heard! After all, we normally make roughly 400 product updates each quarter — and customers are the most important voice in our Product team. As always, thank you all for your ideas and feedback!
Until next time,
The Area 1 Product Team
Senior Product Manager at Area 1
Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 14 years in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.
Today is National Superhero Day, and we would like to dedicate this day to you—the SOC teams and the security experts on the frontline of the phish fight.
https://www.area1security.com/wp-content/uploads/2022/05/BlogBanner_PoTWSuperhero_2022MAY.png20845209Shalabh Mohanhttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngShalabh Mohan2022-04-28 13:51:312022-06-01 10:55:30Superhero strategies for the Phish Fight
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types