Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
A cybersecurity analyst or engineer wakes up every morning, flips on their laptop, and defends others from attacks, responding at the speed of lightning to beat cyber villains, and with unmatched adaptability and agility stops cyber villains from getting into your inboxes and organizations – all while calling it just a normal day at the office.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
We love dead phish around here. And there’s an important related milestone coming up next week that absolutely deserves to be celebrated –June 18th is International Sushi Day.
While the exact origins are a bit murky, it’s widely believed that Sushi originated somewhere around the 2nd century BC in South East Asia. It first started as a method (known as Narezushi) for preserving and storing dead fish. Over the years, sushi evolved in its preparation and presentation to the beloved dish we know now. I am hoping all the sushi lovers will take the time to have a special treat on that day!
Speaking of dead fish, we are seeing legacy SEG players exiting the public markets at a rapid pace. Just this past week, FireEye announced it is selling its products business to Symphony Technology. A couple of months ago, Proofpoint was acquired by Thoma Bravo. Both of them joined the ranks of previous players like Forcepoint and Symantec who have already retreated.
There’s a pattern here and it isn’t a surprising one – modern threats and distributed architectures require a fundamentally new analytics-first, cloud-native approach to keep up with – something that the legacy players struggle to do mightily and consequently are forced to retrench in the face of these changes.
U.S Department of Justice Elevates Ransomware to Terrorism Status
“They went after our gas and they went after our hot dogs. No one is out of bounds here.” -Christopher Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, on recent ransomware attacks.
On June 3rd, the Department of Justice announced that it is increasing ransomware incidents to the same priority level as terrorism. This priority level is reserved for a very short list of specific national security cases and highlights the priority the administration is giving ransomware attacks.
We are assessing the entire impact of this guidance, and what it could mean to ongoing security operations of organizations all across – though a few things are certain – it specifically calls out adding much stronger controls to prevent Ransomware in the first place, and providing co-ordinated disclosures and notifications in the event a breach is discovered.
In just a few months, we’ve experienced large-scale ransomware attacks on Colonial Pipeline, JBS, and now Martha’s Vineyard ferry. And the impact is material to our ongoing lives. Colonial Pipeline paid nearly $5 million dollars in ransom (although some of it was subsequently recovered by the government), JBS had to shut down production amid rising food costs, and Martha’s Vineyard ferry business experienced disruption.
The elevated severity and focus on supply chain attacks and ransomware is another reminder that — even if your users aren’t the initial victims of a cyber-attack, you must close phishing gaps coming from your digital ecosystem.
Learn how to stop the seven types of phishing attacks that originate from compromised vendors and suppliers, here. (7 mins)
Make Your Voice Heard!
We are committed to improving our products and providing the best services for you!
PS: If you’re neutral or unhappy with us, I hope you’ll reply directly to this email and give us a chance to make it right before you leave your review — but that’s up to you!
Three Reasons to Upgrade to Area 1 for Better Email Security
Thoma Bravo announced its intention to acquire Proofpoint. The deal is not expected to close until the latter half of 2021, meanwhile,cyber-attacks are not slowing down.
Now is the time to re-evaluate and upgrade your email security.
Here are three reasons why upgrading to Area 1 means better email security.
Better Detection Efficacy -Area 1 Security provides superior detection, blocks 30% more attacks than legacy SEGs, and detects attacks 24 days before industry benchmarks
Cloud-Native Architecture -Area 1 Security’s cloud-native architecture provides agile security with faster ROI over other SEGs and improves email security TCO by 30%
Customer & 3rd Party Analyst Endorsements -Leading research and analyst firms agree that Area 1 provides superior security to SEGs. GigaOm Research rates Area 1 as a Leader and Outperformer in their Phishing Prevention and Detection Report and Gartner names Area 1 a Representative Vendor for Integrated Email Security Solutions.
With a career spanning 20 years fighting bad guys online, Shalabh leads all product and go-to-market functions at Area 1 Security, with extensive prior experience across security, enterprise, and cloud infrastructure companies such as Aspen Networks, IronPort Systems, Cisco and Bracket Computing. Shalabh and his teams have taken products from conception all the way to large scale businesses; and in the process have consistently helped make the Internet a safer place. An alumnus of Stanford University and the University of Texas at Austin, Shalabh holds five patents and can claim to know something about enterprise infrastructure and security.
Today is National Superhero Day, and we would like to dedicate this day to you—the SOC teams and the security experts on the frontline of the phish fight.
https://www.area1security.com/wp-content/uploads/2022/05/BlogBanner_PoTWSuperhero_2022MAY.png20845209Shalabh Mohanhttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngShalabh Mohan2022-04-28 13:51:312022-06-01 10:55:30Superhero strategies for the Phish Fight
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types