Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
Email Security has certainly come a long way. With cloud messaging now the standard versus the legacy on premise approach (Lotus Notes anyone?) the strategy of securing these clouds has also experienced a revolution.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
Will You Spend the Summer Pondering These Questions, Too?
According to a recent U.S. study, 83 percent of CEOs want employees to return in person now that the pandemic is waning … yet (to no surprise) only 10 percent of employees want to come back to the office full-time.
For many of us, this long holiday weekend marks the start of (much-needed) summer vacations, before we and our kids head “back to the grind” (apparently, minus remote learning!) this fall. But, this is also now a turning point where many of us are wondering: What exactly will be the workplace reality after the summer? Should / will our employees still be remote? Should we try “hybrid” schedules (and if so, how)? And — what are the cybersecurity implications of these “post-Covid” workplace decisions?
I don’t hear too many consistent answers to these questions when speaking to other security/IT professionals. And that tells me that although it’s time to get out our barbeque grills, we’ll all be hard at work the next few months tackling these big questions and their consequent security implications — together.
[Last Chance – Webinar] Apply Zero Trust to Digital Communications
If attackers are exploiting your partners’ vulnerabilities — yet you have little control or visibility over your partners’ security — how can you still effectively protect your organization? The answer lies in applying zero trust principles to all communications, across your organization’s entire network.
Join my colleagues, Area 1 co-founder/CTO, Phil Syme, and Sr. Product Manager, Kevin Wilson, today at 11am PT / 2pm Eastern, to learn about:
How your partner social graph results in increased risk surface area;
The role of email security in establishing a zero trust architecture; and
How to leverage email security to prevent targeted cyber attacks.
Register here to join us live for the webinar (or, for the on-demand recording).
Blog: What’s New in Area 1 Horizon?
We’re regularly releasing new features and functionality for customers. Being a cloud-native service, we’re uniquely positioned to deliver a constant release cycle, with nothing to tune or manually install.
To that end, I’m excited to announce these latest Area 1 Horizon features:
The industry’s FASTEST Message Retraction, with both automated and manual retraction in under 5 seconds
150+ signature and Machine Learning model enhancements
Administrator Portal Audit Log — view the who, what, when and where of actions taken within our platform
If you’re not currently an Area 1 customer, you can find out how to request your own custom, complimentary Phishing Risk Assessment (which also gives you full access to our product dashboard).
Microsoft researchers recently warned that attackers are using compromised email accounts to launch what looks like ransomware — but is, in fact, Java-based STRRAT malware.
This malware creates a backdoor into Windows systems to steal credentials and other personal information. Given the nature of the campaign, attackers could use the initially-infected systems to spread malware to more users via phishing.
This campaign is another reminder that — even if your users aren’t the initial victims of a cyber attack, you must close phishing gaps coming from your digital ecosystem.
Learn how to stop the seven types of phishing attacks that originate from compromised vendors and suppliers, here. (7 mins)
VP, Product at Area 1
With a career spanning 20 years fighting bad guys online, Shalabh leads all product and go-to-market functions at Area 1 Security, with extensive prior experience across security, enterprise, and cloud infrastructure companies such as Aspen Networks, IronPort Systems, Cisco and Bracket Computing. Shalabh and his teams have taken products from conception all the way to large scale businesses; and in the process have consistently helped make the Internet a safer place. An alumnus of Stanford University and the University of Texas at Austin, Shalabh holds five patents and can claim to know something about enterprise infrastructure and security.
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types
Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) THE biggest game in college basketball history, we are here to crown the 2022 March Hackness winner!
https://www.area1security.com/wp-content/uploads/2022/03/Champion-Banner_2.png10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-31 06:00:292022-04-28 08:49:23Area 1 Security Announces the Most Spoofed Brand of 2021
Area 1 Security’s Sixth Annual March Hackness: The Perfect Phishing Bracket is here! Learn who made the list of the top brands that attackers use in phishing lures.
https://www.area1security.com/wp-content/uploads/2022/03/SocialBanner_Blog_MarchHackness2021_2500x1000-Copy-2.jpg10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-26 20:45:192022-04-28 08:51:272022 March Hackness: The Return of the Phishing Bracket