Waltham, MA – February 27, 2019 – GreatHorn, provider of the industry’s most advanced email threat protection platform, today announced the capability to analyze and assess the authenticity of Office 365 and G Suite login pages embedded in emails received by users. The new release further protects GreatHorn users from the range of Microsoft / Google credential theft attacks that have increased in volume and sophistication over the past year. Released as a new capability within the Link Protection capabilities of the company’s flagship platform, GreatHorn Email Security and its new functionality will be demoed at Booth #4200 during the RSA Conference 2019.
By incorporating advanced computer vision into its threat protection platform, GreatHorn is continuing to lead innovation in the email security market, using vision-based credential theft recognition to identify malicious sites based on their intent to steal usernames and passwords. Unlike other platforms that rely heavily on blacklists and threat intelligence to protect against these attacks, GreatHorn identifies and blocks zero-day credential theft threats immediately, safeguarding against account takeover and confidential information theft attacks.
Verizon’s 2018 Data Breach Investigations Report shows that cybercriminals place a heavy emphasis on stealing credentials because it gives them unmitigated access to users’ email accounts, critical data, logins to other sites, and personally identifiable information (PII) that can be used to launch further cyberattacks. A common tactic to steal credentials is for cybercriminals to impersonate alerts from enterprise cloud platforms like Microsoft Office 365 and Google G Suite to get workers to “log in” to a malicious domain. If an enterprise user were to click on a suspicious link, GreatHorn will analyze the site to determine whether the login page is legitimate or not. Focused initially on detecting fake Office 365 and G Suite login pages, GreatHorn’s advanced vision detection will quickly expand to other high-value cloud applications and services such as Salesforce.com, cloud platforms such as Microsoft Azure and Amazon Web Services, and document sharing sites such as Dropbox.
“GreatHorn is committed to ensuring email can be once again a trusted medium for doing business,” said Kevin O’Brien, CEO and co-founder of GreatHorn. “Account takeover attacks have become commonplace, and we’ve repeatedly seen the damage they can do to a business. The first step to protecting against such attacks is identifying and blocking credential phishing attacks as they happen. Our advanced computer vision research can recognize such attempts and combine it with our other proprietary detection techniques to give enterprises a clearer understanding of whether the destination site is authentic.”
GreatHorn’s email security platform protects organizations from email threats by identifying advanced attacks more quickly and accurately than any other platform. These innovative detection techniques are employed at every point of vulnerability to block delivery, caution users against engagement, protecting against malicious links, and speeding incident response. Rather than relying on traditional binary email security methods, the platform combines multiple sources of threat intelligence – both third-party and proprietary – with adaptive threat analytics based on an organization’s unique communication patterns to enforce automated threat identification and remediation policies. This method has proven effective in identifying modern payload-free attacks, including credential phishing attacks.
More information about GreatHorn’s use of advanced computer vision can be found on our blog at: www.greathorn.com/computer-vision-blog
Businesses interested in protecting their Office 365 and Google G Suite environments with GreatHorn Email Security can either stop by booth #4200 at the RSA Conference 2019 or sign up for a demo here: https://www.greathorn.com/demo/.
About GreatHorn
GreatHorn protects organizations from more advanced threats than any other email security platform. By combining its highly sophisticated threat detection engine with accessible user context tools and integrated incident response capabilities, GreatHorn Email Security shields businesses from both sophisticated phishing attacks and fast-moving zero-day threats, freeing security teams from the tedium of email security management while enabling them to respond to genuine threats faster than ever before.
By combining deep relationship analytics with continuously evolving user and organizational profiling, GreatHorn’s cloud-native email security platform provides adaptive, anomaly-based threat detection that secures email from malware, ransomware, executive impersonations, credential theft attempts, business services spoofing, and other social engineering-based phishing attacks. More information is available at www.greathorn.com.