Clients are increasingly dissatisfied with the native defense capabilities of Microsoft 365, as they are slow in detection and unable to prevent more advanced attack techniques. Advanced Email Security ensures all email-borne threats are blocked in seconds.
< 30 sec
Detection of malicious URLs
Detection of zero-days
Prevention of APTs
Incident response services
Protect clients’ collaboration apps, increasingly exploited in attacks with prioritized patching and exploit prevention. Leverage Acronis Cyber Protect Cloud, integrating backup and disaster recovery, next-generation anti-malware, and cyber protection management.
Advanced Email Security, powered by Perception Point, helps prevent all email-borne threats, including spam, phishing, BEC and impersonation attempts, malware, APTs, and zero-days before reaching end-users with multiple protection layers.
The anti-spam engines act as the first line of defense, applying anti-spam and reputation-based filters, including IP reputation checks, to email upon being received to block malicious or unwanted communication.
Then all emails are recursively unpacked into smaller, individual components like URLs and files by the anti-evasion technology. This process detects malicious embedded or hidden content. The URLs and files are separately run in multiple versions and patterns through the subsequent security layers to catch any hidden threats.
Advanced Email Security leverages powerful threat intelligence from six marketing leading sources combined with Perception Point’s technology that scans URLs and files in the wild to stay ahead of emerging threats.
The anti-phishing engines apply URL reputation filtering from four market-leading sources combined with a unique image recognition technology that detects unknown, malicious URLs based on logos and images used on the webpage.
To catch payload-less attacks (BEC), such as impersonation attempts, look-alike domains, and display-name deceptions, Advanced Email Security leverages machine learning algorithms with IP reputation, sender policy framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-Based Message Authentication Reporting and Conformance (DMARC) record checks.
Known malware is stopped with the help of best-in-class signature-based detection technologies, specifically developed to prevent email-borne threats, that act as another layer of protection on top of users’ local anti-malware solution.
The last line of defense is the next-generation dynamic scanning that prevents advanced threats that evade conventional defenses such as zero-days and APTs. The unique, CPU-level technology acts earlier in the kill chain than any other solution to block attacks at the exploit phase by analyzing the applications’ execution flow during runtime to identify deviations from standard flow based on the assembly code.
Moreover, service providers have access to a dashboard that provides a holistic view of the threat landscape across organizations with forensics data for each email, proactive insights on threats seen in the wild, and analysis of any file or URL on which the service delivery team needs forensics.
With the incident response service, you also gain access to cyber analysts that monitor all customer traffic and malicious intent with ongoing reporting and ongoing support, including handling false positives, remediating, and releasing when required.
If you choose to migrate to Advanced Email Security from another solution, the process of upgrading your services is as seamless as possible. Advanced Email Security is an API-based email security technology that integrates directly into the email system without the need for any additional configuration, including configuring MX records.
If you already use Acronis Cyber Protect Cloud, implementing Advanced Email Security happens with the flip of a switch.
Due to the unmatched detection speed, which is up to a few seconds, compared to seven to 20 minutes for legacy sandboxing solutions, all emails are scanned before delivery to end users with near-zero delays to ensure proactive protection without disrupting every day business process.