Cloud

6/25/2018
10:30 AM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Vade Secure Launches Native, AI-Based Email Security Add-On for Office 365

Solution designed to protect against phishing, spearphishing and malware; provides Microsoft partners with a solution for Office 365 clients.

SAN FRANCISCO, CALIF. - June 21, 2018 - Today, Vade Secure, the global leader in predictive email defense, announced a new offering for Office 365 customers looking to enhance protection against advanced phishing, spear phishing, and malware attacks. Vade Secure for Office 365 is the only email security solution that’s fully integrated into Office 365, offering a native user experience and best-in-class filtering accuracy powered by artificial intelligence.

Value-Added Cloud Service for Microsoft Partners and MSPs

Vade Secure for Office 365 is closely aligned with Microsoft’s partner-first, cloud-first strategy. Built from the ground up with a cloud-native, API-based architecture, the new offering natively integrates with Office 365 and runs on Microsoft Azure, providing Microsoft Partners, Cloud Solution Providers (CSPs), and Managed Service Providers (MSPs) with a complementary, high-margin solution for their Office 365 customers.

“As one of the largest global Microsoft CSPs, Crayon is at the forefront of helping clients realize the benefits of Microsoft Office 365. At the same time, we recognize that Office 365’s dominant market share has made it a popular target for cybercriminals,” said Nabil Chebbi, Vice President Cloud Sales and Marketing Enablement, Crayon Group. “We’re impressed with Vade Secure’s track record of blocking advanced threats, and we’re excited to add their solution for Office 365 to our portfolio so that we can offer our clients an easy, transparent, and effective way to enhance their email protection.”

Fully API-Based for a Native Office 365 User Experience

Gartner estimates that by 2020, 50 percent of Office 365 clients will use third-party security solutions. Many traditional email security products are based on legacy gateway architectures that render certain Office 365 security features ineffective, but Vade Secure’s new, API-based solution integrates seamlessly with Office 365, allowing organizations to augment native Office 365 security features, rather than displace them.

Specific benefits of Vade Secure’s API-based architecture include:

  • Ease of deployment: With a few clicks, admins can authorize Vade Secure to access their email flow and configure their filtering policies—no MX record changes required.
  • Native user experience: The solution is fully transparent, allowing end users to continue using the familiar Office 365 interface, without a separate quarantine.
  • Insider threat protection: Vade Secure scans internal messages sent between employees to protect against attacks originating within the organization.

Predictive Defense Powered by Artificial Intelligence

Vade Secure for Office 365 blocks advanced attacks from the first email using machine learning models that perform real-time behavioral analysis of the entire email, including any URLs and attachments. Vade Secure leverages data from more than 500 million inboxes around the world to feed its machine learning models and ensure a best-in-class catch rate.

Specific AI and machine learning benefits include:

  • Anti-phishing: Vade Secure crawls suspicious URLs and pages in real time, following any redirections to determine whether the final page is fraudulent. The solution performs this analysis both when the message is received and any time a user clicks.
  • Anti-spear phishing: Vade Secure builds an anonymous profile that establishes employees’ normal communication patterns. Upon detecting spoofing attempts, a fully customizable banner is displayed within the email alerting the user.
  • Anti-malware and ransomware: Going beyond simply scanning attachments, machine learning algorithms perform a comprehensive analysis of the origin, content, and context of emails and their attachments to block unknown, polymorphic malware.

“Hackers are increasingly targeting Office 365 users with email-based attacks as an entry point to exploit data, files, and contacts from other Office 365 apps,” said Adrien Gendre, Chief Solution Architect, Vade Secure. “While native Office 365 security catches most spam and known threats, many organizations are strengthening their defenses with a layered approach. Vade Secure for Office 365 complements tools like Exchange Online Protection, leveraging artificial intelligence to block advanced phishing, spear phishing, and malware attacks.”

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11763
PUBLISHED: 2018-09-25
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
CVE-2018-14634
PUBLISHED: 2018-09-25
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerabl...
CVE-2018-1664
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 echoing of AMP management interface authorization headers exposes login credentials in browser cache. ...
CVE-2018-1669
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 are vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote atta...
CVE-2018-1539
PUBLISHED: 2018-09-25
IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 could allow remote attackers to bypass authentication via a direct request or forced browsing to a page other than URL intended. IBM X-Force ID: 142561.