Cloud

6/25/2018
10:30 AM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Vade Secure Launches Native, AI-Based Email Security Add-On for Office 365

Solution designed to protect against phishing, spearphishing and malware; provides Microsoft partners with a solution for Office 365 clients.

SAN FRANCISCO, CALIF. - June 21, 2018 - Today, Vade Secure, the global leader in predictive email defense, announced a new offering for Office 365 customers looking to enhance protection against advanced phishing, spear phishing, and malware attacks. Vade Secure for Office 365 is the only email security solution that’s fully integrated into Office 365, offering a native user experience and best-in-class filtering accuracy powered by artificial intelligence.

Value-Added Cloud Service for Microsoft Partners and MSPs

Vade Secure for Office 365 is closely aligned with Microsoft’s partner-first, cloud-first strategy. Built from the ground up with a cloud-native, API-based architecture, the new offering natively integrates with Office 365 and runs on Microsoft Azure, providing Microsoft Partners, Cloud Solution Providers (CSPs), and Managed Service Providers (MSPs) with a complementary, high-margin solution for their Office 365 customers.

“As one of the largest global Microsoft CSPs, Crayon is at the forefront of helping clients realize the benefits of Microsoft Office 365. At the same time, we recognize that Office 365’s dominant market share has made it a popular target for cybercriminals,” said Nabil Chebbi, Vice President Cloud Sales and Marketing Enablement, Crayon Group. “We’re impressed with Vade Secure’s track record of blocking advanced threats, and we’re excited to add their solution for Office 365 to our portfolio so that we can offer our clients an easy, transparent, and effective way to enhance their email protection.”

Fully API-Based for a Native Office 365 User Experience

Gartner estimates that by 2020, 50 percent of Office 365 clients will use third-party security solutions. Many traditional email security products are based on legacy gateway architectures that render certain Office 365 security features ineffective, but Vade Secure’s new, API-based solution integrates seamlessly with Office 365, allowing organizations to augment native Office 365 security features, rather than displace them.

Specific benefits of Vade Secure’s API-based architecture include:

  • Ease of deployment: With a few clicks, admins can authorize Vade Secure to access their email flow and configure their filtering policies—no MX record changes required.
  • Native user experience: The solution is fully transparent, allowing end users to continue using the familiar Office 365 interface, without a separate quarantine.
  • Insider threat protection: Vade Secure scans internal messages sent between employees to protect against attacks originating within the organization.

Predictive Defense Powered by Artificial Intelligence

Vade Secure for Office 365 blocks advanced attacks from the first email using machine learning models that perform real-time behavioral analysis of the entire email, including any URLs and attachments. Vade Secure leverages data from more than 500 million inboxes around the world to feed its machine learning models and ensure a best-in-class catch rate.

Specific AI and machine learning benefits include:

  • Anti-phishing: Vade Secure crawls suspicious URLs and pages in real time, following any redirections to determine whether the final page is fraudulent. The solution performs this analysis both when the message is received and any time a user clicks.
  • Anti-spear phishing: Vade Secure builds an anonymous profile that establishes employees’ normal communication patterns. Upon detecting spoofing attempts, a fully customizable banner is displayed within the email alerting the user.
  • Anti-malware and ransomware: Going beyond simply scanning attachments, machine learning algorithms perform a comprehensive analysis of the origin, content, and context of emails and their attachments to block unknown, polymorphic malware.

“Hackers are increasingly targeting Office 365 users with email-based attacks as an entry point to exploit data, files, and contacts from other Office 365 apps,” said Adrien Gendre, Chief Solution Architect, Vade Secure. “While native Office 365 security catches most spam and known threats, many organizations are strengthening their defenses with a layered approach. Vade Secure for Office 365 complements tools like Exchange Online Protection, leveraging artificial intelligence to block advanced phishing, spear phishing, and malware attacks.”

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-9574
PUBLISHED: 2018-07-19
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
CVE-2017-2673
PUBLISHED: 2018-07-19
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
CVE-2017-7481
PUBLISHED: 2018-07-19
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templati...
CVE-2018-12911
PUBLISHED: 2018-07-19
WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.
CVE-2018-14404
PUBLISHED: 2018-07-19
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulne...