Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/7/2020
02:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cofense Introduces Phishing Detection and Response (PDR) Platform

LEESBURG, Va.-- Cofense®, the global leader in intelligent phishing defense solutions, today introduced its Phishing Detection and Response (PDR) platform, a solution designed specifically for enterprise organizations. As phishing attacks continue to become more sophisticated, persistent, and adapt to legacy security defenses, demand for end-to-end phishing defense solutions is at an all-time high. The Cofense PDR platform provides a comprehensive approach to stopping phishing attacks through global crowd-sourced phishing intelligence from 25 million people combined with advanced automation.

Cofense’s new PDR platform is designed to deploy as an integrated suite of products or delivered as a comprehensive managed PDR service through the Cofense Phishing Defense Center (PDC). Both options effectively stop phishing attacks and combat the savviness of attackers through a combination of people and automated technology to quickly reduce and remove the risk.

Despite massive investments in secure email gateways (SEGs) and awareness training across industries, phishing attacks continue to reach users. Gartner’s report* “How to Respond to the 2020 Threat Landscape”(17 June 2020; John Watts), mentions: 

  1. “Phishing is still the No.1 initial access vector for malware attacks.” 
  2. “Phishing and other human-facing social engineering tactics remain the primary vectors of successful attacks.” 
  3. “Spear phishing, as well as whaling using business email compromise (BEC) are becoming more common and, potentially, more destructive. The FBI reported that BEC accounted for more than $26 billion in losses from 2016 through 2019.” 

“Cofense is the leading provider of PDR as a result of our approach in combining technical innovations with a network of over 25 million people around the world who identify, report and share suspected phish information. Human Intelligence will always be greater than Artificial Intelligence, and when combined with technology, Cofense delivers unparalleled protection for organizations,” said Rohyt Belani, Co-Founder and CEO, Cofense.

Cofense’s PDR platform is the most holistic solution on the market, and includes:

  1. PhishMe: Completely rearchitected to address the needs of enterprise-size organizations, users can more easily and efficiently run phishing simulations and manage their security awareness program; carefully crafted simulations based on real – not theoretical – phish immerse users in the experience of being phished from end to end, improving an organization's resiliency to attacks.
  2. Triage: The first phishing-specific orchestration, automation and response solution that helps identify active phishing attacks in progress; suspected phish are rapidly clustered and analyzed by SOC analysts who queue indicators for remediation.
  3. Vision: Driven by automation, Vision quickly identifies all recipients of phishing attacks and automatically quarantines and removes the threat from all mailboxes; enables SOC and IR teams to proactively hunt for unreported threats, IOCs and TTPs, and creates transparent audit and governance of mitigation actions.
  4. Intelligence: Proprietary global collection sources provide an extensive real-time view into threat campaigns observed in the wild; delivers high-fidelity, phishing-specific alerts and intelligence, providing accurate and timely assessments of both the current phishing threat landscape and emerging trends. Information from the Intel solution can be easily integrated with existing SOARs, SIEMs and TIPs.

Cofense Managed PDR

  1. For enterprise organizations that prefer to seek managed solutions, the Cofense Phishing Defense Center team delivers Managed PDR, managing the entire phishing detection and response process. Security operators gain the expertise, resources and peace of mind needed to proactively defend against current or emerging threats with unparalleled outcomes by engaging Cofense Managed PDR. As recently discussed, the PDC team stopped and removed an attack in less than 10 minutes.

The Gartner Market Guide for Email Security (published September 8, 2020, Mark Harris, Peter Firstbrook, Ravisha Chugh) recommends that “Security and risk management leaders responsible for email security should: Address gaps in the advanced threat defense capabilities of an incumbent secure email gateway (SEG) by either replacing them or supplementing them with complementary capabilities via API integration.”

By integrating all components of the Cofense PDR platform, organizations can detect phish in their environment, educate employees on how to identify and report phish, and respond quickly to remediate the threats before there is harm done to their organization. To learn more about Cofense and PDR, please visit cofense.com/product-overview.

*Gartner, How to Respond to the 2020 Threat Landscape, John Watts, 17 June 2020

About Cofense 

Cofense® is the leading provider of phishing detection and response solutions. Designed for enterprise organizations, the Cofense Phishing Detection and Response (PDR) platform leverages a global network of over 25 million people actively reporting suspected phish, combined with advanced automation to stop phishing attacks faster and stay ahead of breaches. When deploying the full suite of Cofense solutions, organizations can educate employees on how to identify and report phish, detect phish in their environment and respond quickly to remediate threats. With seamless integration into most major TIPs, SIEMs, and SOARs, Cofense solutions easily align with existing security ecosystems. Across a broad set of Global 1000 enterprise customers, including defense, energy, financial services, healthcare and manufacturing sectors, Cofense understands how to improve security, aid incident response and reduce the risk of compromise. For additional information, please visit www.cofense.com or connect with us on Twitter and LinkedIn.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26814
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.