Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/25/2018
10:30 AM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Vade Secure Launches Native, AI-Based Email Security Add-On for Office 365

Solution designed to protect against phishing, spearphishing and malware; provides Microsoft partners with a solution for Office 365 clients.

SAN FRANCISCO, CALIF. - June 21, 2018 - Today, Vade Secure, the global leader in predictive email defense, announced a new offering for Office 365 customers looking to enhance protection against advanced phishing, spear phishing, and malware attacks. Vade Secure for Office 365 is the only email security solution that’s fully integrated into Office 365, offering a native user experience and best-in-class filtering accuracy powered by artificial intelligence.

Value-Added Cloud Service for Microsoft Partners and MSPs

Vade Secure for Office 365 is closely aligned with Microsoft’s partner-first, cloud-first strategy. Built from the ground up with a cloud-native, API-based architecture, the new offering natively integrates with Office 365 and runs on Microsoft Azure, providing Microsoft Partners, Cloud Solution Providers (CSPs), and Managed Service Providers (MSPs) with a complementary, high-margin solution for their Office 365 customers.

“As one of the largest global Microsoft CSPs, Crayon is at the forefront of helping clients realize the benefits of Microsoft Office 365. At the same time, we recognize that Office 365’s dominant market share has made it a popular target for cybercriminals,” said Nabil Chebbi, Vice President Cloud Sales and Marketing Enablement, Crayon Group. “We’re impressed with Vade Secure’s track record of blocking advanced threats, and we’re excited to add their solution for Office 365 to our portfolio so that we can offer our clients an easy, transparent, and effective way to enhance their email protection.”

Fully API-Based for a Native Office 365 User Experience

Gartner estimates that by 2020, 50 percent of Office 365 clients will use third-party security solutions. Many traditional email security products are based on legacy gateway architectures that render certain Office 365 security features ineffective, but Vade Secure’s new, API-based solution integrates seamlessly with Office 365, allowing organizations to augment native Office 365 security features, rather than displace them.

Specific benefits of Vade Secure’s API-based architecture include:

  • Ease of deployment: With a few clicks, admins can authorize Vade Secure to access their email flow and configure their filtering policies—no MX record changes required.
  • Native user experience: The solution is fully transparent, allowing end users to continue using the familiar Office 365 interface, without a separate quarantine.
  • Insider threat protection: Vade Secure scans internal messages sent between employees to protect against attacks originating within the organization.

Predictive Defense Powered by Artificial Intelligence

Vade Secure for Office 365 blocks advanced attacks from the first email using machine learning models that perform real-time behavioral analysis of the entire email, including any URLs and attachments. Vade Secure leverages data from more than 500 million inboxes around the world to feed its machine learning models and ensure a best-in-class catch rate.

Specific AI and machine learning benefits include:

  • Anti-phishing: Vade Secure crawls suspicious URLs and pages in real time, following any redirections to determine whether the final page is fraudulent. The solution performs this analysis both when the message is received and any time a user clicks.
  • Anti-spear phishing: Vade Secure builds an anonymous profile that establishes employees’ normal communication patterns. Upon detecting spoofing attempts, a fully customizable banner is displayed within the email alerting the user.
  • Anti-malware and ransomware: Going beyond simply scanning attachments, machine learning algorithms perform a comprehensive analysis of the origin, content, and context of emails and their attachments to block unknown, polymorphic malware.

“Hackers are increasingly targeting Office 365 users with email-based attacks as an entry point to exploit data, files, and contacts from other Office 365 apps,” said Adrien Gendre, Chief Solution Architect, Vade Secure. “While native Office 365 security catches most spam and known threats, many organizations are strengthening their defenses with a layered approach. Vade Secure for Office 365 complements tools like Exchange Online Protection, leveraging artificial intelligence to block advanced phishing, spear phishing, and malware attacks.”

 

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2020-26564
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFil...
CVE-2020-26565
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.
CVE-2020-26806
PUBLISHED: 2021-07-31
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.