Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/25/2018
10:30 AM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Vade Secure Launches Native, AI-Based Email Security Add-On for Office 365

Solution designed to protect against phishing, spearphishing and malware; provides Microsoft partners with a solution for Office 365 clients.

SAN FRANCISCO, CALIF. - June 21, 2018 - Today, Vade Secure, the global leader in predictive email defense, announced a new offering for Office 365 customers looking to enhance protection against advanced phishing, spear phishing, and malware attacks. Vade Secure for Office 365 is the only email security solution that’s fully integrated into Office 365, offering a native user experience and best-in-class filtering accuracy powered by artificial intelligence.

Value-Added Cloud Service for Microsoft Partners and MSPs

Vade Secure for Office 365 is closely aligned with Microsoft’s partner-first, cloud-first strategy. Built from the ground up with a cloud-native, API-based architecture, the new offering natively integrates with Office 365 and runs on Microsoft Azure, providing Microsoft Partners, Cloud Solution Providers (CSPs), and Managed Service Providers (MSPs) with a complementary, high-margin solution for their Office 365 customers.

“As one of the largest global Microsoft CSPs, Crayon is at the forefront of helping clients realize the benefits of Microsoft Office 365. At the same time, we recognize that Office 365’s dominant market share has made it a popular target for cybercriminals,” said Nabil Chebbi, Vice President Cloud Sales and Marketing Enablement, Crayon Group. “We’re impressed with Vade Secure’s track record of blocking advanced threats, and we’re excited to add their solution for Office 365 to our portfolio so that we can offer our clients an easy, transparent, and effective way to enhance their email protection.”

Fully API-Based for a Native Office 365 User Experience

Gartner estimates that by 2020, 50 percent of Office 365 clients will use third-party security solutions. Many traditional email security products are based on legacy gateway architectures that render certain Office 365 security features ineffective, but Vade Secure’s new, API-based solution integrates seamlessly with Office 365, allowing organizations to augment native Office 365 security features, rather than displace them.

Specific benefits of Vade Secure’s API-based architecture include:

  • Ease of deployment: With a few clicks, admins can authorize Vade Secure to access their email flow and configure their filtering policies—no MX record changes required.
  • Native user experience: The solution is fully transparent, allowing end users to continue using the familiar Office 365 interface, without a separate quarantine.
  • Insider threat protection: Vade Secure scans internal messages sent between employees to protect against attacks originating within the organization.

Predictive Defense Powered by Artificial Intelligence

Vade Secure for Office 365 blocks advanced attacks from the first email using machine learning models that perform real-time behavioral analysis of the entire email, including any URLs and attachments. Vade Secure leverages data from more than 500 million inboxes around the world to feed its machine learning models and ensure a best-in-class catch rate.

Specific AI and machine learning benefits include:

  • Anti-phishing: Vade Secure crawls suspicious URLs and pages in real time, following any redirections to determine whether the final page is fraudulent. The solution performs this analysis both when the message is received and any time a user clicks.
  • Anti-spear phishing: Vade Secure builds an anonymous profile that establishes employees’ normal communication patterns. Upon detecting spoofing attempts, a fully customizable banner is displayed within the email alerting the user.
  • Anti-malware and ransomware: Going beyond simply scanning attachments, machine learning algorithms perform a comprehensive analysis of the origin, content, and context of emails and their attachments to block unknown, polymorphic malware.

“Hackers are increasingly targeting Office 365 users with email-based attacks as an entry point to exploit data, files, and contacts from other Office 365 apps,” said Adrien Gendre, Chief Solution Architect, Vade Secure. “While native Office 365 security catches most spam and known threats, many organizations are strengthening their defenses with a layered approach. Vade Secure for Office 365 complements tools like Exchange Online Protection, leveraging artificial intelligence to block advanced phishing, spear phishing, and malware attacks.”

 

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5087
PUBLISHED: 2019-11-21
An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code....
CVE-2019-5509
PUBLISHED: 2019-11-21
ONTAP Select Deploy administration utility versions 2.11.2 through 2.12.2 are susceptible to a code injection vulnerability which when successfully exploited could allow an unauthenticated remote attacker to enable and use a privileged user account.
CVE-2019-6693
PUBLISHED: 2019-11-21
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the admini...
CVE-2019-17272
PUBLISHED: 2019-11-21
All versions of ONTAP Select Deploy administration utility are susceptible to a vulnerability which when successfully exploited could allow an administrative user to escalate their privileges.
CVE-2019-17650
PUBLISHED: 2019-11-21
An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.