Targeted Threat Protection - Impersonation Protect Getting Started

Document created by user.KZrHBaK4Vn Expert on Feb 20, 2016Last modified by user.oxriBaJeN4 on Dec 16, 2016
Version 14Show Document
  • View in full screen mode

Targeted Threat Protection - Impersonation Protect tackles the increasing threat of socially engineered "whaling" attacks. These threats aim to trick key employees into making fraudulent wire transfers, or disclosing personal or corporate information through social engineering, email spoofing and content spoofing.

 

Targeted Threat Protection - Impersonation Protect solves this by:

  • Looking for combinations of key identifiers commonly found in these attacks.
  • Applying actions to suspicious mails including bounce, hold, or just visually mark as suspicious.

Additionally, all mails coming from external sources can be visibly marked, to help users identify them as coming from outside the organisation.

 

Further Information

 

 

1 person found this helpful

Attachments

    Outcomes