Close this search box.

Cyren Inbox Security: Use Email Threat Intelligence to Your Advantage

Email threat intelligence is knowledge and data about emerging security threats, such as potential phishing attacks, and how they can be stopped. Email threat intelligence is becoming increasingly important in order to identify and block new threats. Having real-time data on email threats worldwide is critical in order to stop a phishing attack before it breaches your defenses.

The evolving sophistication of these attacks makes them increasingly successful in avoiding detection and fooling your employees, even those who have been through Security Awareness and Training (SAT) programs. Fortunately, Cyren Inbox Security, an Inbox Detection and Response (IDR) solution, establishes a critical layer of email security at the inbox and strengthens overall security posture with threat intelligence. It provides a critical layer of security where it’s needed most.

Advantages of Using Cyren Inbox Security for Email Threat Intelligence

Evasive Phishing Protection

Cyren Inbox Security leverages the broad set of Cyren cloud computing and security technologies to identify evasive phishing attacks and deliver the most advanced threat detection capabilities, including real-time inspection of email headers, payload, URLs and attachments, together with machine learning, recurrent pattern detection, IP reputation, heuristic clustering, natural language processing, and impostor protection. Cyren’s threat visibility is unsurpassed. Our global security cloud processes 25 billion email and web security transactions every day; identifies 9 new threats and blocks over 3,000 known threats each second.

Continuous Detection

Cyren Inbox Security protects from new, previously unknown threats by continuously scanning every email in every folder of every user’s mailbox. Cyren monitors mailbox behavior and user interactions in the mailbox and identifies anomalies. All of this data is then correlated in real-time to determine whether an email is malicious and action should be taken.

Automated Remediation

Automated remediation and incident management capabilities ensure that threats are removed from your organization quickly and comprehensively. Automated cross-enterprise remediation of phishing outbreaks removes suspicious messages from all infected mailboxes across the organization. A policy-based remediation framework supports a broad set of actions including tag and deliver, move to folder, delete, and send alert. Robust incident and case management workflows along with extensive forensics displays remove much of the investigative overhead from the security team and leads to rapid response and remediation.

Crowd-Sourced User Detection

Cyren’s service includes a simple to install and use Outlook plugin that reduces the burden of user support from the IT help desk and incorporates the “crowd-sourced” threat intelligence to help identify and protect against phishing attacks. A prominent button in the email client lets users click to scan any suspicious email on demand, and receive immediate results. If the response is negative and the user disagrees, the user can click to send the email in question to the Cyren Security Lab for expert security analyst review. All forensics data from crowdsourced intelligence is incorporated in the system and made available for further investigations.

24/7 Threat Response Service

Cyren provides a 24/7 managed Threat Response Service (TRS) for users of Cyren Inbox Security. Cyren TRS is laser-focused on investigation, analysis and resolution of open threat incidents reported by your mailbox users, as well as investigation of suspicious low-confidence incidents. If Cyren analysis reclassifies the email as suspicious, it will be automatically remediated from the reporting mailbox and across all user mailboxes in your organization.

With the daily processing of more than 25 billion transactions from Cyren customers and technology partners, we leverage our global visibility to the advantage of every Cyren Inbox Security user.

How to Counter Phishing Threats Automatically

Cyren Inbox Security leverages the native API integration of Office 365 to continuously protect against email threats that are delivered to user mailboxes. Our powerful set of automated remediation tools identify and mitigate a wide range of malicious attacks that avoid detection by perimeter defenses, including:

  • Evasive Phishing attacks using techniques such as delayed URL activation, URLs hidden in attachments, HTML obfuscation, sophisticated encryption, real and valid SSL certificates, etc.
  • Spear phishing and spoofed messages that carry no payload to detect
  • BEC, CEO fraud, and other targeted social engineering attacks
  • New zero-day phishing campaigns
  • Account takeovers (credential theft) and monitoring of internal email

How is Cyren Inbox Security Deployed?

Cyren Inbox Security is a non-intrusive security solution-as-a-service that complements your existing secure email gateway without the need for MX record changes or any changes to current infrastructure. Get up and running in just a few clicks — simply:

1) Authorize Cyren to access your email flow, and then 2) Configure your preferred filtering and remediation policies, including flexibly applying different rules-based policies to different users and groups.

Protecting your Office 365 mailboxes has never been this easy.

What Can Cyren Inbox Security Be Used For?

  • Shorten SOC time to respond and remediate email-borne threats
  • Save SOC skills and resources through automation
  • Engage every employee in the fight against phishing, BEC and fraud
  • Plug the gap in corporate email security
  • Stop evasive phishing threats from gaining entry to your business
  • Adapt in real-time to changing evasion tactics as attackers pivot and try new techniques
  • Reduce alert fatigue

Learn More About CIS & Email Threat Intelligence

Read the data sheet and learn how to use the email threat intelligence provided by Cyren Inbox Security, an Inbox Detection and Response (IDR) solution, today.