4
Protect against phishing attacks and drive-by exploits Phishing has become the weapon of choice for cyber criminals. Despite operating a full spectrum of email security solutions including anti-spam, anti-virus, data security, and encryption, enterprises continue to be impacted by targeted spear phishing which results in credential theft and malware exploits. Legacy email security solutions rely on a 'good vs. bad' determination provided by third party data feeds, or internally via large-scale email traffic and data analysis. Because spear phishing attacks target specific individuals within an organization, the email link is usually unique, as is the target user. Therefore, no third party reputation data is available, nor is there enough data to analyze internally to make an accurate determination. If the determination is incorrect, the first targeted “patient-zero” individuals are sent directly to a site where credentials can be stolen, or malware can be downloaded to an endpoint. A single error can facilitate a costly and damaging cyber attack. A new approach is required. Highlights Eliminates drive-by exploits by isolating all email links Stops credential theft Reinforces phishing awareness training with real-time, customizable, and dynamic end- user education messages Simplifies security infrastructure, requires no end-point software or appliances, and easily integrates with existing mail server infrastructure PHISHING ISOLATION DATA SHEET MS EXCHANGE USER ALLOW OR BLOCK? ALLOW OR BLOCK? • Can’t keep pace with millions of variants • Generates false positive/negatives • Complex infrastructure leaves vulnerabilities 1 • SEGs difficult to tune to detect advanced phishing attacks • Rely on reputation and data analysis, no “patient-zero” protection against spear-phishing 2 • 12% of trained users still click on suspicious links or attachments* • No training ties to infrastructure security policies 3 Secure Web Gateway Antivirus Signatures IDS/IDP Firewall Network Sandbox Big Data Analysis Secure Email Gateway s s 12% CLICK s s s s @ MALICIOUS EMAIL PHISHING WEAPONIZED DOCUMENTS INFECTED WEBSITES WWW *Verizon’s 2016 Data Breach Investigations Report

ISOLATION PLATFOM DATA SHEET PHISHING ISOLATION DATA … › ... › uploads › 2017 › 02 › Phishing_Isolat… · About Menlo Security Menlo Security is making it safe to click

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ISOLATION PLATFOM DATA SHEET PHISHING ISOLATION DATA … › ... › uploads › 2017 › 02 › Phishing_Isolat… · About Menlo Security Menlo Security is making it safe to click

ISOLATION PLATFORM DATA SHEET

Protect against phishing attacks and drive-by exploitsPhishing has become the weapon of choice for cyber criminals. Despite

operating a full spectrum of email security solutions including anti-spam,

anti-virus, data security, and encryption, enterprises continue to be

impacted by targeted spear phishing which results in credential theft

and malware exploits.

Legacy email security solutions rely on a 'good vs. bad' determination

provided by third party data feeds, or internally via large-scale email

traffic and data analysis. Because spear phishing attacks target specific

individuals within an organization, the email link is usually unique, as is

the target user. Therefore, no third party reputation data is available,

nor is there enough data to analyze internally to make an accurate

determination. If the determination is incorrect, the first targeted

“patient-zero” individuals are sent directly to a site where credentials

can be stolen, or malware can be downloaded to an endpoint. A single

error can facilitate a costly and damaging cyber attack.

A new approach is required.

Highlights

• Eliminates drive-by exploits by isolating

all email links

• Stops credential theft

• Reinforces phishing awareness training with

real-time, customizable, and dynamic end-

user education messages

• Simplifies security infrastructure, requires

no end-point software or appliances, and

easily integrates with existing mail server

infrastructure

PHISHING ISOLATION DATA SHEET

MS EXCHANGE

USER

ALLOWOR

BLOCK?

ALLOWOR

BLOCK?

• Can’t keep pace with millions of variants• Generates false positive/negatives• Complex infrastructure leaves vulnerabilities

1

• SEGs difficult to tune to detect advanced phishing attacks• Rely on reputation and data analysis, no “patient-zero” protection

against spear-phishing

2

• 12% of trained users still click on suspicious links or attachments*

• No training ties to infrastructure security policies

3

Secure Web GatewayAntivirus SignaturesIDS/IDPFirewallNetwork SandboxBig Data Analysis

Secure Email Gateway

s s

12%CLICK

s s

s

s

@MALICIOUS

EMAIL PHISHING

WEAPONIZEDDOCUMENTS

INFECTEDWEBSITES

WWW

*Verizon’s 2016 Data Breach Investigations Report

Page 2: ISOLATION PLATFOM DATA SHEET PHISHING ISOLATION DATA … › ... › uploads › 2017 › 02 › Phishing_Isolat… · About Menlo Security Menlo Security is making it safe to click

The Solution: Isolation Menlo Security’s Phishing Isolation solution eliminates credential theft

and drive-by exploits caused by email attacks. By integrating cloud-

based Phishing Isolation with existing mail server infrastructure such as

Exchange, Gmail, and Office 365, all email links can be transformed to

pass through the Menlo Security Isolation Platform. When users click on

an email link, they are 100% isolated from all malware threats, including

ransomware. Websites can also be rendered in a read-only mode which

prevents individuals from entering sensitive information into malicious

web forms.

With their users safely isolated, administrators can monitor behavior

statistics, and provide customizable time-of-click messages that help

reinforce anti-phishing awareness training. Administrators can also

define workflow policies for groups or individuals that determine if or

when web input field restrictions can be relaxed. With zero dependency

on on error-prone threat detection methods, such as data analytics,

Menlo Security Phishing Isolation is the only email security solution that

protects every email user the instant it’s deployed.

PHISHING ISOLATION DATA SHEET

USER

s

Enables teachable moments3

Phishing Stats-at-a-Glance:

• Phishing is the most common targeted

method of cyber attacks1

• Nearly 50% of users open emails and click

on phishing links within the first hour2

• 12% of users click on suspicious links or

attachments despite training2

• Increasing volume and sophistication of

phishing attacks are resulting in downtime

and direct financial fraud3

• The main perpetrators for phishing attacks

are organized crime syndicates and state-

affiliated actors3

1 Gartner’s Fighting Phishing: Optimize Your Defense

(Published: 17 March 2016)2Verizon’s 2015 Data Breach Investigations Report3Verizon’s 2016 Data Breach Investigations Report

Eliminates drive-by exploits by isolating all email links1

By opening all email links in safe isolation sessions, MSIP protects every user against targeted spear-phishing and drive-by exploits, thus eliminating “patient-zero” infections

2

Secure Web Gateway

Secure Email Gateway

s

s

@MALICIOUS

EMAIL PHISHING

WEAPONIZEDDOCUMENTS

INFECTEDWEBSITES

WWW

MS EXCHANGE

Page 3: ISOLATION PLATFOM DATA SHEET PHISHING ISOLATION DATA … › ... › uploads › 2017 › 02 › Phishing_Isolat… · About Menlo Security Menlo Security is making it safe to click

• Protects against phishing and eliminates drive-by exploits

through isolation of all email links. MSIP Phishing Isolation

provides the industry’s only solution that delivers protection

from credential theft, while eliminating 100% of drive-by

malware exploits.

• By opening email links in safe isolation sessions, MSIP

protects against targeted spear-phishing and drive-by

exploits without relying on error-prone threat detection.

• Requires no end-point software or appliances, and easily

integrates with existing mail server infrastructure. MSIP

Phishing Isolation is the first cloud-based (public or private)

solution with zero dependency on end-point software

or appliances. It integrates easily with existing mail server

infrastructure such as Exchange, Gmail, and Office 365.

• Provides user-behavior stats and customizable training

reinforcement which enable teachable moments. Because

web sessions pass through the isolation platform, MSIP

Phishing Isolation can provide visibility into user behavior,

helping administrators determine which users are clicking

on potentially risky links. Even if users do click on malicious

links, all sites are safely isolated and have input-field

restrictions. Administrators can use this information to

create teachable moments by providing configurable, real-

time warning messages which offer additional corporate

phishing-awareness training.

PHISHING ISOLATION DATA SHEET

Phishing Isolation Key Benefits

Page 4: ISOLATION PLATFOM DATA SHEET PHISHING ISOLATION DATA … › ... › uploads › 2017 › 02 › Phishing_Isolat… · About Menlo Security Menlo Security is making it safe to click

934 Santa Cruz Avenue

Menlo Park, CA 94025

Tel: 650 614 1795

[email protected] © 2016 Menlo Security. All rights reserved.

Summary

As phishing becomes an increasingly popular method for cyber criminals

to distribute malware, the Menlo Security Isolation Platform (MSIP) provides

the industry’s only Phishing Isolation solution delivers protection from

credential theft, while eliminating 100% of drive-by malware exploits.

MSIP Phishing Isolation uses web isolation to protect end users from

malicious email links that can cause malware infections or lead to phishing

sites. With this unique approach, users can safely view sites with input-field

restrictions, while configurable messages provide additional corporate

phishing awareness training. MSIP Phishing Isolation requires no end-point

software or appliances and easily integrates with existing mail server

infrastructure such as Exchange, Gmail, and Office 365.

About Menlo Security

Menlo Security is making it safe to click

via isolation, protecting organizations

from cyber attack by eliminating the

threat of malware from web and email.

Menlo Security’s Isolation Platform

(MSIP) isolates all active content in the

cloud, enabling users to safely interact

with websites, links and documents

online without compromising security.

Menlo Security is trusted by some of the

world’s largest enterprises, including

Fortune 500 companies and financial

services institutions. The company was

founded by security industry veterans, in

collaboration with acclaimed

researchers from the University of

California, Berkeley. Backed by General

Catalyst, Sutter Hill Ventures and Osage

University Partners, Menlo Security is

headquartered in Menlo Park, California.

For more information, visit

menlosecurity.com or contact

[email protected]

PHISHING ISOLATION DATA SHEET