PhishAlarm simplifies the process users follow to report phishing and other suspicious messages to abuse boxes. Users do not need to know how to capture header information or other technical details; they simply click to report.
PhishAlarm reduces or eliminates IT helpdesk calls by allowing employees to route suspicious emails directly to a monitored inbox.
PhishAlarm makes it easier for employees to report suspicious messages, allowing them to alert IT teams in a quick, efficient manner. This helps to shorten the phishing delivery-recognition-response window for information security analysts.
PhishAlarm integrates with:
PhishAlarm supports multiple end-user notifications, all of which are completely customizable:
PhishAlarm notifications are available in 35 languages to support the needs of multinational organizations.Learn More
PhishAlarm offers a number of configuration options for administrators that make the tool more flexible and efficient for individual organizations. Key administrative features include the following:
PhishAlarm features powerful reporting that allows you to easily access and share valuable business intelligence, including the following information:
PhishAlarm Analyzer delivers highly responsive identification of phishing attacks in real time (i.e., zero-hour attacks). Emails reported via PhishAlarm are accessed, analyzed, and categorized, and they are immediately available to your response teams.
Reported messages are automatically analyzed and enriched using multiple Proofpoint Threat Intelligence and reputation systems in addition to dedicated sandboxing of URLs and attachments in the messages. Proofpoint Threat Intelligence has access to:
We use this insight to deliver more timely and accurate information to your incident response team to more quickly classify and take action on reported emails from end users. If you’re interested in automated remediation of these messages, you can learn more about our Closed-Loop Email Analysis and Response (CLEAR) solution.
PhishAlarm Analyzer constantly evolves and adapts to new email threat patterns. Tens of billions of emails from Proofpoint threat intelligence are scanned each week and used to protect against increasingly sophisticated techniques, including spear phishing and business email compromise attacks. Dedicated sandboxing of URLs and attachments in reported messages help prevent time-delayed and brand new threats.
Each prioritized message contains a report that includes links to leading security intelligence sources. Security analysts can quickly and easily dig deeper into the threat(s) associated with the reported email. This is a great timesaver for security professionals who are facing an ever-increasing workload.
When similar email messages are reported through PhishAlarm, the resulting PhishAlarm Analyzer notifications can be grouped to eliminate redundancies, reduce clutter, and improve productivity. Threshold alerts can let response teams know when the number of similar notifications has reached a level that could indicate an emerging threat or organization-wide attack. In addition, once that threshold has been passed, PhishAlarm Analyzer will automatically escalate the classification of similar reported emails to “Likely a Phish” because this could be an indication that an organization is under attack.
You can choose up to 25 recipients (including bulk inboxes) for each reported email category. In addition, reported emails can be routed to specific inboxes based on classification. This allows administrators to eliminate the likelihood of threats falling through the cracks and enables remediation efforts to be assigned based on severity level.
Our intuitive graphical user interface makes it easy to set up and activate your account. Highly customizable settings can be monitored and adjusted using our web-based PhishAlarm Analyzer management console.
PhishAlarm Analyzer reports include aggregated data on reported emails and their categories, as well as more in-depth data about the users who reported the emails. Administrators can see at a glance how incoming emails are classified and the changes compared to the prior month.Learn More