PhishAlarm simplifies the process users follow to report phishing and other suspicious messages to abuse boxes. Users do not need to know how to capture header information or other technical details; they simply click to report.
PhishAlarm reduces or eliminates IT helpdesk calls by allowing employees to route suspicious emails directly to a monitored inbox.
PhishAlarm makes it easier for employees to report suspicious messages, allowing them to alert IT teams in a quick, efficient manner. This helps to shorten the phishing delivery-recognition-response window for information security analysts.
PhishAlarm integrates with:
PhishAlarm supports multiple end-user notifications, all of which are completely customizable:
PhishAlarm notifications are available in 35 languages to support the needs of multinational organizations.Learn More
PhishAlarm offers a number of configuration options for administrators that make the tool more flexible and efficient for individual organizations. Key administrative features include the following:
PhishAlarm features powerful reporting that allows you to easily access and share valuable business intelligence, including the following information:
PhishAlarm Analyzer delivers highly responsive identification of phishing attacks in real time (i.e., zero-hour attacks). Emails reported via PhishAlarm are accessed, analyzed, and categorized, and they are immediately available to your response teams.
The three email prioritization categories used by PhishAlarm Analyzer are: Likely a Phish, Suspicious, and Unlikely a Phish. Administrators have the ability to configure the sensitivity thresholds for each of these categories (on a scale of 0 to 30). This flexibility allows administrators to minimize the number of false positives and false negatives registered for their organization.
PhishAlarm Analyzer constantly evolves and adapts to new email threat patterns. Thousands of real attacks from the wild are scanned each week and used to learn about and guard against increasingly sophisticated techniques, including spear phishing attacks.
Each prioritized message contains a report that includes links to leading security intelligence sources. Security analysts can quickly and easily dig deeper into the threat(s) associated with the reported email. This is a great timesaver for security professionals who are facing an ever-increasing workload.
When similar email messages are reported through PhishAlarm, the resulting PhishAlarm Analyzer notifications can be grouped to eliminate redundancies, reduce clutter, and improve productivity. Threshold alerts can let response teams know when the number of similar notifications has reached a level that could indicate an emerging threat or organization-wide attack. In addition, once that threshold has been passed, PhishAlarm Analyzer will automatically escalate the classification of similar reported emails to “Likely a Phish” because this could be an indication that an organization is under attack.
You can choose up to 25 recipients (including bulk inboxes) for each reported email category. In addition, reported emails can be routed to specific inboxes based on classification. This allows administrators to eliminate the likelihood of threats falling through the cracks and enables remediation efforts to be assigned based on severity level.
Our intuitive graphical user interface makes it easy to set up and activate your account. Highly customizable settings can be monitored and adjusted using our web-based PhishAlarm Analyzer management console.
PhishAlarm Analyzer reports include aggregated data on reported emails and their categories, as well as more in-depth data about the users who reported the emails. Administrators can see at a glance how incoming emails are classified and the changes compared to the prior month.Learn More