Promote this Nomination

Share on FacebookTweet about this on TwitterShare on LinkedIn
Menlo Security Logo
  • Company (that provides the nominated product / solution / service): Menlo Security
  • Website: http://www.menlosecurity.com
  • Company size (employees): Less than 100
  • Country: United States
  • Type of solution: Software
  • Approximate number of users worldwide: Greater than 250,000

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

*Menlo Security provides the industry’s only Phishing Isolation solution that delivers protection from credential theft, while eliminating 100% of drive-by malware web exploits. Menlo Security Phishing Isolation uses web isolation to protect end users from malicious email links that can cause malware infections or lead to phishing sites. With this unique approach, users can safely view sites with input-field restrictions, while they are provided information that helps them determine a site’s legitimacy. This information is delivered via configurable messages which can provide additional corporate phishing-awareness training. MSIP Phishing Isolation requires no end-point software or appliances and easily integrates with existing mail server infrastructure such as Exchange, Gmail, and Office 365.

*Menlo Security provides cloud simplicity and scale, which reduces security costs and increases scale by eliminating endpoint software and outdated appliances. It turns on as a cloud-based isolation platform quickly and easily in minutes. It minimizes hardware and endpoint software procurement, installation and support overhead. It eliminates maintenance and support costs . It simplifies operations and stop alert fatigue with zero false positives and negatives and scales from 50 to 500,00 users

*Administrators are able to determine which users are clicking on potentially risky links. When users click on malicious links, all sites are safely isolated. Administrators can use this information to create teachable moments by providing configurable warning messages at the time of click, which offer additional corporate phishing-awareness training.

In less than 300 words, summarize the most important features and benefits of this product or service

Today’s email security solutions are highly vulnerable to targeted spear phishing attacks. This is because existing email security products are largely based on reputation, that is whether an email link is know to be “good” or “bad.” A link’s reputation is determined via 3rd party data feeds or internally by way of large-scale email traffic and data analysis. In the case of spear phishing attacks, which target specific individuals within an organization, the email link is usually unique, as is the target user, hence there is no 3rd party reputation data available, nor is there enough data to analyze internally to make an accurate determination. If the determination is incorrect, users are sent directly to a site where credentials can be stolen, or malware can be downloaded to an endpoint. A single error can facilitate a pervasive attack that can cause billions of dollars of damage. Menlo Security solves the targeted spear phishing problem conclusively.

*Provides complete protection against phishing and eliminates drive-by exploits through isolation of all email links — The industry’s only solution that delivers protection from credential theft, while eliminating 100% of drive-by malware web exploits

*Requires no end-point software or appliances, and easily integrates with existing mail server infrastructure — The first cloud-based (public or private) solution with zero dependency on endpoint software or appliances. It integrates easily with existing mail server infrastructure such as Exchange, Gmail, Active Directory and Office 365.

*Provides user-behaviour stats & customizable training reinforcement — Because web sessions pass through the isolation platform, MSIP Phishing Isolation can provide visibility into user behaviour, helping administrators determine which users are clicking on risky links. Even if users do click, all sites are safely isolated and have input-field restrictions. Administrators can use this information to create teachable moments by providing real-time messages which offer

Leave a Comment.

You need to be a registered member to comment on this nomination.Please register

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.