Loading...
You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

Wombat Security Announces General Availability of PhishAlarm Analyzer

By   /  July 20, 2016  /  No Comments

womby Angela Guess

A recent release out of the company reports, “Wombat Security Technologies (Wombat), the leading provider of security awareness and training for end users, today announced the general availability (GA) for PhishAlarm Analyzer, a software-based phishing threat analysis tool that uses machine learning to identify and prioritize reported phishing emails for incident response teams. Quick identification and categorization allows infosecurity officers and security response teams to quickly isolate and remediate suspected phishing messages, including zero-hour attacks. Phishing attacks are becoming more targeted and remain one of the largest threats to organizations today. A recent report from the Anti-Phishing Working Group observed more phishing attacks in the first quarter of 2016 than any other time in history leaving organizations at the mercy of their end-users’ best judgement to remain secure.”

The release continues, “PhishAlarm Analyzer scans reported emails and examines them based on the attributes of the email and linguistic characteristics of the text. The emails are then prioritized, and an HTML threat report on the suspicious email is delivered to the security and incident response teams. The research report saves time for the incident response team by performing much of the research in advance so that they respond more quickly to the reported threats. By using various email threat feeds coupled with machine learning, PhishAlarm Analyzer constantly improves as it learns new patterns of email threats. PhishAlarm Analyzer is built to scan emails quickly and prioritize the threat, including identifying zero-hour phishing attacks in real time. By quickly detecting and ranking the most dangerous threats, PhishAlarm Analyzer allows incident response teams to remediate quickly and efficiently.”

Read more at MarketWired.

Photo credit: Wombat Security Technologies

You might also like...

Using Your Data Corpus to Further Digital Transformation

Read More →