Email Phishing Protection and Management Filter

Phishing messages, unlike spam, are malicious attempts to hijack email information. Historically, phishing emails were designed to capture individual user information such as username/password combinations to bank accounts. But the stakes have risen with the use of phishing messages to as attack vector to deliver malware designed to steal sensitive and confidential corporation data. Designed to imitate legitimate email, phishing attackers duplicate the look and feel, the structure, and the logos of actual organizations. As phishing attackers have gotten more sophisticated, these email attacks are now much more targeted with low volumes of messages being sent. This easily slips by traditional email reputation-based detection filters. And with well designed phishing messages containing little more than a URL for users to click-on, many organizations are finding these phishing messages getting through spam filters and into end-user inboxes, creating a serious security issue.

An even more sinister type of phishing is the "spear-phishing" message. Rather than casting out thousands of emails in a broad-based attack, spear-phishing attacks are highly targeted at specific groups of people, or even individuals within an organization. The phishing attackers will typically gather some insider information to create spear-phishing emails containing relevant topics. This is achieved by combing through public press releases, blogs, and social networking sites. As a result of the highly convincing phishing email created with such background information, spear-phishing emails have an even higher rate at which victims fall for these counterfeit email messages.

Powered by the patented Proofpoint MLX machine learning technology, Proofpoint’s Phishing Protection filters and examines millions of possible attributes in every email to accurately filter phishing messages. The malicious intentions of phishing messages need to filtered and managed differently so emails that have been identified as phishing messages are quarantined separately from spam and bulk messages. This specialized quarantine holds phishing messages, which can be reviewed by administrators, but is not accessible by end-users. This phishing filter prevents phishing messages from being released by end-users, compromising the security of your organization.

Phishing Protection and Management Filter Key Capabilities:

  • Contextual, Lexical Analysis: Proofpoint MLX filters and examines the content and context of messages using structural tests, malicious URL detection, as well as targeted rules for phishing attacks to accurately filter and single out phishing messages from nuisance spam.

  • Specialized Phishing Quarantines: Phishing messages are designed to fool recipients into believing they are valid messages, convincing them to take a call to action. Due to the malicious nature of phishing messages, phishing messages are filtered and placed in a specialized quarantine, which prevents end-users from access and taking action upon a phishing message, putting your organization at risk. Many alternative phishing email filtering solutions do not uniquely identify phishing messages, and when these phishing emails are filtered, simply place the phishing messages into the spam quarantine, in full view of an end-user, who can easily release these messages, immediately compromising the security of your organization.

Talk Now
Try it Now

White Paper
The Phishing Threat: Phishing Attacks: Learn how to defend against the newest types of phishing attacks. Download Now
Videocast Is Postini Protecting You Against Phishing Attacks? Learn how Proofpoint can better defend your organization.
Download Now
Live Demo
See how Proofpoint Enterprise Protection can protect you from phishing.Live Demo
Related Resources
Proofpoint Enterprise Protection DatasheetCase Study: Princeton University stops phishing attacks with Proofpoint.
Learn More »
©2014 Proofpoint, Inc.