Phishing Email Reporting and Analysis

Identify and stop phishing attacks that slip through technological perimeter defences.

Overview

Even with advanced email protection tools, a small percentage of malicious messages still end up in users’ inboxes. Our PhishAlarm® phishing button empowers users to report phishing emails and other suspicious messages with one mouse click, and PhishAlarm® Analyzer helps response teams identify and remediate the most pressing threats. Both tools are integral to Proofpoint’s innovative Closed-Loop Email Analysis and Response (CLEAR) solution. 

PhishAlarm and PhishAlarm Analyser Features and Benefits

A User-Friendly Way to Report Phishing Emails

Knowledgeable users are key to identifying—and stopping—phishing attacks that slip through perimeter technology. A simple but effective email client add-in, PhishAlarm® makes it easy for your users to report phishing, dramatically reducing the duration and impact of an active phishing attack. A valuable addition to security awareness training, PhishAlarm® also reinforces positive behaviour by immediately thanking users (via a pop-up message or email) for reporting phishing and suspicious emails.

PhishAlarm - Mit einem Klick das Phishing Mail melden und zum Phishing Schutz beitragen
Mit PhishAlarm zeitnahe auf Bedrohungen durch Phishing Mails reagieren

Time-Saving Threat Prioritisation

A companion to PhishAlarm®, PhishAlarm® Analyser provides a real-time ranking of reported phishing emails in order of threat potential, allowing your response team to save time by focusing on the most imminent and dangerous threats within your network. While other tools rank reported messages based on the users’ level of “trustworthiness” and “accuracy,” PhishAlarm® Analyser classifies an email’s content using standard security indicators of compromise (IOCs), taking into account known threat vectors obtained from established databases and technical resources.

Key PhishAlarm and PhishAlarm Analyser Features

One-Click Reporting

Allows users to report phishing without having to capture header information or technical details.

Faster Response Times

Shortens the phishing delivery-recognition-response window for infosec analysts.

Flexible Configuration

Allows for whitelisting, phishing button customisation, and tailored system and forwarding actions.

Intelligent Prioritisation

Automatically prioritises reported phish messages as “Likely a Phish,” “Suspicious,” and “Unlikely a Phish.”

Machine Learning Functionality

Constantly adapts to new threat patterns, guarding against increasingly sophisticated phishing techniques.

Most Integrations in Industry

Phishing button integrates with popular desktop and mobile email clients, including Outlook and Gmail.

CLEAR Features and Benefits

Neutralise Phishing Attacks in Minutes

Closed-Loop Email Analysis and Response (CLEAR) is an integrated solution that streamlines end-user reporting and security response to phishing attacks. By combining the PhishAlarm and PhishAlarm Analyser products with Proofpoint Threat Response Auto-Pull (TRAP), CLEAR reduces the time needed to neutralise an active phishing threat from hours to minutes.

Closed-Loop Email Analysis and Response (CLEAR) - Integrierter Phishing Schutz

CLEAR Features

One-Click Remediation

Allows administrators to delete or quarantine real phishing threats with just one click.

In-Depth Threat Analysis

Automatically analyses reported messages using multiple intelligence and reputation systems.

Automatic Email Filtering

Filters out whitelisted emails and simulated phish so that response teams can prioritise their tasks.

Try Our Security Awareness Training Products

We’ve been using Wombat’s PhishAlarm product for some time and can already see the positive impact it’s having on our organisation. PhishAlarm easily replaced antiquated suspicious email reporting with a consistent and user-friendly process that positively affected employee behavior.
Senior Cybersecurity Analyst
I believe that a product this effective needs to be communicated to others. There are many choices out there, but Wombat has been the most responsive to our needs and they continuously improve their product.
CIO
Wombat was very receptive and open to working with our organisation, we were initially given a brief introduction on the solution which gave us further insight on implementing our security awareness program. We have been able to assess our security posture with help from Wombat and have adopted the Wombat Continuous Training Methodology. The integration process was seamless. ThreatSim is also a very great feature.
Service Center Specialist