Welcome!

Machine Learning Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan

News Feed Item

Wombat Security Announces General Availability of PhishAlarm Analyzer

New Solution Uses Machine Learning to Identify and Prioritize Phishing Attacks Allowing Security Response Teams to Remediate Employee-Reported Attacks Efficiently

PITTSBURGH, PA--(Marketwired - July 19, 2016) - Wombat Security Technologies (Wombat), the leading provider of security awareness and training for end users, today announced the general availability (GA) for PhishAlarm Analyzer, a software-based phishing threat analysis tool that uses machine learning to identify and prioritize reported phishing emails for incident response teams. Quick identification and categorization allows infosecurity officers and security response teams to quickly isolate and remediate suspected phishing messages, including zero-hour attacks.

Phishing attacks are becoming more targeted and remain one of the largest threats to organizations today. A recent report from the Anti-Phishing Working Group observed more phishing attacks in the first quarter of 2016 than any other time in history leaving organizations at the mercy of their end-users' best judgement to remain secure.

Wombat advocates training employees to recognize phishing emails through simulated attacks and interactive training modules through a Continuous Training Methodology. Wombat's PhishAlarm® product enables knowledgeable end users to report suspected phishing emails via their email client.

Leveraging Wombat's anti-phishing technology, PhishAlarm Analyzer reviews the attributes of the reported emails via machine learning and ranks the likelihood that the email is a real phishing attack. Scott Crawford, Research Director, Information Security at 451 Research, says, "As the number of phishing attacks explodes, anything that reduces the amount of time it takes to accurately identify and remediate a potential threat to an organization can be a very valuable tool."

How it Works

PhishAlarm Analyzer scans reported emails and examines them based on the attributes of the email and linguistic characteristics of the text. The emails are then prioritized, and an HTML threat report on the suspicious email is delivered to the security and incident response teams. The research report saves time for the incident response team by performing much of the research in advance so that they respond more quickly to the reported threats.

By using various email threat feeds coupled with machine learning, PhishAlarm Analyzer constantly improves as it learns new patterns of email threats. PhishAlarm Analyzer is built to scan emails quickly and prioritize the threat, including identifying zero-hour phishing attacks in real time. By quickly detecting and ranking the most dangerous threats, PhishAlarm Analyzer allows incident response teams to remediate quickly and efficiently.

"Our early customers have derived great value from PhishAlarm Analyzer by identifying potential phishing attacks quickly and saving time on each email being investigated. With a growing number of phishing attacks and resource-constrained security departments quick identification and time savings are critical as the number of threats continues to increase," said Alan Himler, Senior Director of Product Management.

Availability

PhishAlarm Analyzer can be installed on premise or in the cloud that can be purchased through your Wombat Security representative. You must have Wombat's simulated phishing tool with the PhishAlarm email reporting capability, to purchase and take advantage of PhishAlarm Analyzer. For more information or to request a demo visit https://www.wombatsecurity.com/security-education/phishalarm-analyzer.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customer in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses.

Contact:
Susan Mackowiak
[email protected]
412-621-1484 x 126

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as they key challenges and/or impediments to adoption, and how they see those issues could be resolved or mitigated.
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
DXWorldEXPO LLC announced today that Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, software-defined solution with rich machine intelligence.