Welcome!

Machine Learning Authors: Elizabeth White, Zakia Bouachraoui, Carmen Gonzalez, Yeshim Deniz, Liz McMillan

News Feed Item

Wombat Security Announces General Availability of PhishAlarm Analyzer

New Solution Uses Machine Learning to Identify and Prioritize Phishing Attacks Allowing Security Response Teams to Remediate Employee-Reported Attacks Efficiently

PITTSBURGH, PA--(Marketwired - July 19, 2016) - Wombat Security Technologies (Wombat), the leading provider of security awareness and training for end users, today announced the general availability (GA) for PhishAlarm Analyzer, a software-based phishing threat analysis tool that uses machine learning to identify and prioritize reported phishing emails for incident response teams. Quick identification and categorization allows infosecurity officers and security response teams to quickly isolate and remediate suspected phishing messages, including zero-hour attacks.

Phishing attacks are becoming more targeted and remain one of the largest threats to organizations today. A recent report from the Anti-Phishing Working Group observed more phishing attacks in the first quarter of 2016 than any other time in history leaving organizations at the mercy of their end-users' best judgement to remain secure.

Wombat advocates training employees to recognize phishing emails through simulated attacks and interactive training modules through a Continuous Training Methodology. Wombat's PhishAlarm® product enables knowledgeable end users to report suspected phishing emails via their email client.

Leveraging Wombat's anti-phishing technology, PhishAlarm Analyzer reviews the attributes of the reported emails via machine learning and ranks the likelihood that the email is a real phishing attack. Scott Crawford, Research Director, Information Security at 451 Research, says, "As the number of phishing attacks explodes, anything that reduces the amount of time it takes to accurately identify and remediate a potential threat to an organization can be a very valuable tool."

How it Works

PhishAlarm Analyzer scans reported emails and examines them based on the attributes of the email and linguistic characteristics of the text. The emails are then prioritized, and an HTML threat report on the suspicious email is delivered to the security and incident response teams. The research report saves time for the incident response team by performing much of the research in advance so that they respond more quickly to the reported threats.

By using various email threat feeds coupled with machine learning, PhishAlarm Analyzer constantly improves as it learns new patterns of email threats. PhishAlarm Analyzer is built to scan emails quickly and prioritize the threat, including identifying zero-hour phishing attacks in real time. By quickly detecting and ranking the most dangerous threats, PhishAlarm Analyzer allows incident response teams to remediate quickly and efficiently.

"Our early customers have derived great value from PhishAlarm Analyzer by identifying potential phishing attacks quickly and saving time on each email being investigated. With a growing number of phishing attacks and resource-constrained security departments quick identification and time savings are critical as the number of threats continues to increase," said Alan Himler, Senior Director of Product Management.

Availability

PhishAlarm Analyzer can be installed on premise or in the cloud that can be purchased through your Wombat Security representative. You must have Wombat's simulated phishing tool with the PhishAlarm email reporting capability, to purchase and take advantage of PhishAlarm Analyzer. For more information or to request a demo visit https://www.wombatsecurity.com/security-education/phishalarm-analyzer.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customer in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses.

Contact:
Susan Mackowiak
[email protected]
412-621-1484 x 126

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also received the prestigious Outstanding Technical Achievement Award three times - an accomplishment befitting only the most innovative thinkers. Shankar Kalyana is among the most respected strategists in the global technology industry. As CTO, with over 32 years of IT experience, Mr. Kalyana has architected, designed, developed, and implemented custom and packaged software solutions across a vast spectrum o...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
SAP is the world leader in enterprise applications in terms of software and software-related service revenue. Based on market capitalization, we are the world's third largest independent software manufacturer. Harness the power of your data and accelerate trusted outcome-driven innovation by developing intelligent and live solutions for real-time decisions and actions on a single data copy. Support next-generation transactional and analytical processing with a broad set of advanced analytics - run securely across hybrid and multicloud environments.
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.” Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by: Detecting and preventing network threats, intrusions and disruptions Equipping you with the information, tools, training and resources you need to effectively manage IT risk Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.