Fidelis Cybersecurity has introduced Fidelis Email Security for Office 365 to provide greater visibility and control of email traffic on any device, across any wired or wireless network, while connected to cloud applications. Organisations can analyse Office 365 mail traffic to identify inbound and outbound threats such as malware, malicious attachments, and command-and-control activity. Fidelis Email Security for Office 365 quarantines and prevents mail delivery, while detecting and stopping unauthorised transfer of personally identifiable information (PII) and intellectual propriety using email. “Organisations of all sizes are moving their core business applications to the cloud. But with the convenience of cloud-based applications and services comes new security risks,” says Kurt Bertone, chief technology officer at Fidelis Cybersecurity. “Security analysts can lose visibility into cloud-based email applications, which make it hard to detect and investigate new threats and see suspicious activity. Fidelis Email Security for Office 365 solves these challenges by extending our industry-leading network sensor and detection technologies to provide increased protection of valuable data in cloud-based email environments.”
Fidelis Email Security for Office 365 detects and stops data theft by providing 100 percent visibility into Office 365 mail traffic to and from a Microsoft Exchange Server. It uses the Microsoft Azure cloud to provide seamless interaction without the need for a physical appliance. Solution highlights include:
Identify and stop email-based threats: Scan each email message in real time and apply proprietary threat intelligence to identify and quarantine inbound and outbound threats.
Detect and investigate retrospectively: Collect and store rich content-level metadata so security analysts can review past activity to investigate potential incidents using current threat intelligence and newly acquired indicators of compromise.
Identify and block insider threats and prevent data theft: Halt the exfiltration of sensitive information, assets and intellectual property by quarantining or preventing mail delivery, and by stopping unauthorised transfer of PII and confidential data.
Increased security team efficiency: Automate detection and monitoring with out-of-the-box policies that provide a wide range of real-time alerts, prevention and quarantine options, automated threat detection and investigation capabilities. A typical set up and deployment takes 30 minutes or less, on average.