Request a Demo of Tessian Today.

Automatically stop data breaches and security threats caused by employees on email. Powered by machine learning, Tessian detects anomalies in real-time, integrating seamlessly with your email environment within minutes and starting protection in a day. Provides you with unparalleled visibility into human security risks to remediate threats and ensure compliance.

Prepare for the next wave of email attacks at Fwd: Thinking on Nov 2 | Save Your Seat →

Tessian Blog

  • All
  • Customer Stories
  • Compliance
  • Email DLP
  • Integrated Cloud Email Security
  • Data & Trends
  • NULL
    array(14) { [0]=> object(WP_Term)#11528 (11) { ["term_id"]=> int(5) ["name"]=> string(16) "Customer Stories" ["slug"]=> string(16) "customer-stories" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(5) ["taxonomy"]=> string(8) "category" ["description"]=> string(155) "Read our latest Customer Stories, interviews and news. Learn how Tessian protects organisations in Financial Services, Legal, Technology and other markets." ["parent"]=> int(0) ["count"]=> int(46) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "2" } [1]=> object(WP_Term)#12104 (11) { ["term_id"]=> int(120) ["name"]=> string(10) "Compliance" ["slug"]=> string(10) "compliance" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(120) ["taxonomy"]=> string(8) "category" ["description"]=> string(143) "Read our latest articles, tips and news on Compliance including GDPR, CCPA and other industry-specific regulations and compliance requirements." ["parent"]=> int(0) ["count"]=> int(40) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "5" } [2]=> object(WP_Term)#12103 (11) { ["term_id"]=> int(116) ["name"]=> string(9) "Email DLP" ["slug"]=> string(20) "data-loss-prevention" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(116) ["taxonomy"]=> string(8) "category" ["description"]=> string(144) "Read our latest articles, tips and industry-specific news around Data Loss Prevention (DLP). Learn about the implications of data loss on email." ["parent"]=> int(0) ["count"]=> int(99) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "4" } [3]=> object(WP_Term)#12102 (11) { ["term_id"]=> int(2) ["name"]=> string(31) "Integrated Cloud Email Security" ["slug"]=> string(20) "human-layer-security" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(2) ["taxonomy"]=> string(8) "category" ["description"]=> string(301) "Integrated Cloud Email Security solutions were introduced as a new category, and positioned as the best defense against advanced phishing threats that evade traditional email security controls.  Learn more about what they are, the benefits of using them, and how you can best evaluate those on offer." ["parent"]=> int(0) ["count"]=> int(138) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [4]=> object(WP_Term)#12101 (11) { ["term_id"]=> int(486) ["name"]=> string(17) "Data & Trends" ["slug"]=> string(11) "data-trends" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(486) ["taxonomy"]=> string(8) "category" ["description"]=> string(0) "" ["parent"]=> int(352) ["count"]=> int(1) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "3" } [5]=> object(WP_Term)#12100 (11) { ["term_id"]=> int(341) ["name"]=> string(13) "Insider Risks" ["slug"]=> string(13) "insider-risks" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(341) ["taxonomy"]=> string(8) "category" ["description"]=> string(154) "Access Tessian's library of free data exfiltration posts, guides and trend insights. Acidental data loss, insider threats, and misdirected emails content." ["parent"]=> int(490) ["count"]=> int(39) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "2" } [6]=> object(WP_Term)#12099 (11) { ["term_id"]=> int(433) ["name"]=> string(14) "Remote Working" ["slug"]=> string(14) "remote-working" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(433) ["taxonomy"]=> string(8) "category" ["description"]=> string(163) "Access free tips from security leaders and new research related to remote working and hybrid-remote structures. Level-up your cybersecurity for a remote workforce." ["parent"]=> int(116) ["count"]=> int(16) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [7]=> object(WP_Term)#12098 (11) { ["term_id"]=> int(384) ["name"]=> string(7) "Podcast" ["slug"]=> string(7) "podcast" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(384) ["taxonomy"]=> string(8) "category" ["description"]=> string(345) "Cybersecurity podcast series on the human factor, discussing why we need to focus on people - not just machines and data - to stop breaches and empower employees. Tim Sadler, CEO of Tessian meets with business, IT and security leaders to flip the strict on cybersecurity and share best practices, cybersecurity challenges, threat intel and more." ["parent"]=> int(2) ["count"]=> int(9) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [8]=> object(WP_Term)#12097 (11) { ["term_id"]=> int(411) ["name"]=> string(14) "Threat Stories" ["slug"]=> string(14) "threat-stories" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(411) ["taxonomy"]=> string(8) "category" ["description"]=> string(155) "Tessian Threat Intelligence and Research team uncovers trends and insights in email security related to phishing, social engineering, and more. Learn more!" ["parent"]=> int(0) ["count"]=> int(24) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "3" } [9]=> object(WP_Term)#12096 (11) { ["term_id"]=> int(3) ["name"]=> string(22) "Advanced Email Threats" ["slug"]=> string(22) "advanced-email-threats" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(3) ["taxonomy"]=> string(8) "category" ["description"]=> string(166) "Get up to speed on the latest tips, guides, industry news and technology developments around phishing, spear phishing, Business Email Compromise, and Account Takeover" ["parent"]=> int(490) ["count"]=> int(156) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "6" } [10]=> object(WP_Term)#12095 (11) { ["term_id"]=> int(352) ["name"]=> string(15) "Life at Tessian" ["slug"]=> string(12) "team-culture" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(352) ["taxonomy"]=> string(8) "category" ["description"]=> string(149) "Learn more about Tessian company news, events, and culture directly from different teams. Hear from engineering, product, customer success, and more." ["parent"]=> int(0) ["count"]=> int(49) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "7" } [11]=> object(WP_Term)#12060 (11) { ["term_id"]=> int(435) ["name"]=> string(21) "Interviews With CISOs" ["slug"]=> string(21) "ciso-spotlight-series" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(435) ["taxonomy"]=> string(8) "category" ["description"]=> string(164) "Learn how to navigate the threat landscape, how to get buy-in, and how to break into the industry from these cybersecurity leaders from Shell, Penn State, and more." ["parent"]=> int(0) ["count"]=> int(33) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "8" } [12]=> object(WP_Term)#12061 (11) { ["term_id"]=> int(436) ["name"]=> string(16) "Engineering Blog" ["slug"]=> string(16) "engineering-blog" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(436) ["taxonomy"]=> string(8) "category" ["description"]=> string(134) "Tessian's engineering team shares tips for solving complex problems. Get advice related to QAs, 502 errors, team management, and more." ["parent"]=> int(352) ["count"]=> int(18) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [13]=> object(WP_Term)#12039 (11) { ["term_id"]=> int(434) ["name"]=> string(16) "Cyber Skills Gap" ["slug"]=> string(16) "cyber-skills-gap" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(434) ["taxonomy"]=> string(8) "category" ["description"]=> string(149) "Learn more about the cybersecurity skills gap and cybersecurity gender gap. Research and interviews with industry leaders and champions of diversity." ["parent"]=> int(435) ["count"]=> int(19) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } }
The ICO expands GDPR guidance to recommend a data loss prevention tool
by Meghan Brisson Monday, September 11th, 2023
Are you up-to-date on the latest data protection requirements? On Aug 30, the ICO released  new guidance for organizations to implement additional email protection like a data loss prevention tool, among other suggestions.  What is the TLDR?  In short, it’s important for organizations to recognize that email addresses can be personal information, and therefore must be treated with care when using CC and BCC functions appropriately.  In addition to staff training, organizations  should consider additional security measures when  handling and sending sensitive or confidential information.  Why is this important?  The ICO has seen hundreds of data breaches where a sender misused the BCC field. BCC can be a useful function to protect the identity of recipients, but it’s not enough to properly protect personal information within the body and attachments of the email. Especially when an email gets sent to the wrong recipient by mistake — a simple typo is all it takes for a potential data breach.  What security measures should be considered?  To balance employee productivity on email with security compliance, appropriate DLP controls need to be implemented, as well as staff training to help reduce human error. According to the ICO, there are a few alternatives to consider to ensure data security:  Set rules within your email system to warn users when they use the CC field. Set a delay to allow employees  time to correct their mistakes. Have robust internal reporting processes to allow key staff to quickly investigate, contain, risk-assess the seriousness of the situation, and notify the ICO, if required. The benefits of a Data Loss Prevention tool The ICO recommends training and rule-setting, but these manual checks aren’t fool proof. Instead, you can consider a data loss prevention tool to automate security checks and utilize AI to do the heavy lifting. This way you can protect your sensitive data, meet regulatory requirements, and train your employees in-the-moment — all with one solution. Check out the benefits: Stop sensitive data loss before it happens and eliminate the financial risk that comes with the reputational damage of a reported data breach. Create bespoke rules that remind employees to take extra protective measures when sending emails to a large number of recipients. Take comfort in knowing that real-time warnings are allowing employees to correct their mistakes. This not only builds a stronger security culture but also prevents data loss incidents. Learn more about Tessian Guardian Tessian Guardian automatically stops misdirected emails and mis-attached files and is the perfect solution to fit the ICO’s requirements and recommendations. Ready to learn more? 
Read Blog Post
Product Updates
Tessian Launches Automated Email Threat Remediation for Security Teams
Tuesday, August 1st, 2023
Automated classification, triage, and remediation for user-reported email threats that significantly reduces a security analyst’s time Integration with existing SIEM and SOAR platforms through the Tessian API to manage the email threat lifecycle using existing dashboards and workflows. Dashboards that display insights into email threats missed by existing solutions, top targeted users, and impersonated domains Updated visual design that includes dark mode to enhance readability in low light environments, while reducing eye strain for night shift security analysts Boston, MA – August 1, 2023 – Tessian,  the Complete Cloud Email Security platform, today announced the general availability of its Abuse Mailbox Response product – the second in its Respond product line. Also included in this release is API-based remediation, new email threat and DLP insights dashboards, and an updated visual design. Today’s security teams are limited by legacy secure email gateways that hinder their ability to combat email threats effectively. Tessian’s Abuse Mailbox Response uses machine learning to automatically classify, triage and remediate the ever mounting backlog of end-user reported email threats. Tessian’s API based remediation solution further saves security analysts time by allowing them to manage email based threats from their existing SIEM and SOAR platforms. These new insights into inbound and outbound email security simplify both the threat management and ROI reporting for security analysts. Hundreds of world leading organizations have moved beyond their secure email gateways, trusting the Tessian Cloud Email Security Platform which offers the industry’s most complete and innovative set of capabilities required for cloud email security:  Tessian Defend, Tessian Protect, Tessian Respond, and Tessian Coach. “We’ve long encouraged employees to report suspicious emails, but the increased reporting volume became a challenge for our limited staff,” said Steve Wingate, CISO at Ventra Health. “With Tessian, we get the full spectrum of defense for email based attacks, plus automatic prioritization for the handful of reported emails that end up being malicious. Innovations like these bring the daily time our security analysts spend on email threat investigation from hours to minutes.” “At Tessian, we recognize that security leaders are under increasing pressure to do more with less while facing a rapidly changing threat landscape,” said Allen Lieberman, Chief Product Officer of Tessian. “They’re asking for significant automation gains that help their analysts focus on higher impact threat detection and response efforts. Tessian is focused on delivering those efficiencies through a complete cloud email security platform, that uses machine learning to help our customers retire costly and labor intensive secure email gateways”. About Tessian Tessian’s mission is to secure the human layer by empowering people to do their best work, without security getting in their way. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital and Balderton Capital, and has offices in San Francisco, Boston and London.
Read Blog Post
Product Updates
What’s new: Abuse Mailbox Response, APIs, and dashboards
by Meghan Brisson Tuesday, August 1st, 2023
Tessian is running at full speed to provide you with smarter, faster email security. Our team has been busy building and enhancing the products you know and love — making it even easier to use for security professionals. Here are the latest updates from our product team.  Abuse Mailbox Response  When something looks phishy, you want your end-users to hit that “report phish” button. But what happens when your security team is inundated with reported threats? 90% of user-reported emails aren’t malicious. And while it’s better safe than sorry, Tessian is releasing a product that saves security analysts precious time by automatically identifying the handful of true threats that require human attention.  Abuse Mailbox Reponse uses machine learning to automatically classify, triage, and remediate user-reported emails so that security teams can focus on the threats that matter. It offers crowd-sourced detection, enabling automatic quarantines when multiple users report the same email threat. And it also provides custom communications options for end-users who report, making feedback loops between security and end users even stronger.  For example, a reported email will be classified as malicious, safe, or spam based on a number of factors that extend beyond the machine learning model. How good is the user at reporting? What percentage of users have reported it? After the email is remediated, the reporter will receive a customizable, automatic response. This message encourages users to keep reporting and educates when the email was found to be safe.  Even better, there is no change to the end-user experience during roll-out. Any existing report-phish buttons will work with the Abuse Mailbox product.   With this product, security teams save hours a day on manual classification. It’s significantly faster than legacy systems that rely on rule-based protection and manual inspection: A 5,000- user organization sees about 1,400 reported emails each month, on which they spend about 700 hours on manual investigation and remediation. Tessian reduces manual review by 90% Tessian accelerates investigation time by 80%   Abuse Mailbox Response is the second product release in the Respond product line, following Investigate and Respond from April 2023.
Remediation API We are always striving to make security analysts’ lives easier by reducing context switching, and enabling automated workflows. In this release, we’re beginning our journey toward full lifecycle email threat remediation via API, enabling analysts to remediate email based threats without leaving their SIEM/SOAR platforms.  The API allows the  flexibility to streamline workflows in one convenient location, and eventually submit investigation outcomes to improve the detection algorithm within the same portal.
Quarantine without Notification This product update provides even more control for security admins using Tessian Defender. At a certain confidence level, they can remove an email all together without sending a warning to the end user. This quarantine logic also creates less friction and noise for end users. Emails that do not meet the quarantine logic can be silently tracked.
New Dashboards and Dark Mode We have also released new dashboards for unified email security reporting:  Overview Insights Dashboard Data Loss Prevention Dashboard Threat Insights Dashboard The overview dashboard is a simplified view, pulling results from the more detailed dashboards discussed below.  The Data Loss Prevention Dashboard displays accidental data loss, data exfiltration, custom policies, and industry benchmarks.   The Threat Insights Dashboard provides even more insights on the threats that Tessian is catching. You can see what email attacks bypassed your SEG and Microsoft email security. Business email compromise, account takeover, and brand impersonation attacks are displayed. And junk and spam emails can be pre-filtered from view to streamline results.  In this dashboard, admins can view the top users being targeted by phishing attacks as well as top impersonated and malicious domains. Ever wonder how much time you’re saving using Tessian? The dashboard now offers a quantified estimate of hours saved.  And finally, a setting our customers have been asking for — dark mode. Tessian is now available in dark mode to reduce eye strain and blue light exposure while providing flexibility for user preferences.
Read Blog Post
Integrated Cloud Email Security
From on-prem to cloud: Supporting your email security journey
by Meghan Brisson Monday, July 31st, 2023
In today’s fast-paced digital era, businesses are continually seeking ways to enhance productivity, streamline operations, and improve data security. Email communication has experienced drastic transformation with many businesses leaving behind on-premises legacy systems to experience the benefits of the cloud.  But choosing the right email security solution can seem daunting. WIth countless platforms offering protection from evolving cyber threats, it seems almost impossible to keep up or know what to choose. You might be asking the question, “How do these products work with my current tech stack?” or “Is my business ready to make the leap?” This blog will act as a guide, showing how complete cloud email security can support businesses at each stage of their digital transformation journey while ensuring robust protection.  Stage 1: Assessing the need for change The first step in transitioning to the cloud is recognizing the limitations of a legacy system. On-premises email providers require extensive hardware investments, maintenance, and IT resources to keep them running smoothly. They may lack scalability, flexibility, and advanced security features required to combat evolving cyber threats. By evaluating these shortcomings, businesses can begin the shift towards a cloud-based system.  Stage 2: Choosing the right cloud providers Before the migration, it’s important to understand your lineup of technology tools. What solutions will you need on-top of your email provider? Which integrations will make the transition seamless and extra valuable? Let’s start with Microsoft.  When selecting the right cloud provider, you’ll want to look for a track record in email security. Look for data encryption practices, infrastructure redundancy, and perhaps most importantly, protection against email attacks and data breaches.  For base-level protection, businesses may layer a secure email gateway (SEG) on top of their email provider. The SEG works with Microsoft to provide rule-based protection against attacks. But rules can’t catch everything. Microsoft has now invested in native security controls, so an additional SEG is no longer needed. Instead, you can go beyond the SEG with a behaviorally-intelligent integrated cloud email security solution (ICES). An integrated cloud email solution can catch the advanced attacks that bypass Microsoft and a SEG.
Stage 3: Migrating data to the cloud  Whether you are moving to a hybrid setup or fully in the cloud, migrating data will require careful planning and execution. It’s important to have the cloud provider’s support team with you for every step of the way. When exploring industry reviews, look beyond product efficacy for mentions about customer support.  Stage 4: Leveraging advanced security features  When considering your email tech stack, think about the future of your business. As you scale, can your software grow with you? As attacks get more sophisticated, will your inbox stay safe? The effectiveness of legacy approaches to email security has been declining for quite some time, with email being responsible for over 90% of cyber attacks. This is where the power of artificial intelligence and machine learning come to play. When attackers outsmart the pre-built rules, how can you ensure your protection is already one step ahead? Tessian takes a unique approach to securing people using email. Through a combination of machine intelligence, deep content inspection, stateful mapping of email relationships, and behavioral analysis, Tessian turns your email data into your biggest defense against security threats and stops the type of threats you can’t make a rule for.  How Tessian can help from Stage 1 Tessian can be on your journey at any stage whether on-premise, hybrid, or fully in the cloud. No matter where you are on your digital transformation journey, Tessian can help.  Tessian has multiple deployment methods (Modern Microsoft Add-in, API, or Gateway) to cover any email infrastructure at any stage of the cloud journey.  Most importantly, you don’t have to wait until after your cloud-migration to implement a tool like Tessian. By layering it on top of your existing email security strategy, you will ensure no gaps in coverage while you migrate key features — like rules, safelinks, and email authentication — from your SEG to your E3 or E5 Microsoft licensing. Tessian has your back.
Read Blog Post
Integrated Cloud Email Security, Life at Tessian
Tessian Named a Strong Performer in The Forrester Wave™: Enterprise Email Security, Q2 2023.
by Tessian Monday, June 12th, 2023
Forrester has named Tessian a Strong Performer in The Forrester Wave™: Enterprise Email Security, Q2 2023. In this research, Forrester evaluated 15 enterprise email security solutions and provided a detailed overview of the current offering, strategy, and market presence of these vendors, to help security teams select the right solution for their email security needs.  In an ever-changing threat landscape where duplicative rule-based legacy email security tools are failing to stop advanced email attacks, and cannot detect very subtle employee-driven data loss, security teams are looking for a solution which can address the full spectrum of evolving threats on email.  This Forrester Wave™ report conducts a 26-criterion evaluation of enterprise email security providers by identifying, researching, analyzing and scoring the most significant ones. The research provides a guide for buyers considering their purchasing options and demystifies the complex email security market consisting of point solutions, legacy rule-based gateways, incumbents and next generation tools which span the full range of email security functionality.  In the report, Forrester has declared “email security is now entering a golden age after stagnating for the better part of a decade.” and Tessian agrees. Now is the time to assess your existing email security stack.  The Forrester report advises that, “…enterprise email security customers should look for providers that: Offer flexibility in deployments and integrations Make it easy for security teams to respond Look beyond email to deliver holistic human protection” Tessian Receives the Highest Possible Score in the “Vision” Criterion According to the Forrester report, “Tessian has refined its superior vision to not only focus on protecting the human layer but also to frame email security as a means to elevate security culture within organizations.”  When it comes to elevating the security culture within the enterprise, we at Tessian recognize that automatic email defense is only part of the email security problem that security professionals are facing today. In order to provide the most complete email security, Cloud-native, API-enabled email security (CAPES) solutions shouldn’t solely focus on inbound email security, but should also make it easy for security teams to respond to those inbound security events with speed and ease. Tessian’s vision is to empower security teams by providing the most complete CAPES solutions in the market, that eliminates human influenced cyberattacks, accidents, and insider threats from the enterprise. This means defending against inbound email threats, protecting the enterprises most sensitive data from being lost via email, coaching end-users to drive better security decisions, and most recently, helping security teams respond to email security incidents faster and more efficiently. Tessian recently launched a new product offering, Tessian Respond, dedicated to enabling security teams to quickly identify and respond to email threats with powerful threat hunting capabilities and the automated response to end-user reported emails. Security teams benefit from Tessian Respond by spending less time triaging across multiple legacy email security solutions, manually remediating email threats with PowerShell scripts, and maintaining an overwhelming list of reactive rule-based prevention policies. Tessian Respond makes it easy for security teams to quickly pivot between email security events and response workflows to better understand the full scope of an attack, and to make an informed response decision based on the complete risk exposure, without having to jump between multiple different loosely connected consoles to perform simple remediation tasks. Faster response workflows integrated directly into email threat prevention, paired with automated response to end-user reported email such as false positives or spam, save security teams significant labor-hours by reducing the quantity of alerts that require investigation, while also improving the quality and efficiency of each investigation. While security teams are focusing their time investigating legitimate high risk security events, Tessian takes the opportunity to not only auto-remediate end-user reported emails, but also provide in-the-moment coaching to continuously elevate the end-users security risk awareness. The Forrester Wave™ research states “awareness and training efforts must move beyond standard phishing testing and compliance checkbox courses to adaptive human protection, like real-time “nudges” to encourage vigilance and secure handling of sensitive information.”  At Tessian, we enable security teams to transform an employee’s inbox into a personalized security awareness platform without impeding end-user productivity.   Through in-the-moment training and contextualized warning banners on suspicious emails and risky data loss attempts, Tessian coaches the end-user and builds stronger security cultures within enterprises.  
But email is just one of the many facets of an enterprise’s cyber security posture – security teams at large enterprises typically manage around 64 security tools on average. The Forrester Wave™ research report notes that some customers showed “a preference to feed the telemetry from one or more email security solutions into security analytics tools to initiate investigation and response actions”.  Our integration with SIEM and SOAR platforms facilitates the streamlining of processes and workflows, saving security teams time in pivoting between multiple tools for threat analysis and security event reporting.  As Tessian continues to deliver on its superior vision in today’s remote world, the future of holistic human protection expands beyond just email. Tessian’s DLP capabilities within the email space allow organizations to ensure sensitive information is not lost – be it by accident, with malicious intent, or pure negligence towards internal data privacy policies. Expanding data loss risk prevention across file sharing services and cyber defenses to messaging and collaboration applications is the next step in Tessian’s vision to secure the human layer, empowering people to do their best work, without security getting in the way. And as the Forrester report suggests, “S&R pros interested in linking email security with security coaching and culture should consider Tessian as an additional (human) layer of protection.” Tessian Receives the Highest Possible Score in the “Support and Customer Success” Criterion The Forrester evaluation also reported Tessian received the highest possible score in the Support and Customer Success criterion, citing that, “Reference customers are happy with Tessian’s support and willingness to customize features as well as its easy-to-use interface…” Across over 450 global customers, security professionals and end-users alike agree that Tessian has elevated their organizations’ security culture. Here are some quotes from our customers, independent of the Forrester evaluation:  “Really easy to work with, brilliant solution to offer that multiple layers of technology to protect against advanced threats both inbound and outbound” “Integration and implementation is simple. Integrations with other products are huge. Customization of products is unbelievable.” “Now I can find everything I need in one platform. Before Tessian Respond, it would take me 10-15 minutes just to log into the different Proofpoint platforms and then do the searches. Now with Tessian, it only takes 2-3 minutes and that’s mostly because I need time to read all the information Tessian is providing about the potential email threat.”
Additional Resources To read… The Forrester Wave™: Enterprise Email Security, Q2 2023 report, visit here. Forrester Consulting study of a 268% ROI via The Total Economic Impact™ Of The Tessian Cloud Email Security Platform (commissioned by Tessian, July, 2022), visit here. Tessian’s Press Release about this industry recognition, visit here. About Tessian Tessian’s mission is to secure the human layer by empowering people to do their best work, without security getting in their way. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital and Balderton Capital, and has offices in San Francisco, Boston and London.
Read Blog Post
Integrated Cloud Email Security, Life at Tessian
Tessian Named a Strong Performer in Enterprise Email Security by Independent Research Firm
by Tessian Monday, June 12th, 2023
Tessian, a Cloud-Native, API-enabled Email Security (CAPES) company, received the highest scores possible in the Vision, Support and Customer Success criteria according to report.   BOSTON, Massachusetts – June 12, 2023 – Tessian, Inc. today announced that it has been named a Strong Performer by Forrester Research, Inc. in The Forrester WaveTM: Enterprise Email Security, Q2 2023 – The 15 Providers That Matter Most And How They Stack Up. According to the Forrester report, “S&R pros interested in linking email security with security coaching and culture should consider Tessian as an additional (human) layer of protection.”  As the Forrester report states, “Tessian has refined its superior vision to not only focus on protecting the human layer but also to frame email security as a means to elevate security culture within organizations. Roadmap items include expanding DLP capabilities to file-sharing applications; API-integrated remediation orchestration with major SIEM, SOAR, EDR, and XDR players; and expansion of protection to messaging and collaboration applications.”  In Forrester’s evaluation of the Enterprise Email Security Space, Forester suggests “email security customers should look for providers that:  Offer flexibility in deployments and integrations.  Make it easy for security teams to respond.  Look beyond email to deliver holistic human protection.”  Tessian’s recognition as a Strong Performer in The Forrester WaveTM: Enterprise Email Security report comes on the heels of Tessian’s two most recent major announcements at RSA Conference 2023 this past April. First, as the First Email Security Platform to Fully Integrate with M365 by integrating via both M365 Add-In (Office Add-In) and M365 API (Microsoft Graph API), on top of Tessian’s existing deployment/integration options. April also delivered Tessian’s Official Launch of Advanced Email Threat Response capabilities, Tessian Respond, offering a dramatically faster solution that quickly identifies and responds to email threats through proactive threat hunting capabilities and automated response to end-user reported emails.  “Tessian’s vision is to secure the human layer, empowering people to do their best work without security getting in the way, by eliminating human influenced cyberattacks, accidents, and insider threats from the enterprise.”, said Tim Sadler, Co-Founder and CEO at Tessian, “Our product strategy is to provide the most complete CAPES solution in the market, by not solely focusing on inbound email security, but also offering outbound data loss prevention, real-time security coaching, and the fastest response capabilities in the enterprise email security space.” Additional Resources  To read…  The Forrester WaveTM: Enterprise Email Security, Q2 2023 report, visit here Forrester Consulting study findings of a 268% ROI via The Total Economic ImpactTM Of The Tessian Cloud Email Security Platform (commissioned by Tessian July, 2022), visit here Tessian’s blog about this industry recognition, visit here About Tessian  Tessian’s mission is to secure the human layer by empowering people to do their best work, without security getting in their way. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital and Balderton Capital, and has offices in San Francisco, Boston and London.
Read Blog Post
Security Awareness Coaching, Beyond the SEG / Microsoft + Tessian, Integrated Cloud Email Security, Advanced Email Threats
Latest Microsoft Report Confirms Need for AI-Based Phishing Protection
by Bob Boyle Tuesday, May 30th, 2023
Nearly all forms of Business Email Compromise (BEC) attacks are on the rise, according to the fourth edition of Microsoft Threat Intelligence Cyber Signals published last week. In the latest Microsoft research for phishing protection, Microsoft Threat Intelligence Digital Crimes Unit (DCU) detected and investigated 35 million BEC attempts between April 2022 and April 2023, or 156,000 attacks every day. The FBI Internet Crime Report 2022 also found that BEC attacks were responsible for over $2.7 billion in losses last year alone. Microsoft saw an increase in both the sophistication of attacks and the tactics used by adversaries in BEC attacks. Cybercrime-as-a-Service organizations enable advanced phishing techniques at scale for bad actors, allowing them to easily circumvent traditional detection methods like “impossible travel” flags and malicious URL detection.  According to the Microsoft Threat Intelligence Cyber Signals report, BEC attacks stand apart in the cybercrime industry for their emphasis on social engineering and the art of deception. The report goes on to explain that, rather than targeting software vulnerabilities, BEC attacks exploit the daily sea of email traffic to lure victims into providing financial information or taking action which unknowingly helps criminals perform fraudulent money transfers. 
Key Findings by Microsoft Threat Intelligence Digital Crimes Unit from April 2022 to April 2023:   35 million annual BEC attempts detected and investigated  156,000 daily BEC attempts detected and investigated   417,678 unique phishing URL takedowns   38% increase in Cybercrime-as-a-Service targeting business email [2019 – 2022]   BEC threat actors increasingly purchase credentials and local IP addresses from end-to-end Cybercrime-as-a-Service (CaaS) providers to evade traditional detection methods Top Targets for BEC Attacks:   Executives & Senior Leadership   Finance Teams & Management   HR Staff with access to employee records (i.e. Social Security numbers, Payroll, and other PII)   New employees less likely to verify unfamiliar requests via email Top Trends for BEC Attacks in 2023 (January to April)   LURE attacks (Legacy URL Reputation Evasion)   Payroll/Invoice attacks   Gift Card Requests   Business Information Requests Defending Against BEC Attacks – Microsoft’s Recommendations The Microsoft Threat Intelligence Cyber Signals report discusses many best practices that organizations can implement in the fight against BEC, but their recommendations can really be boiled down into two key initiatives:     Enhancing existing defenses through AI-based phishing protection    Training employees to better spot BEC attacks in real-time
Microsoft + Tessian – Better Together Tessian’s Complete Cloud Email Security Platform is an ICES solution that defends against advanced email threats, protects your most sensitive data from being lost via email, helps security teams respond to email security incidents faster and more efficiently, all while coaching end-users to drive better security decisions in real time. Organizations leveraging Microsoft’s native email security capabilities along with Tessian find the most complete cloud-based AI-driven email security coverage for defending against BEC attacks.  Aligning with the recommendations in the most recent Microsoft Threat Intelligence Cyber Signals report, Tessian enhances Microsoft’s native email security capabilities by leveraging behavioral based AI detection for more effective prevention against social engineering attacks. Tessian also offers customizable, bespoke in-the-moment security coaching that encourages end-users to take a step back and consider the potential risks and costs associated with successful BEC attacks.  To learn more about how organizations are pairing Microsoft + Tessian for the most complete email security protection, download our Tessian + Microsoft 365 Solution Guide.  
Read Blog Post
Product Updates, Advanced Email Threats
Unlock Email Security Visibility Within Splunk
by Seema Shah Thursday, May 11th, 2023
Security teams are deploying an increasing number of security tools to defend against the rapidly evolving threat landscape and protect against data loss. Each security tool generates granular insights into a business’s cyber risks, events and incidents. Security teams at large enterprises typically manage 64 security tools on average, which leads to high overhead and little room for active investigation. Even with a comprehensive security stack, teams face increased need to gain consolidated visibility and improve their business’s cyber security posture. It is no surprise that a third of security teams (33%) feel as though they are being drained of time because of administrative tasks and 70% of SOC teams feel emotionally overwhelmed.  Cybersecurity has become a boardroom issue and needs to be communicated effectively to stakeholders throughout the business. Security teams find themselves spending over half their time producing reports across a number of different security tools in an effort to paint an accurate picture of their cyber security controls and their contribution to risk reduction.  Drowning in data?  The true value of a well curated security stack is amplified through consolidation of data from separate applications focused on specific security problems to form a holistic picture of an organization’s investment in the protection of their core assets and customers’ data.  Today Tessian has released an native application for Splunk® Enterprise and Splunk Cloud customers which allows security teams to ingest data from the Tessian Cloud Email Security Platform into their Splunk instance, enabling them to gain further visibility of security events across multiple tools in one place. As a well-established leader in Security Information and Event Management (SIEM) Splunk empowers organizations to collect, analyze, and visualize data at scale.  When customers consolidate Tessian’s email security data with other solutions within Splunk Enterprise and Splunk Cloud, it enables the streamlining of processes and workflows and provides a more contextualized and complete risk profile of their environment, down to the employee level.  The Tessian Splunk integration allows security events and more to be ingested into Splunk Enterprise and Splunk Cloud, and facilitate the following crucial use cases: Advanced threat analysis for email based attacks  Email continues to be one of the most significant risks in any organization. In 2022 phishing and business email compromise cost an organization, on average, $4.9 million per year—ten times the cost of DDOS and ransomware attacks combined.  Customers can leverage Tessian event data within Splunk Enterprise and Splunk Cloud to correlate email-based threats with other security events across an organization. Splunk collects and analyzes data from any source set up by the security teams, including network traffic, system logs, and endpoint security solutions, to create a comprehensive view of security threats. This holistic approach enables security teams to identify patterns and trends in cyber-attacks and potential risks for data loss, which can help to prevent future incidents and will accelerate diagnostics of the extent of any attack.
Unified and Customizable Reporting  The ability to efficiently monitor, analyze and correlate every data point associated with a security event in one place is instrumental to enabling security teams to take a more proactive approach to tackling the issue of advanced threats and data loss on email. A unified view of cyber risk driven by clear reporting not only saves a security teams’ time but also improves cyber risk management.  The customizable dashboard building experience of the Splunk platform provides visibility into email security events, enabling security teams to quickly identify and analyze threats, whilst factoring in insights from other security tools. The dashboards and data views can be customized to meet specific business needs such as team, business or compliance KPIs, drive boardroom conversations and tactical decision making. Tessian customers have used the Splunk platform to triage email security events, prioritizing key actions for team members to efficiently and effectively manage their operations.  Ultimately, the Tessian Splunk Integration allows security teams to:  Gain a unified view of email security data within the context of data from many different security tools to provide holistic picture of threats to the business Save security teams hours on manual reporting, giving them time to focus on actions and investigations  Mature the reporting process with customized dashboards for risk committees, insider threat programs and executive teams  Build Tessian data into security operations workflows, automating threat team notifications, incident reviews and user follow ups By combining the Tessian Cloud Email Security Platform which protects against advanced threats and data loss on email, with Splunk software’s analysis and automation capabilities, security teams can significantly raise the efficiency of their threat and risk management processes.
Read Blog Post
Life at Tessian
Tessian Launches Advanced Email Threat Response Capabilities for Security Teams
by Tessian Tuesday, April 25th, 2023
Dramatically faster solution that quickly identifies and responds to email threats through proactive threat hunting capabilities and automated response to end-user reported emails.  Quickly pivot between email events and prioritize response workflows through powerful search queries. Continuously improve prevention via a feedback loop to Tessian’s behavioral based AI detection. Boston, MA – April 25, 2023 – Tessian, a leading Integrated Cloud Email Security company, today announced the general availability of Tessian Respond, a major improvement in how security teams identify and respond to email threats compared to traditional secure email gateway solutions.  Security teams today face a backlog of end-user reported email threats, missed attacks by traditional controls, and spend too much investigating and remediating individual emails. Tessian Respond enables security teams to quickly identify and respond to all email threats by offering proactive threat hunting capabilities and enabling response and remediation for end-user reported emails. Security admins can now use powerful search queries that leverage intelligence and threat indicators from across the entire Tessian platform. Hundreds of world leading organizations trust the Tessian Cloud Email Security Platform which offers the industry’s most complete set of capabilities required for cloud email security: Tessian Defend, Tessian Protect, Tessian Respond, and Tessian Coach, in a simple to deploy model.  “At Tessian, we are focused on helping our customers eliminate email based threats,” said Allen Lieberman, Chief Product Officer of Tessian. “As customers pivot to cloud based email platforms, they are reconsidering their email security stack to prevent more threats and simplify operations.  With the introduction of Tessian Respond, combined with our existing Defend, Protect, and Coach capabilities, Tessian has established a platform that can be deployed in minutes, dramatically reducing email based risk and greatly simplifying operations”.  “Tessian stops email threats, including Phishing, Business Email Compromise and attacks that could lead to Ransomware or Credential theft on a daily basis,” said Jason Patterson, Senior Director of InfoSec, Compliance and Risk Management at Nasuni. “Without Tessian, these threats would have reached our end users. The platform is easy to use for both administrators and end users. However, investigating the larger impact of an email threat used to take 20 minutes or longer, due to pivoting between multiple tools and powershell scripts. With Tessian Respond, we can now pivot directly from a security event to an investigation in the Tessian platform that allows us to quickly understand the broader risk and remediate the full attack campaign in just a few clicks”. About Tessian Tessian’s mission is to secure the human layer by empowering people to do their best work, without security getting in their way. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital and Balderton Capital, and has offices in San Francisco, Boston and London.
Read Blog Post
Life at Tessian
Tessian is First Email Security Platform to Fully Integrate with M365 To Provide Threat Protection and Insider Risk Protection
by Tessian Tuesday, April 25th, 2023
First to deliver a fully integrated deployment experience of the Microsoft Graph API and M365 Add-in to protect against both email threats and insider risk Deploy complete email security in minutes via Tessian’s integration with Microsoft 365 Simplified experience for end-users with native Office 365 integration Boston, MA – April 25, 2023 – Tessian, a leading Integrated Cloud Email Security company, today announced the release of a new M365 Add-in, simplifying the deployment of the Tessian Cloud Email Security Platform. Tessian’s M365 Integration is the first to offer click-through deployment that combines both Microsoft’s Graph API and Office Add-In to provide email threat protection and insider risk protection in minutes, without the need to deploy or maintain client-side code or a gateway. Many security teams today are moving to M365 environments and trying to secure their enterprise from email threats and data loss without impacting end-user experience. Historically, legacy email security tools used time consuming and complex deployment mechanisms like client-side code and gateways. These legacy methods could cause disruption to mail flow, required ongoing maintenance, and often provided poor end-user experiences. Tessian is solving these problems by enabling the full deployment of the Tessian Cloud Email Security Platform through the combination of two native Microsoft integrations – Graph API and Office Add-In –  which are deployed via an intuitive, click-through process. Customers can deploy complete email security in minutes without the traditional deployment challenges of email disruption, ongoing maintenance, changing MX records, or client-side code and gateways. Hundreds of world leading organizations trust the Tessian Cloud Email Security Platform, which now offers a simplified deployment and better end user experience for Microsoft 365 environments. With Tessian’s M365 Integration, including the newly available M365 Add-In, customers leveraging M365 benefit from the full capabilities of the Tessian Complete Email Security Platform to proactively secure email while offering an improved experience for end-users and security teams. “Many customers are moving to Microsoft 365 for their email platform,” said Allen Lieberman, Chief Product Officer of Tessian. “Tessian is leading the way with our integration across Microsoft technologies to deliver leading cloud-based email security and insider risk protection from the same platform, deployed in the simplest way possible.”  The M365 Add-in launch accompanies the launch of Tessian Respond to deliver a complete set of cloud email security capabilities – Tessian Defend, Tessian Protect, Tessian Respond, and Tessian Coach – all in a simple to deploy model.  About Tessian Tessian’s mission is to secure the human layer by empowering people to do their best work, without security getting in their way. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital and Balderton Capital, and has offices in San Francisco, Boston and London.
Read Blog Post
Integrated Cloud Email Security, Product Updates
Respond Faster. Prevent More.
by Bob Boyle Tuesday, April 25th, 2023
Tessian Complete Cloud Email Security Platform defends against inbound email threats, protects your most sensitive data from being lost via email, helps security teams respond to email security incidents faster and more efficiently, while coaching end-users to drive better security decisions When evaluating email security solutions, security professionals care about one thing over anything else: will this help us prevent more threats?  The irony is, security solutions themselves have become one of the main drivers as to why security teams aren’t preventing more threats in the first place. Legacy gateway solutions are time intensive, manual and inefficient – meaning security teams simply don’t have the time, tools or patience to effectively manage their email security posture. Security teams today often rely on rule-based prevention policies or end-user reporting to first identify email risk, and then use between 2-5 different security tools to perform investigation and remediation workflows. For every individual email threat, this process can take 30 minutes on average – and sometimes, more.  This means if an organization sees any more than 15 potential email threat alerts, one single security team member may lose a full day of work.
Between a backlog of end-user reported emails, attacks that have bypassed traditional controls and inefficient email response workflows, security teams spend too much time responding to advanced email threats. It can take days, due to archaic tooling and approval processes, for organizations to remove known malicious emails from an enterprise, exposing the company to extended risk.  In order to prevent more threats, security teams need a solution that will help them cut through the noise, enhance their risk detection, and increase their response efficiency. This is exactly why we’ve built Tessian Respond. 
Tessian Respond is the fastest solution for security teams to quickly identify and respond to email threats by offering threat hunting capabilities and the automated response to end-user reported emails. Tessian Respond makes it easy for security teams to quickly pivot between email security events and response workflows, to better understand the full scope of an attack and make an informed response decision based on the risk. 
Powerful search queries leveraging data and threat indicators from the entire Tessian platform – such as Subject, URLs, or even File Hash Values – now allow security teams to investigate if a single email alert is an isolated incident, or part of a broader attack campaign across the organization. End-user reported emails will be ingested from any existing report phish button and prioritized by highest risk using a combination of machine learning algorithms and customer defined policies. Tessian Respond automatically classifies end-user reported spam and false positives, which enables the security team to quickly focus their time on legitimate higher risk email threats.  The ability to quickly detect and identify email risk does not, however, completely solve the problem that security teams are dealing with today. In order to enable more prevention, security teams need the ability to remediate existing email threats… FAST. Tessian Respond gives security teams bulk remediation actions directly within investigation workflows to quickly remove threats from the environment and reduce the organization’s attack surface moving forward. With a continuous feedback loop directly into Tessian’s behavioral based AI detection algorithm, every email marked as malicious, reported as spam, and removed from the inbox  improves Tessian’s understanding of an organization’s normal email behavior and helps Tessian improve prevention overtime. Security teams will benefit from Tessian Respond by spending less time triaging across multiple legacy email security solutions, manually remediating email threats with PowerShell scripts, and maintaining an overwhelming list of reactive rule-based prevention policies. Tessian Respond gives security teams the freedom and flexibility they need to do what is most important to them: prevent more threats.
When evaluating email security solutions, security professionals can be confident in one thing over anything else: Tessian enables security teams to respond faster, and as a result, prevent more threats.
Read Blog Post
Beyond the SEG / Microsoft + Tessian, Product Updates
Tessian Launches Complete M365 Integration
by James Alliband Tuesday, April 25th, 2023
We are excited to announce the release of our M365 Add-In, simplifying the deployment of the Tessian Cloud Email Security Platform. Tessian’s M365 Add-In (Office Add-In) comes together with the M365 API (Microsoft Graph API) to offer the M365 Integration an industry-first click-through deployment with Microsoft 365 providing email threat defense and insider risk protection in minutes, without the need to deploy or maintain client-side code or a gateway. The decline of gateway security solutions The effectiveness of legacy approaches to email security has been in the crosshairs for quite some time, primarily due to the declining effectiveness of Secure Email Gateway (SEG) and the pervasiveness of threats hitting inboxes, with email responsible for over 90% of cyber attacks.  Now Gartner predicts that by 2025, 85% of organizations will embrace cloud-first principles. This rapid acceleration to the cloud has opened up a world of possibilities for seamless integrations with cloud security providers. Most enterprises adopt cloud-hosted productivity suites such as Microsoft 365, which natively provides SEG capabilities. But it’s more than just a duplication of capabilities. The rapid shift to the cloud and the ever-changing threat landscape has exposed a once sturdy and reliant email defense to become vulnerable and ineffective in safeguarding users and data from advanced threats and insider risks.  Today security leaders are abandoning their point solution demanding SaaS solutions that integrate with their cloud solutions—removing that once overburdening, legacy solution for a more intelligent and straightforward approach.  Rise of Cloud Email Security?
The email security market was on hold for years. But then, according to the Verizon Data Breach Report, in 2022, human error was responsible for 82% of breaches. On average, phishing and business email compromise cost an organization $4.9 million annually, ten times the cost of DDOS and ransomware attacks combined. The need for a new approach to email security is no longer a choice. These solutions have not disappointed. The Rise of Cloud API-Enabled Email Security. CAPES/ICES solutions that have capitalized on a market ready for change.  M365 Integration. Effortless for the security team. Today Tessian has introduced an Integration that places power back into the security team’s hands—integrating in seconds with your M365 environment, leaving you protected in minutes.  However, this Integration comes with a difference. As with most ICES vendors, they are integrated via a graph API into the cloud-productivity suite, focused only on threats coming into the organization. Because of this, they are still leaving the organization exposed to insider risks and sensitive data loss. They are still operating as a point solution, unable to replace legacy email controls fully.  Tessian’s M365 Integration is different. A new and simple integration consisting of the M365 API (Graph API) and M365 Add-In (Office Add-In) allows complete email protection against a wide range of threats. The Integration requires Mailbox API Connection and an XML manifest file to be uploaded to the M365 Admin center.
This deployment follows just a few simple steps: Enable connection to M365 Tenant Grant required permissions to enable email security  Add directory groups to sync  Add mailboxes by group, user, or both to protect required end-users. Download the M365 Add-In manifest file and upload it to the M365 Admin Center.
Once the API has synced and the manifest is deployed when a user next opens a supported Outlook client Tessian’s Cloud Email Security Platform protects them. What is an Office Add-In Office Add-Ins (sometimes called Web Add-Ins) allow 3rd parties to build solutions that extend to Microsoft 365 applications. These solutions can run in Microsoft 365 applications, such as Outlook, across multiple platforms, including Windows, MAC, iPad, and a browser. Office Add-Ins are deployed centrally in the M365 Admin Center and don’t involve rolling out client-side software or routing emails through a gateway. They have low management overhead, no complex configurations, and no manual updates meaning security teams can focus on what matters most—protecting their organization. Integration flows The M365 Add-In (Office Add-In) requires M365 API connections to be fully functional, which is why the M365 Integration exists. As both are required to secure an organization, Tessian has built them together to make deployment as simple and easy as possible.  This new level of protection means that when the email check process starts, the M365 Add-In intercepts the email, checks the email with the Tessian Cloud Email Security Platforms behavioral intelligence model, and then the result is returned, either allowing the email to be sent or showing a warning message to the end-user and preventing a potential data loss incident.
Mistakes happen, and end-users should know they are protected.  When end-users receive or send an email, they know an automated check will occur to prevent an advanced phishing attack from hitting their inbox. 
Likewise, when a mistake happens, such as autocomplete on an email address, an end-user is warned of the potential error to not only avoid the potential data breach, but they are coached in the moment.  If the email is okay, the email continues on to its desired destination.
The time is now Tessian is built with simplicity and speed to protection in mind. And when 82% of breaches are caused by human error, the time is now to ensure you have the best email protection deployed.  Hundreds of the world’s organizations trust the Tessian Cloud Email Security Platform, which now offers a simplified deployment and better end-user experience for Microsoft 365 environments.
Read Blog Post