Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

Trusted by world-leading businesses

A context aware, AI-based approach to defending against threats and protecting sensitive data on email.
Customer Q&A: Email Security in Financial Services

Tessian sat down with Schroder’s Chief Information Security Officer Rob Hyde to discuss how implementing Tessian has led the organization to stay proactive with their cybersecurity strategy.

Focusing on Security Basics with Game Changing Technology

Arm technology is at the heart of a computing and connectivity revolution that is transforming the way people live and businesses operate. Together with 1,000+ technology partners, Arm is at the forefront of designing, securing and managing all areas of computing, from the chip to the cloud.

Customer Stories

  • “Tessian is an important part of our overall security strategy and one solution that Rightmove employees can easily engage with to help keep them and the business safe from human error.”
    David Cray, Head of Customer Experience and Product Development, Rightmove
  • It just works. It is the only tool I’ve implemented that has had nothing but a positive response from lawyers.
    Ed Terry, Manager of Information Security, Caplin & Drysdale
  • Tessian catches the high-level phishing attacks. These are the ones that we can’t catch. The ones even IT has to really look for.
    Thierry Clerens, Global IT Manager, SPG Dry Cooling
    We see Tessian sitting alongside our existing security products, acting almost as an insurance policy. Set up to catch the small proportion of sophisticated attacks that other products miss.
    Erik Ruis, Head of IT, Polarcus
    With the new GDPR landscape, Tessian is a crucial component of our data breach prevention strategy. It proved its worth to us within a month of installation.
    Debbie Dolan, Operations Director, Morrisons Solicitors LLP
    We like that Tessian is more accurate and refined than any other tool we looked at to solve the problem of misaddressed emails
    Paul Greaney, Head of Information Technology, Vernalis
  • Tessian’s technology has transformed our security protocol. We used to manually monitor for personal addresses so we could ensure sensitive emails weren’t being sent outside of our organization. This process was laborious and not particularly effective, as it only looked at one potential security threat. This is a much more comprehensive and effective system.
    Kevin Strange, Head of Information Technology, Premier Miton Group
    Insurance professionals can only succeed if they have modern systems that enable timely and effective delivery of care. Tessian is a fantastic tool for enabling that fluidity of communication across the organization.
    Ian Brennan, Director of IT, Laya Healthcare
    They say security is a thankless job. But Tessian was the first security platform that we deployed across the organization where I personally received “thank you’s” from employees who would have made a mistake with potentially dire consequences, but didn’t because of Tessian.
    Elsa Ferreira, CISO, Evercore
    Tessian does what it says it does. Since deployment, we’ve seens a massive drop in security incidents and a massive drop in our risk.
    David Aird, IT Director, DAC Beachcroft LLP

Tessian Is Recognized in G2's Spring 2023 Report

get in touch

See Tessian in Action

Simultaneously we had a problem with prisoner drunkenness that we couldn’t figure out.