Complete Cloud Email Security
AI based defense to stop the most advanced email security threats.
Industry’s fastest email incident response capabilities
Automated classification, triage and remediation for end user reported emails.
AI based detection and customizable policies to automatically prevent insiders from exfiltrating data over email.
AI based protection and customizable policies to prevent sensitive data loss from misdelivered emails
Tessian’s machine learning uses twelve months of historical data from Microsoft and/or Google APIs to establish a behavioral baseline for each user. Tens of thousands of events over email create a strong foundation for normal vs. abnormal communications.
Behavioral Flag Examples:
- Display name change
- Irregular Employee Comms
- Unusual IP Addresses
Tessian’s machine learning identifies unusual text in images, QR codes, URLs, subject headings, body text, and inside of email attachments for potential threats. Hundreds of data points within each email are used to determine if the email is safe, malicious, or needs review. We use each of these data points to prevent similar attacks from bypassing defenses.
Content Flag Examples:
- Suspicious QR Codes and Images
- Password Reset Requests
- Urgent/Fraud call to action
The Tessian platform includes third party threat feeds and threat data from our customers to improve security across the network. Within minutes, Tessian can add malicious domains, urls, IPs, email addresses and file hashes from any source to prevent email based attacks. When Tessian flags emails as threats, or similar attachment hashes are seen in attacks within our network, we detect the same threat across the entire Tessian community automatically.
Threat Network Flag Examples:
- Flagged IP, URL, file hash
- False negative reports
- Tessian threat hunting