Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

Executive Impersonation

An Impersonation attack is a social engineering based attack, where the attacker tricks the end-user into providing confidential information or taking a desired action (i.e. Gift Card Scams) by posing as a trusted colleague. 

Attackers often impersonate high level executives (aka Executive or VIP Impersonation) within the organization to gain credibility, and often target new joiners who may not yet understand the unusual nuances of the anomalous content within the attack.  
  • Statistics - this section needs a title

  • #1

    #1 reported cyber crime #1 reported cyber crime
  • $2.4 billion

    Estimated $2.4 billion in financial loss
  • $120k /attack

    Average cost $120k /attack Average cost $120k /attack

Attack Example - this section needs a title

Behavioral Detection #1 - Detects Anomalous Sender

Tessian complements Microsoft Purview with a simpler experience for end users and admins alike. Leveraging an M365 add-in, our machine learning pairs with admin defined rules to prevent messages from being sent to the wrong recipients, and sensitive data from leaving your organization.

Behavioral Detection #1 - Detects Anomalous Sender

Tessian complements Microsoft Purview with a simpler experience for end users and admins alike. Leveraging an M365 add-in, our machine learning pairs with admin defined rules to prevent messages from being sent to the wrong recipients, and sensitive data from leaving your organization.

Behavioral Detection #1 - Detects Anomalous Sender

Tessian complements Microsoft Purview with a simpler experience for end users and admins alike. Leveraging an M365 add-in, our machine learning pairs with admin defined rules to prevent messages from being sent to the wrong recipients, and sensitive data from leaving your organization.

Customer Case Study

  • Defend against inbound email attacks

    Tessian uses behavioral understanding and artificial intelligence to detect and prevent the full spectrum of email attacks.
  • Defend against inbound email attacks

    Tessian uses behavioral understanding and artificial intelligence to detect and prevent the full spectrum of email attacks.
  • Defend against inbound email attacks

    Tessian uses behavioral understanding and artificial intelligence to detect and prevent the full spectrum of email attacks.
Behavioral Detection #1 - Detects Anomalous Sender

Tessian complements Microsoft Purview with a simpler experience for end users and admins alike. Leveraging an M365 add-in, our machine learning pairs with admin defined rules to prevent messages from being sent to the wrong recipients, and sensitive data from leaving your organization.

get in touch

See Tessian in Action

Simultaneously we had a problem with prisoner drunkenness that we couldn’t figure out.