Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

Complete Cloud Email Security

Click the modules below to learn how Tessian delivers an AI-based approach to defending against advanced phishing threats and protecting sensitive data on email.
Tessian AI
Tessian AI

Tessian’s machine learning uses twelve months of historical data from Microsoft and/or Google APIs to establish a behavioral baseline for each user. Tens of thousands of events over email create a strong foundation for normal vs. abnormal communications.

Behavioral Flag Examples:

  • Display name change
  • Irregular Employee Comms
  • Unusual IP Addresses

Tessian’s machine learning identifies unusual text in images, QR codes, URLs, subject headings, body text, and inside of email attachments for potential threats. Hundreds of data points within each email are used to determine if the email is safe, malicious, or needs review. We use each of these data points to prevent similar attacks from bypassing defenses.

Content Flag Examples:

  • Suspicious QR Codes and Images
  • Password Reset Requests
  • Urgent/Fraud call to action

The Tessian platform includes third party threat feeds and threat data from our customers to improve security across the network. Within minutes, Tessian can add malicious domains, urls, IPs, email addresses and file hashes from any source to prevent email based attacks. When Tessian flags emails as threats, or similar attachment hashes are seen in attacks within our network, we detect the same threat across the entire Tessian community automatically.

Threat Network Flag Examples:

  • Flagged IP, URL, file hash
  • False negative reports
  • Tessian threat hunting