Please fill out this form to download your file

X

Secure Communications

Introducing Egress

With 74% of incidents involving a human element, people represent the greatest risk to organisations’ security. People are also most vulnerable when using email, with 94% of organisations experiencing inbound and outbound email security incidents in the last 12 months.

Consequently, solving human risk in cloud email is the most urgent priority for organisations globally.

Egress is the only cloud email security platform to continuously assess human risk and dynamically adapt policy controls, preparing customers to defend against advanced phishing attacks and outbound data breaches before they happen. Leveraging contextual machine learning and neural networks, with seamless integration using cloud-native API architecture, Egress provides enhanced email protection, deep visibility into human risk, and instant time to value.

Egress is the only cloud email security platform to continuously assess human risk and dynamically adapt policy controls, defending against advanced phishing attacks and outbound data breaches.

Detect and Prevent

Integrating seamlessly into Microsoft 365, the Egress Intelligent Email Security platform is made up of three products that empower customers to detect and prevent the full spectrum of advanced inbound and outbound email threats:

Egress Defend: AI-powered behavioural-based phishing detection

An integrated cloud email security solution (ICES), Defend uses zero-trust and pre-generative modelling to deliver the highest efficacy of phishing threat detection. By learning email behaviour patterns, Defend detects anomalies that are indicative of the advanced phishing threats that get through Microsoft’s native email security and secure email gateways (SEGs).  This allows Defend to detect email attacks early in the cyber kill chain, protecting against threats such as ransomware.

Defend’s self-learning detection technologies require minimal configuration and ongoing maintenance from admins. Plus, M-SOAR capabilities provide actionable intelligence for rapid incident response and remediation to reduce MTTR.

Additionally, advanced graymail detection increases employee productivity and reduces administrator burden. Leveraging Defend’s patented AI-based phishing detection functionality, Egress intelligently classifies graymail and moves it to a dedicated folder before it reaches the inbox. This ensures employees can focus on priority messages, while reducing the noise in the inbox by segmenting graymail. An interactive banner is added to each message that is routed to the graymail folder, which provides a simple workflow for employees to re-categorize emails and divert them

 

back into their mailbox. Users’ preferences are automatically learned by Defend, allowing users to customize their own experience without any management overhead

This avoids the potential for misclassification of legitimate email that comes with self-learning graymail detection systems, while eliminating administrative overhead for graymail management.

Egress Prevent: intelligent email data loss prevention

Prevent uses supervised and unsupervised machine learning to proactively stop email data loss and data exfiltration incidents before they happen. Through a combination of intelligent technologies (including machine learning, social graph, and contextual content analysis) Prevent detects anomalies that are indicative of human error or malicious intent. Contextual prompts engage users at the point of risk, enabling them to work efficiently and securely.

Egress Protect: Easy-to-use email encryption

Protect provides government and industry-certified security and authentication for protecting email content and attachments, including large files, in transit and at rest. Granular controls allow user flexibility and support low administration overhead while comprehensive audit and reporting helps meet regulatory requirements.

Automatic encryption ensures emails are secured based on your security policy. Flexible sender controls and recipient authentication options significantly reduce the user friction often associated with encryption to support widespread adoption. Protect’s AES 256-bit email encryption supports multiple use cases to align with your security policy. It also supports multi-factor authentication, customizable policy control, and access to secure information via mobile devices.

Adaptive Security Architecture for Cloud Email

Egress Intelligent Email Security is the only platform to provide adaptive security architecture for cloud email.  Egress partners with other security vendors to share intelligence, predict risk, and eliminate threats. Egress Human Risk Management aggregates product telemetry with data from across organisation’s cybersecurity ecosystems to offer continuous visibility into high-risk areas, with actionable advice and dynamic policy management. As individual risk scores change against the evolving threat landscape, Egress automates threat detection and response, tailoring controls for each employee. Bidirectional integration enables Egress’ intelligence to be used to enhance third-party solutions, such as auto-enrollment in security awareness training (SAT) programs based on the real phishing threats that users face.

In-the-moment training

Egress also provides in-the-moment training through real-time teachable moments. These ‘nudges’ are proven to be the most effective way to engage employees and sustainably improve security behaviour. A powerful combination of contextual banners and prompts provide in-the-moment education when people need it most. Our approach augments existing security SAT programs and measurably reduces risk over time.

Indicate a threat

In Defend, a dynamic colour-coded (heat-based) warning system immediately alerts users to the level of risk when interacting with an email. Simple language explains which aspects of an email indicate a threat, providing employees with coaching in context at the point of risk.

Stay alert

Egress Prevent presents users with a risk shield and side panel display that notifies them of potential risks with their selected recipients in real-time as they compose an email. If a user tries to send a risky email, an on-send prompt will alert them to the exact risk or error in their message and provide a suggested solution. Prompts naturally create friction for users and alert fatigue can diminish their response over time. Prevent will only prompt when a breach is about to occur.

Features and Benefits

Features

  • Detects and protects against both inbound and outbound email threats
  • Adaptive security architecture provides automatic security controls
  • Detects and neutralizes sophisticated phishing attacks that evade existing email security
  • Prevents misaddressed emails and incorrectly attached files
  • Intelligent detection of threats and anomalies with social graphing, machine learning, and natural language processing
  • Engages and empowers users with color-coded, contextual warnings and prompts
  • M-SOAR capabilities enable incident investigation and remediation

Benefits

  • A single platform that detects and prevents both inbound and outbound email threats
  • Adaptive security architecture prepares organizations for threats before they materialize
  • Lowers administration overhead with intelligent self-learning technology
  • Augments security awareness by engaging users at the point of risk with real-time teachable moments
  • Significantly lowers time to respond to and remediate email-related incidents
  • Proactive human risk quantification with actionable intelligence
  • Fast to deploy with immediate time to value

 

Please complete the form below to find out more.

Contact Us

    Contact Form Image

    What Our Clients Say

    “CyberWhite have been a pleasure to deal with by repeatedly demonstrating their professionalism and technical knowledge throughout the procurement process and execution of our project. From initially exploring our goals to a consultant working with us on-site and remotely, we’ve enjoyed a positive experience that has ultimately benefited our organisation and helped to improve our Cyber Security posture.”

    Read More
    Head of Network and Infrastructure

    View our video Testimonial from Clear Links by Gerard Norris, Central Operations Manager

    Gerard Norris, Central Operations Manager

    View our video Testimonial from Hays Travel by Ken Campling, Group Finance Director

    Ken Campling, Group Finance Director

    “I would like to say a thousand “thank you’s” to CyberWhite after rescuing us from the commercial disaster we faced after being subjected to a very sophisticated fraud. Without the timely involvement and expertise from CyberWhite, we would undoubtedly have faced catastrophic consequences including a significant financial loss and possibly a forced closure of the business. We will always remember the kindness and professional approach taken by the CyberWhite team. They were able to successfully recover the critical data which was the life blood of our business. This expertise has allowed us to continue trading and provided us with the additional benefits of ensuring that we are more cyber risk aware and we now have a security partner to support us.”

    Read More
    Jon Moore, Director

    Our video Testimonial from Mental Health Concern (NHS) by Lawrence Thompson, Head of IT

    Lawrence Thompson, Head of IT

    “As an Operator of Essential Services, PX Group comply with advice provided by recognised security bodies such as NCSC. The advice is relevant to all organisations who provide infrastructure or support to the UK’s critical national infrastructure. PX Group engaged CyberWhite to undertake Third Party Security Audits (aligned to ISO28000:2007) against key suppliers who had access to information assets within the PX Group domain. CyberWhite created a comprehensive audit document set and supported this with interviews and visits in order to validate responses. The output from CyberWhite was comprehensive and provided security assurance to PX Groups stakeholders and interested parties that the key suppliers had a focus on security and understood and could demonstrate best practices in relation to the handling of PX Groups information assets. This process has been invaluable in validating what we believed and providing a platform from which we will continue to assess, review and benchmark all parties in our information supply chain.”

    Read More
    Lee Farrow, ICT Network & Security Specialist