Email Hybrid Module for TRITON AP-EMAIL
Products: Email Security Gateway Anywhere;TRITON AP-EMAIL
| |
Description:
Forcepoint is pleased to announce that the following features are now generally available to TRITON AP-EMAIL version 8.x on-premises solution subscribers who also purchase the Email Hybrid Module:
This offer also applies to Email Security Gateway Anywhere version 7.8.x subscribers.
An additional subscription to the Email Sandbox Module (or the URL Sandbox) is no longer required to enable and use these 2 functions. URL Sandboxing Preventing users from accessing web sites that may contain malicious content is a critical component of an organization’s email protection. URL sandboxing provides important security to the enterprise and its end users when suspicious URLs, including uncategorized URLs, are delivered in email. When URL sandboxing is enabled and configured, a user who clicks on a suspicious or uncategorized link in an email receives a warning that the link may not be safe. The notification includes an option to analyze the web page. If the user chooses to analyze the page, TRITON AP-EMAIL real-time advanced security analysis is performed. If the page is not analyzed, the suspicious link is not examined, and the user is not allowed to access the page. One of the following messages may be returned:
Users may also receive an “access denied” notification if their organization does not permit them to browse uncategorized web pages.
For URL Sandboxing configuration information, please see the topic titled URL Sandbox in TRITON AP-EMAIL version 8.2 Administrator Help.
Phishing Education and Reporting Raising awareness among an organization’s end users about the characteristics of phishing email and how to avoid becoming a victim of phishing has become an important corporate goal. The phishing education and reporting feature provides cloud-based analysis of an inbound message for phishing email characteristics. In addition, TRITON Manager dashboard charts and presentation reports can be configured to display suspected phishing attack data or identify the users who have clicked known phishing links. Administrator-defined rules determine which sender domains are analyzed and how a suspected phishing email is handled. Suspect email may be treated like spam (blocked and saved to a spam queue), or clicking the phishing URL can lead to a message that educates the recipient about characteristics of phishing attack email. |