Using Quoted-Printable Encoding to Bypass Scanners

Phishers have a toy chest of tricks when it comes to building email campaigns. Oftentimes, what you read in the email body is represented by deceptive coding techniq...

Read more

Avanan Featured in G2's Best Of Lists

Like clockwork, we've appeared yet again on many of G2's Best of Lists for the Spring. 

Read more

Why Preventing Malware Before the Inbox is Critical

Avanan and Check Point operate under the principle that once a piece of malware enters your environment, it's already too late. That's why we practice prevention, no...

Read more

Can You BE-C It?

Here's how you know an email is a BEC.

Read more

The Nigerian Prince Scam, with a Russian Twist

The Nigerian Price Scam is a staple of the cybersecurity world. Essentially, someone claims to be in a position of influence or notoriety and needs to get a large su...

Read more

Dealing with Inbox Incursions–and the Wrath of the C-Suite

By now, you know what inbox incursions are. It’s when API-based email security solutions allow a malicious email into the inbox before remediating.

Read more

What It Takes to Be the Best Email Security Solution in the World

There are countless email security solutions that companies can choose from. First are the legacy players that rely on yesterday's gateway approach.  And now there a...

Read more

Why Cyber Insurance Will Start To Require Robust Email Security

One of our customers was looking to purchase cybersecurity insurance and was asked a few questions:

Read more

The Smoke and Mirrors Effect

When you're evaluating email security solutions, you need to ask a simple question: Do you prevent inbox incursions?

Read more

Avanan Receives 5-Star Rating in 2022 CRN Partner Program Guide

For the second year in a row, Avanan has received an exclusive 5-star rating in the CRN Partner Program. The Partner Program Guide is a definitive list of the most n...

Read more

The Importance of Shadow IT Protection

Avanan has a patent for Shadow IT discovery.

Read more

5 Security Measures You Need to Take to Keep Your Business Safe from Ransomware

Businesses are under attack, hackers are getting smarter, and the cost of a ransomware attack is going up. The average cost of an attack for small to medium size bus...

Read more

Hackers Begin Spoofing Fintech Apps As Tax Season Approaches

With tax season around the corner, it’s a rite of passage to expect tax-related spoofs. That can come in the form of spoofing the IRS or popular tax apps like TurboT...

Read more

Security Vendors Do What Their Technology Allows, Not What Customer Really Needs

At Avanan, we pride ourselves on blocking malicious emails before they reach the inbox. We accomplish this through our patented inline positioning. We are the only A...

Read more

The API Hidden Folder Trick

The hidden card trick is a classic staple.

Read more

Analyzing the Malware Wiper

A new form of malware is reportedly being deployed by Russia against Ukraine.

Read more

Secure Slack and Teams Before It's Too Late

When you think of phishing, you think of email.

Read more

Microsoft Teams: The New Red Phone

For decades, world leaders communicated via a secure line, the infamous red phone.

Read more

The 2022 Cyber Security Report from Check Point

The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. E...

Read more

How Avanan Stacks Up

Robbie Elliott is Check Point's Head of Engineering, US West. A CISO recently asked this question:

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial