<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">

In this white paper, we break down ATP's security features for before and after an attack, examine the shortcomings of the platform, and compare it to the full-stack secu...

Read more

Executive Summary: The name Z-WASP references the zero-width space (‌) that hackers added to the middle of a malicious URL within the RAW HTML of the email. With al...

Read more

email-featured-atp-webinar

WEBINAR: How ATP Compares to Avanan

In this 40-minute webinar, we compare Advanced Threat Protection (ATP) to Avanan for securing Office 365. As we go through each of part of the ATP Security & Compliance Center, we ...

Read more

Avanan-vs-ATP blog-featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, which hackers bypa...

Read more

avanan-funding-featured

Avanan Raises $25 million to Revolutionize How Businesses Secure SaaS Email and Collaboration

View on Business Wire NEW YORK - December 14, 2018 –  Avanan, an enterprise security provider for SaaS based email and collaboration platforms, announced today that it has raised $...

Read more

Blog Post_Webinar Images (1)

How to Stop Reply-All Email Storms

Last week, Maria Peterson, a government employee in Utah, sent what she thought was an email inviting her colleagues to the annual holiday potluck. Instead, she accidentally invite...

Read more

securing-slack-webinar-fb-1200-628 (1)

WEBINAR: Securing Slack

Slack has been rapidly growing as the communication and collaboration tool of choice for organizations on the cloud. Unlike email, however, Slack threats and vulnerabilities are la...

Read more

Blog Post2FWebinar Images (2)

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well if you assume ...

Read more

Blog Post2FWebinar Images

5 Signs of a Compromised Account

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and settings point to th...

Read more

Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365 account is com...

Read more

slack-secure-featured

Is Slack Secure?

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations, it's replaced ...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Microsoft identifies...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or credential har...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

In this short video, we show you how to easily monitor successful logins to Office 365 from outside the United States. Although employee logins from outside the US are increasingly...

Read more

proxy-featured

Why Proxies Cause Security Vulnerabilities

Proxies have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies have become exceedingly...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

servicesource-logo.png

ServiceSource Secures the Cloud with Avanan

Background "If you don’t use Avanan, you’re not doing what you should be doing as a CISO.”

Read more

HIPAA-webinar-featured

WEBINAR: HIPAA Compliance in the Cloud

This webinar identifies challenges of enforcing HIPAA compliance in the cloud. Healthcare IT experts Vince Campitelli and Jeffrey Gardner talk with Avanan cofounder, Michael Landew...

Read more

Blog Post2FWebinar Images

Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications and Informatio...

Read more

HIPAA-WP-Featured

White Paper: HIPAA Compliance in the Cloud

Healthcare is migrating to the cloud, putting HIPAA regulations in a new context. This white paper identifies challenges of enforcing HIPAA compliance in the cloud, and offers tech...

Read more

14-DAY FREE TRIAL

Get 100% visibility into your cloud right now. No risk. No obligation. No effect on your users.

START YOUR  FREE TRIAL