<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">

To create the 2019 Global Phish Report, Avanan security scientists analyzed 55.5 million emails to surface key insights on how hackers target Office 365 and Gmail.

Read more

gfr-globe-news-wire

New Research Reveals that One Quarter of Phishing Emails Bypass Office 365 Security

Analysis of over 55.5 Million Emails by Enterprise Cloud-Native Security Firm Avanan Provides a Stark Picture of Threat Landscape

Read more

Screen Shot 2019-02-08 at 4.34.32 PM

Protecting Bethel School Disrict from Phishing and Malware with Avanan

Within the span of a few months during summer 2017, two major phishing attacks on Washington state school districts resulted in the theft of $50,000 worth of computer equipment, an...

Read more

dlp-webinar-featured

WEBINAR: Preventing Data Leakage in a Cloud Environment

In this webinar Avanan and GTB Technologies team up to show that with the right technology, cloud sharing doesn’t have to go hand in hand with cloud leakage.

Read more

Root Domain Exploit featured

Root Domain Hack Impacts 70% of Email Gateway Customers

Hackers are bypassing email security gateways and sending phishing emails directly to Google and Office 365 root domains. If you’re using a gateway, and your mail flow accepts emai...

Read more

avanan-wins-awards-featured

Avanan Wins Anti-Phishing Award from Cyber Defense Magazine

New York, March 11, 2019 — At the RSA Conference on March 4th, Cyber Defense Magazine announced Avanan as a recipient of the 2019 Infosec Awards, which honors "bold, innovative com...

Read more

mta-webinar-featured

WEBINAR: Why MTAs Are Yesterday's Technology

In this webinar, we take a critical look at MTA/SEG vendors like Proofpoint and Mimecast, and compare them to Avanan for securing Office 365.

Read more

featured image NoRelationship Phishing Attack

The NoRelationship Attack Bypasses Office 365 Email Attachment Security

Avanan identified a new phishing attack that bypasses EOP (Exchange Online Protection) URL filters, which scan Office documents like Word (.docx), Excel (.xlsx), and PowerPoint (.p...

Read more

2FA blog featured

Why 2-Factor Authentication Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work accounts, and make it ...

Read more

avanan-vs-atp-web-ft

WEBINAR: How ATP Compares to Avanan

In this 40-minute webinar, we compare Advanced Threat Protection (ATP) to Avanan for securing Office 365. As we go through each of part of the ATP Security & Compliance Center, we ...

Read more

atp-wp-featured

White Paper: How Avanan Compares to Microsoft ATP

In this white paper, we break down ATP's security features for before and after an attack, examine the shortcomings of the platform, and compare it to the full-stack security of th...

Read more

Z-WASP Image

Z-WASP Vulnerability Used to Phish Office 365 and ATP

Executive Summary: The name Z-WASP references the zero-width space (‌) that hackers added to the middle of a malicious URL within the RAW HTML of the email. With all these sp...

Read more

Avanan-vs-ATP blog-featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, which hackers bypa...

Read more

avanan-funding-featured

Avanan Raises $25 million to Revolutionize How Businesses Secure SaaS Email and Collaboration

View on Business Wire NEW YORK - December 14, 2018 –  Avanan, an enterprise security provider for SaaS based email and collaboration platforms, announced today that it has raised $...

Read more

Blog Post_Webinar Images (1)

How to Stop Reply-All Email Storms

Last week, Maria Peterson, a government employee in Utah, sent what she thought was an email inviting her colleagues to the annual holiday potluck. Instead, she accidentally invite...

Read more

slack-webinar-ft

WEBINAR: Securing Slack

Slack has been rapidly growing as the communication and collaboration tool of choice for organizations on the cloud. Unlike email, however, Slack threats and vulnerabilities are la...

Read more

Blog Post2FWebinar Images (2)

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well if you assume ...

Read more

Blog Post2FWebinar Images
Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365 account is com...

Read more

slack-secure-featured

Is Slack Secure?

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations, it's replaced ...

Read more

14-DAY FREE TRIAL

Get 100% visibility into your cloud right now. No risk. No obligation. No effect on your users.

START YOUR  FREE TRIAL