<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">

Avanan identified a new phishing attack that bypasses EOP (Exchange Online Protection) URL filters, which scan Office documents like Word (.docx), Excel (.xlsx), and Powe...

Read more

2FA blog featured

Why 2-Factor Authentication Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work accounts, and make it ...

Read more

avanan-vs-atp-web-ft

WEBINAR: How ATP Compares to Avanan

In this 40-minute webinar, we compare Advanced Threat Protection (ATP) to Avanan for securing Office 365. As we go through each of part of the ATP Security & Compliance Center, we ...

Read more

atp-wp-featured

White Paper: How Avanan Compares to Microsoft ATP

In this white paper, we break down ATP's security features for before and after an attack, examine the shortcomings of the platform, and compare it to the full-stack security of th...

Read more

Z-WASP Image

Z-WASP Vulnerability Used to Phish Office 365 and ATP

Executive Summary: The name Z-WASP references the zero-width space (‌) that hackers added to the middle of a malicious URL within the RAW HTML of the email. With all these sp...

Read more

Avanan-vs-ATP blog-featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, which hackers bypa...

Read more

avanan-funding-featured

Avanan Raises $25 million to Revolutionize How Businesses Secure SaaS Email and Collaboration

View on Business Wire NEW YORK - December 14, 2018 –  Avanan, an enterprise security provider for SaaS based email and collaboration platforms, announced today that it has raised $...

Read more

Blog Post_Webinar Images (1)

How to Stop Reply-All Email Storms

Last week, Maria Peterson, a government employee in Utah, sent what she thought was an email inviting her colleagues to the annual holiday potluck. Instead, she accidentally invite...

Read more

slack-webinar-ft

WEBINAR: Securing Slack

Slack has been rapidly growing as the communication and collaboration tool of choice for organizations on the cloud. Unlike email, however, Slack threats and vulnerabilities are la...

Read more

Blog Post2FWebinar Images (2)

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well if you assume ...

Read more

Blog Post2FWebinar Images
Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365 account is com...

Read more

slack-secure-featured

Is Slack Secure?

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations, it's replaced ...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Microsoft identifies...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or credential har...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

In this short video, we show you how to easily monitor successful logins to Office 365 from outside the United States. Although employee logins from outside the US are increasingly...

Read more

proxy-featured

Why Proxies Cause Security Vulnerabilities

Proxies have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies have become exceedingly...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

service-source-ft

ServiceSource Secures the Cloud with Avanan

Background "If you don’t use Avanan, you’re not doing what you should be doing as a CISO.”

Read more

HIPAA-webinar-featured

WEBINAR: HIPAA Compliance in the Cloud

This webinar identifies challenges of enforcing HIPAA compliance in the cloud. Healthcare IT experts Vince Campitelli and Jeffrey Gardner talk with Avanan cofounder, Michael Landew...

Read more

Blog Post2FWebinar Images

Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications and Informatio...

Read more

HIPAA-WP-Featured

White Paper: HIPAA Compliance in the Cloud

Healthcare is migrating to the cloud, putting HIPAA regulations in a new context. This white paper identifies challenges of enforcing HIPAA compliance in the cloud, and offers tech...

Read more

SINET-featured

SINET Names Avanan a Top 16 Cybersecurity Innovator

New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology companies poised to m...

Read more

Blog Post2FWebinar Images (100)

What Are Botnets and How to Defend Against Them

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructure. Despite the ...

Read more

Prevent Phishing

Stop Phishing with Avanan's Anti-Phishing Software

In March of 2018, an employee at The Financial Services Information Sharing and Analysis center (FS-ISAC) clicked on a malicious link. From there, the phished email spread in waves...

Read more

o365-from-inside-featured

WEBINAR: Securing Office 365 from the Inside

Learn how to implement security that goes beyond the perimeter of your Office 365 environment to offer complete SaaS security. In this webinar, we'll also discuss how Avanan blocks...

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips for Employees

Regardless of their age, role, or cyber security competency, employees must follow basic practices to protect your organization and its data. Training doesn’t have to come in the f...

Read more

Blog Post2FWebinar Images (91)

PhishPoint: New SharePoint Phishing Attack Affects an Estimated 10% of Office 365 Users

  Over the past two weeks, we detected (and blocked) a new phishing attack that affected about 10% of Avanan's Office 365 customers. We estimate this percentage applies to Office 3...

Read more

Blog Post2FWebinar Images (87)

Fake Invoices: Why Does Office 365 Keep Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguised as invoices ...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a simple yet extreme...

Read more

Blog Post2FWebinar Images (86)

Shadow IT: What is it and Why Does it Exist?

Despite its menacing name, the practice of Shadow IT—when employees work with unsanctioned software, hardware, or applications on personal or company devices—is as reasonable as th...

Read more

Blog Post2FWebinar Images (65)

WEBINAR: What to look for in a CASB

During this session, we demonstrate how Avanan's next-generation Cloud Access Security Broker redefines the term CASB.

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the initial report...

Read more

Blog Post2FWebinar Images (74)

What is a Cloud Access Security Broker (CASB)? | Infographic

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. Gartner first defined the term Cloud Access ...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the future of home ent...

Read more

Blog Post2FWebinar Images (70)

Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer rely upon the en...

Read more

Blog Post2FWebinar Images (61)

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, which we are calli...

Read more

definition-of-casb

What makes a good CASB (Cloud Access Security Broker)?

What is a CASB? I am attending the Gartner Security and Risk Management Conference this week, and both analysts and customers are seeing a change in the cloud security marketplace....

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized By Hackers

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

baseStriker-featured-1

baseStriker: Office 365 Security Fails To Secure 100 Million Email Users

Update: Microsoft has repaired this vulnerability on 5/16/18, two weeks after we first reported it to them. We recently uncovered what may be the largest security flaw in Office 36...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk sufficiently low...

Read more

Spoofpoint

Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both Proofpoint and M...

Read more

8-considerations-featured

8 Security Considerations When Moving to Office 365

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what you know about...

Read more

Reagan Attack Featured

The "Ronald Reagan" Attack Allows Hackers to Bypass Gmail's Anti-phishing Security

We started tracking a new method hackers use to bypass Gmail's SPF check for spear-phishing. The hackers send from an external server, the user receives the email from an internal ...

Read more

Blog Post2FWebinar Images (52)

34 Cloud Security Terms You Should Know

We hope you use this as a reference not only for yourself, but also for your team and in training your organization. Print this out and pin it outside your cubicle.

Read more

capital-caring-ft

Capital Caring: Avanan Cloud Security for Healthcare

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their families. Over 650 ...

Read more

LinKRewrites Featured-1

Link Rewrites: The Good, The Bad, and The Over-Promised

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in emails. Proofpoint's Targeted Attack Protection (TAP), Mi...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

cloud account takeover featured

White Paper: Cloud Account Takeover

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against them.

Read more

cloud takeover protection featured

WEBINAR: Cloud Takeover Protection

In this webinars we will demonstrate how organizations quickly detect and protect against cloud takeover attacks using best-of-breed security in a single click.

Read more

securing cloud infrastructure featured

WEBINAR: Securing Cloud Infrastructure

In this webinars we will demonstrate how organizations quickly fill security gaps in your cloud infrastructure such as AWS and Azure using best-of-breed security in a single click.

Read more

Securing Google G Suite Featured

WEBINAR: Securing Google G Suite

In this webinars we will demonstrate how organizations quickly fill security gaps in Google G Suite using best-of-breed security in a single click.

Read more

Securing O365 featured

WEBINAR: Securing Office 365

In this webinars we will demonstrate how organizations quickly fill security gaps in Office 365 using best of breed security in a single click.

Read more

Securing Citrix ShareFile Featured

WEBINAR: Securing Citrix ShareFile

In this webinars we will demonstrate how organizations quickly fill security gaps in Citrix ShareFile using best of breed security in a single click.

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that thi...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite low. Maybe you...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they didn't publish...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gmail customers. ...

Read more

Blog Post2FWebinar Images (42).png

WEBINAR: Future-Proofing Your Security for 2018

You can’t predict when, but we can show you how the next attack might happen. In this webinar we discuss the security trends of 2017 that predict the most likely threats of 2018. W...

Read more

5 Phishing Attack Trends to Look out for in 2018

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we can expect in 2...

Read more

Attack Report: Phishing Your HR Platform in the Cloud

Avanan’s security analysts recently tracked an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise HR accounts an...

Read more

Microsoft Advanced Threat Protection vs Avanan

Microsoft knows that Office 365's default security features are not enough to keep an organization protected, which is why they created Microsoft Advanced Threat Protection as an a...

Read more

VerizonDataBreachInvestigationsReport.png

Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Earlier this month, Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from finance and he...

Read more

safe-links-featured

4 Reasons Microsoft "Safe Links" Make Office 365 Less Safe

Since the first successful phishing attack, we have trained our email users to be suspicious of every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) includes a f...

Read more

When Phishing Succeeds: The Alternate Inbox Method

Before you continue reading, you should check to see if your email address is one of millions that has already been compromised: HaveIBeenPwned.com. An attacker could have your acc...

Read more

Attack Report: Gmail Vulnerable to Nickname Impersonation Spearphishing

The Basics of the Nickname Email Spoof Attack We have trained our users to distrust a sender's nickname and validate an identity by looking at the original email address. Most emai...

Read more

Blog Post2FWebinar Images (36).png

Avanan Partner Series: How Lastline Detects Malware

With each day bringing new and different threats, we are always seeking out the next-gen technology that can defend against these next generation attacks. This is the first in our ...

Read more

Blog Post2FWebinar Images (35).png

Can a CASB Protect you from Phishing or Ransomware?

"Is Avanan a CASB?"   After joining a recent CASB panel with the Cloud Security Alliance I found myself answering this question over and over again. The answer depends upon whether...

Read more

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breach, a re-used pa...

Read more

Attack Report: Excel Phishing Attack that Bypasses Office 365

This targeted phishing attack against Office 365 Outlook customers impersonates Excel Online in an HTML attachment in order to trick users into entering their credentials. Avanan s...

Read more

Attack Report: Office 365 Security Hacked Using Google Redirect

A new widespread phishing attack against Office 365 email customers uses Google's App-Engine website to redirect victims to download malicious files. Avanan security analysts confi...

Read more

Blog Post2FWebinar Images (23).png

Part II: Why Proofpoint and Mimecast Can't Secure Office 365 and Gmail

In part one of this series, we explained why Proofpoint and Mimecast customers might be susceptible to email attacks that other Office 365 and Gmail customers are not. After receiv...

Read more

Attack Report: Office 365 Security Bypassed Using Hexadecimal Escape Characters

In several past blogs, we described how hackers bypass Office 365 Security with Punycode encoding, and then Unicode characters. In this attack report we discuss an attack against O...

Read more

Attack Report: Office 365 Sharepoint from China

This attack report covers a massive attack on Office 365 users that leverages the trust Office 365 puts in its own links. 

Read more

proofpoint-mimecast

Part I: Why Proofpoint and Mimecast Can't Secure Office 365 and Gmail

Proofpoint and Mimecast were the premier email security solutions for legacy on-premise email platforms, such as Exchange or Lotus Notes. But using them for cloud-based Office 365 ...

Read more

Screen Shot 2017-08-02 at 11.28.08 AM-1.png

Attack Report: Unicode-Based Phishing

This is a large scale phishing attack against Office 365 that we have been seeing across the majority of our Office 365 customers. The attack takes advantage of Office 365's blindn...

Read more

Attack Report: The Long-term Phish

  “One question was what exactly were the hackers after? They had compromised at least one account, yet they still weren’t done. What was next? But the big question was - how to ge...

Read more

Blog Post2FWebinar Images (2).png

5 Phishing Attacks Office 365 and Gmail Didn't Detect in July

In the past 30 days, the Avanan platform has detected and blocked thousands of unique phishing attacks against our customers. The most interesting are those that bypass the built-i...

Read more

450421681.jpg

How to Identify a Phishing Email in Gmail

Phishing is the most popular way for attackers to gain access to your Google Cloud. It can be difficult to keep up with all the methods for detecting phishing attacks on your own a...

Read more

anti-casb linkedin ad.png

What's Wrong with CASBs?

CASB vendors have been around for the past 5-7 years, VCs have invested over $500M into these companies and Gartner has been promoting them with very bullish growth predictions. Bu...

Read more

Blog Post2FWebinar Images (1)
Blog Post2FWebinar Images

Attack Report: How Google Drive Propagates Malware

This attack report covers a phishing attack against Gmail and Google Drive customers that leverages both services and exploits a blind spot in the G Suite service.

Read more

White Paper: Seamless Security for Citrix ShareFile

Taking Advantage of Best-of-Breed Security

Read more

Phishing-Cover-Resources.png

White Paper: Phishing in the Age of SaaS

Why is phishing easier on SaaS Platforms?  

Read more

Untitled presentation (1).png

NHS Hit by International Ransomware Attack

May 12th, 2017 The NHS has been hit by a ransomware attack today, affecting at least 16 of their trusts in the UK according to The Guardian. This is a widespread attack affecting b...

Read more

Untitled presentation-1.png

Jaff: New Ransomware Attack Blasting 5 Million Emails Per Hour

WannaCry infected over 200,000 computers in 150 countries. The large-scale ransomware attack infected a large number of global companies such as FedEx, LATAM airlines, Renault, and...

Read more

google-doc-attack-authenticate.png

Attack Report: API-based Phishing Attack in Gmail

This attack report covers a very sophisticated phishing scheme that came in the form of an invitation to open a Google Doc.

Read more

5-reasons-featured

5 Reasons Why Microsoft Can't Secure Office 365

Reading this blog title, you might think I’m going to condemn Microsoft and its efforts to secure Office 365. But in fact, Office 365 Security is Microsoft’s best—especially compar...

Read more

why-not-mta-graphic.png

SaaS Email Security: 7 Reasons not to use an MTA Gateway

Don't change your email security. Change the way it is connected. With the massive adoption of Office 365 and G-Suite for corporate email, companies hoping to implement additional ...

Read more

Zero-Trust Security: When Your Employees are the Source of the Attack

During our analysis of an advanced phishing attack last week, I was reminded why it is so important to scan every email—inbound, outbound and internal. 

Read more

consulting-case-study-ft
sophisticated-phishing-ft

White Paper: Sophisticated Phishing Attack Wreaks Havoc

Learn how a new phishing attack wreaks havoc -- and what you can do to avoid being compromised.  For a comprehensive look at a very clever but devastating phishing attack, and how ...

Read more

weve-been-hacked-w.png

Attack Report: Google Redirect

Avanan recently received this email from the CISO of DEFENSCON, a think tank that works with some of the most sensitive government organizations and private defense contractors. (W...

Read more

BrightTalkRSA.jpg

“CyberSecurity: Ignorance is not an Excuse,” an RSA Live Panel

I participated on a live panel this week at RSA with Jeremiah Grossman, CSO of Sentinel One; Ian Glazer, Chairman, ID Professionals Working Group, Kantara Initiative; and Uma Karma...

Read more

thumbnail2.png
cyber-security-icon.jpg

The Legal Considerations of Moving Data to the Cloud.

January 28th is Data Privacy Day. To commemorate, we are holding an online panel discussion with Chantal Bernier and Todd Daubert of Dentons, the world’s largest law firm and leade...

Read more

panel-discussion-ft
Insider Threat.png.jpg
alex-case-study-ft

Alternative Experts Secures Office 365 with Avanan

Protection Against Insider Threats Jeff Madsen, CTO of ALEX (Alternative Experts, LLC) faced a November 30, 2016, deadline to comply with Executive Order 13587 from the National Co...

Read more

opswat-1.png

"Auld Lang Syne" for Avanan and OPSWAT

Auld Lang Syne for Avanan and OPSWAT Should auld acquaintance be forgot,

Read more

opswat.png

Opswat Anti-Malware Added to the Avanan Cloud Security Platform

  NEW YORK, December 30, 2016 – Avanan, The Cloud Security Platform, has announced a  channel partnership with OPSWAT, Inc., the leading provider of cybersecurity tools that keep c...

Read more

HelpNetSecurity.png

Corporate Office 365 users hit with clever phishing attack

Corporate Office 365 users are being targeted by phishers using a clever new trick to bypass email filters and the default security protections of the Microsoft service.

Read more

Office 365 Business Users Targeted in Punycode-based Phishing

A new phishing attack targeting Office 365 business email users was found using Punycode to go undetected by both Microsoft’s default security and desktop email filters, Avanan sec...

Read more

top-office-365-webinar-ft

Accounting Firm Secures Office 365 with Avanan

Background Like so many accounting firms, this top 400 accounting firm has moved much of its IT to the cloud—specifically, to Office 365’s core applications and email. With clients...

Read more

CreditUnionTimes.png

New Phishing Scam Using Microsoft Office 365

New York City-based Avanan’s cloud security researchers uncovered a new attack method, Punycode, against Microsoft’s Office 365 business email that goes undetected by default secur...

Read more

Infosecurity.png

Office 365 Biz Users Targeted in Novel Phish Scheme

A new attack method to steal Office 365 business email credentials has been uncovered, though it is still undetected by Microsoft’s Office 365 default security and bypasses desktop...

Read more

Avanan: New Puny-Phishing Attack on Office 365 Email Users

Hackers Attack a Vulnerability in Office 365 Handling of Punycode Avanan’s cloud security researchers uncovered a new attack method against Office 365 business email that goes unde...

Read more

what-every-ciso-web-ft
BTimage.png
GoogleAppsVsOffice365-1014x487.jpg
why-are-business-web-ft
Office_365_Malware_Infographic_teaser.jpg

Redmond Magazine Webinar

  Avanan recently presented a webinar with Redmond Magazine on why Phishing has become the #1 threat to Office 365 users. Here are some useful resources.   Anatomy of an Office 365...

Read more

Tech_Writer_Blog.jpeg

Avanan on The Tech Blog Writer Podcast

  Welcome Tech Blog Writer Podcast Listeners!  Avanan was recently featured on Neil Hughes' Tech Writer Blog podcast.  Here are some useful resources for the podcast's listeners.  ...

Read more

how-phishing-webinar-ft
infographic-ft

Infographic: Anatomy of an Office 365 Malware Attack

Launching a malware attack on your Office 365 or Google Business Gmail users is pretty easy these days. Here's how they do it:   

Read more

How Many Days is Zero-Day Malware?

  Yesterday Office 365 finally caught the piece of malware we've been using in our demos for the past 5 months. The bad news, however, is that it took us only five minutes to find ...

Read more

sans-institute-ft

Gmail Exploit Allows DNC and Clinton Campaign Email Attack

Hackers infiltrated Gmail accounts of the DNC and the Clinton Campaign, pointing to a pervasive weakness of cloud-based email.

Read more

top-office-365-webinar-ft
DigDeeper_BlogLOGO.jpg

Virus Guides—Massive Cerber Spam Campaign Attacked Microsoft Office 365 Corporate Users

Cerber played an audio file, informing the user that his files have been encrypted while a warning message was displayed on the screen.

Read more

securityweek_logo.jpg

Security Week—Cerber Ransomware Used in Massive Attack Targeting Office 365 Users

  Over the past months, ransomware has become a widespread cyber-threat aimed at enterprises and consumers alike, and a recent massive attack against Office 365 users proves that o...

Read more

sc_logo_21413_345884.png

SC Mag—Microsoft Office 365 Hit with Massive Cerber Ransomware Attack, Report

  At least 57 percent of all Office 365 customers received at least one phishing attempt that contained the infected attachment.

Read more

Info_World.jpg

InfoWorld—Cerber Ransomware Targets Enterprises via Office 365

  Millions of Office 365 users were potentially at risk for a Cerber infection last week, as ransomware targeting shifts from individuals to enterprises.

Read more

Information_Security_Buzz.png

Widespread Attack on Office 365 Corporate Users with Zero-day Ransomware Virus

Click here if you are looking for information about the WannaCry Ransomware Attack Millions of Office 365 business users likely effected.

Read more

resource-video-new.png

Office 365 Security Web Demo

This 20 minute video demonstrates the Avanan platform with antivirus and threat sandboxing for Office 365 security.

Read more

resource-video-new.png

Cyber Security TV visits the Avanan Booth

CybersecurityTV visited Check Point CPX 2016 in Chigago to interview CEO Gil Friedrich about the Avanan platform and how it integrates with Check Point security tools. 

Read more

resource-video-new.png

O365, Gmail, and Malware

When your organization uses Office 365 or Gmail, attackers know. A simple MX lookup can reveal the security tools you are using to protect your corporate email, and malware writers...

Read more

logoavanan_square_dark_blue.png

Cloud Security Innovator Avanan Names Steven Toole Chief Marketing Officer

NEW YORK, May 31, 2016 —Avanan, The Cloud Security Platform, announced today the appointment of Steven Toole to the position of chief marketing officer. The addition of Toole to th...

Read more

networkworld-logo-print.png

Network World—Review: Hot new tools to fight insider threats

Avanan: Penetrating the cloud By John Breeden II

Read more

Avanan Named Gartner Cool Vendor

Avanan Named a Gartner 2016 Cool Vendor in Cloud and Emerging Technology Security

Read more

nybj.jpg

Avanan amasses $14.9M in a TPG-led Series A

New York-area startups and venture capitalists are making funding deals with the hopes of creating the next profitable company. Here's one deal announced Tuesday:

Read more

eWeek - Avanan Raises $14.9M for Cloud Security Technology

The cloud security startup takes in new funding to help accelerate its growth by doubling its R&D team.

Read more

Avanan Raises $14.9 Million Series A Financing Round

Greenfield Cities Holdings, L.P. (GFC), a TPG Growth portfolio company, led the round, with participation from both of Avanan’s existing investors, Magma VC and StageOne Ventures.

Read more

Avanan is a Finalist for the 2016 Red Herring Top 100 North America Award

New York - May 17 – Avanan announced today it had been selected as a finalist for Red Herring's Top 100 North America award, a prestigious list honoring the year’s most promising p...

Read more

interop.jpg

Join us at Interop Las Vegas

We are excited to attend Interop Las Vegas May 2-6. Interop is the world's largest independent and comprehensive event for IT and networking professionals. Until now, we have focus...

Read more

RSA San Francisco Feb 29-Mar 4

Avanan will be attending the RSA Conference in San Francisco this year. Meet us in Booth 2545 in the South Pavillion! Schedule a 1-on-1 meeting: www.avanan.com/rsa or just drop by....

Read more

zochsxj9.png

CRN 20 Coolest Cloud Security Vendors

Channel Reseller News (CRN) has declared Avanan one of the 20 Coolest Cloud Security Vendors of the 2016 Cloud 100. This is tremendous recognition for Avanan, having launched from ...

Read more

A SAMPLE AUDIT FROM AN EARLY CUSTOMER

One of our early customers graciously agreed to share a summary report from our early deployment with them. Before the evaluation, the customer assumed they had a security problem ...

Read more

AVANAN TAKES CHECK POINT’S SECURITY SOLUTIONS TO THE ENTERPRISE CLOUD

Avanan provides leading security solutions for the cloud, and with this partnership, will now offer cloud-based versions of Check Point’s data protection solutions for malware, dat...

Read more

Avanan Partners with Check Point Security

 See the Check Point Partner Page. This week, we are announcing Avanan’s partnership with Check Point Technologies, a first in a list of partnerships with over 60 leading security ...

Read more

AVANAN IN CRN’S 10 COOLEST SECURITY STARTUPS OF 2015

With hundreds of security startups attending the RSA Conference this year, there’s plenty of noise in the security market when it comes to new entrants. All are looking to grab a p...

Read more

Network World: IT Best Practices with Avanan

New cloud access security vendor offers the full security stack, with solutions from 60 leading vendors. The CASB market has been maturing and growing over the past few years. In l...

Read more

eWEEK: Avanan Building a Cloud of Clouds for Security

This startup exits stealth mode with a new approach to enabling security in the cloud.

Read more

GTC2015: AVANAN WINS GEEKTIME 2015

  400 STARTUPS COMPETED. 10 PRESENTED. AVANAN WON. HERE’S WHY Out of the ten amazing companies that competed in the Startup Arena pitch competition at Geektime Conference 2015, Clo...

Read more

resource-video-new.png

3 Minute Demo

This 3 minute video demonstrates the Avanan platform with antivirus, threat sandboxing and data leakage prevention tools from the leading vendors in each category. 

Read more

resource-video-new.png

Introductory Animation

Avanan Secures the Enterprise Cloud Avanan is the only cloud security solution that offers a complete, best-in-class security stack to protect data in the cloud.

Read more

14-DAY FREE TRIAL

Get 100% visibility into your cloud right now. No risk. No obligation. No effect on your users.

START YOUR  FREE TRIAL