This Matrix Report explores some of the key trends within the email security market and discusses the ways in which technology is evolving to address new market need...
This Matrix Report explores some of the key trends within the email security market and discusses the ways in which technology is evolving to address new market need...
Everyone who works in cybersecurity and, in particular, the SOC, knows exactly the toll managing the email threat takes. The SOC is under siege. What's less clear is...
Avanan is releasing a first-of-its kind white paper looking into the security and vulnerabilities of Microsoft Teams.
Healthcare organizations have been under attack in 2020. In addition to the debilitating COVID-19 virus that overran hospitals and doctor’s offices, they have been u...
Ask your email security vendor about these flaws in their architecture. Their answers will disappoint you.
In the most thorough analysis of its kind, Avanan security analysts classified over 500,000 malicious emails, sent to real end-user mailboxes protected by Microsoft’...
The unfortunate reality is that most small cities pay the ransom rather than pay to repair and secure their ecosystem. In fact, a major survey found that government ...
Whoever determines IT security priorities at your organization might not recognize the importance of email security. This Business Impact Brief outlines how email se...
To create the 2019 Global Phish Report, Avanan security scientists analyzed 55.5 million emails to surface key insights on how hackers target Office 365 and Gmail.
In this white paper, we break down ATP's security features for before and after an attack, examine the shortcomings of the platform, and compare it to the full-stack...
Healthcare is migrating to the cloud, putting HIPAA regulations in a new context. This white paper identifies challenges of enforcing HIPAA compliance in the cloud, ...
The Avanan Incident Response as a Service (IRaaS) leverages our team of experts to manage end-user reports of suspicious emails and requests to release quarantined e...
Avanan offers complete, defense-in-depth security for Office 365, whether you use SharePoint, OneDrive, or the full collaboration environment. If you are making the ...
Hacking a domain with a strong reputation makes malicious actors happy. It helps them more easily launch future attacks. This makes Universities and other educationa...
Avanan offers complete, defense-in-depth security for G Suite, whether you use Gmail, Google Drive, or the full collaboration environment. If you are making the tran...
Because Slack is invite-only, users assume that their workspace is secure. Yet Slack lacks malware scanning, data filtering, and compliance tools that are basic to e...
Because Microsoft Teams is invite-only, users assume that their workspace is secure. Yet Teams lacks malware scanning, data filtering, and compliance tools that are ...
Avanan offers a structured Data Loss Prevention (DLP) approach, all in the cloud, activating in only one click. Avanan is the only data classification solution that ...
Your customers are looking for ways to quickly and efficiently stop threats. In less than 5 minutes, they can deploy industry-leading cloud email and collaboration s...
In less than 5 minutes, MSPs can deploy industry-leading cloud email and collaboration security from Avanan to stop phishing. Avanan integrates with workplace collab...
This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against...
Emulating the Link Before the Click. There are many phishing strategies utilized by hackers, but fake links are by far the most popular; in particular, links that le...
While the roots of phishing attacks trace back to the beginning of email adoption, the proliferation of SaaS has lead to a resurgence in this hacking method. SaaS ap...
Citrix ShareFile provides a secure, fast and convenient means to enable the sharing of documents. Every SaaS application, including ShareFile, must also protect cust...
Learn how a new phishing attack wreaks havoc -- and what you can do to avoid being compromised. For a comprehensive look at a very clever but devastating phishing a....