Page 1


Firstly we analyse the customer and understand what good behaviour looks like.


email


We then use a big grown up word: Anomalytics to decide whether or not incoming mail is suspicious.


• If it’s suspicious we re-write the underlying URL • If opened, it points to our URL first • TAP then checks if that URL is still good • We NEVER stop checking – Every time its opened, TAP is there


If at any stage that URL has turned bad, it is blocked.


If any do slip through, we can show the security team… • Who has clicked on the URL & when • Trigger forensics and incident response • Block the site • Limit any potential damage


Spear Phishing can bring a business to it’s knees and it only takes 1. TAP: One step ahead of the bad guys


T.A.P.  

TAP Malware

Read more
Read more
Similar to
Popular now
Just for you