CIO Influence
CIO Influence News Machine Learning Security

SlashNext Launches Secure Risk Assessment to Detect Unseen Next Generation 2.0 Phishing Threats

SlashNext Launches Secure Risk Assessment to Detect Unseen Next Generation 2.0 Phishing Threats

Secure assessment has 3x phishing detection accuracy versus top vendors, uses patented AI and ML technology to instantly identify previously undetected phishing threats that have entered the organization.

SlashNext, the phishing authority announced the launch of the cybersecurity industry’s most accurate secure phishing risk assessment, helping enterprises discover aggressive next-gen 2.0 phishing threats which proxy, secure email gateways, and supplemental phishing defenses fail to find. SlashNext’s Phishing Risk Assessment utilizes patented AI-based SEERTM  technology to detect and categorize zero-hour phishing threats with unmatched accuracy and routinely reveals 20% of business users had one or more phishing email in their inboxes. Furthermore, the new service typically reveals 18% more high-risk users and easily deploys protection to offer a pathway to optimize enterprise protection against today’s most virulent new cybersecurity threats.

Latest CIO  Interview CIO Influence Interview with Sumeet Arora, Chief Development Officer at ThoughtSpot

SlashNext’s Phishing Risk Assessment is a free self-service assessment for both Microsoft 365 email and firewall/DNS/proxy logs, each providing a different view of what bypassed current email security and the users who participated in those phishing attacks.

“The truth is that traditional systems – even from the big brand names – are blind to a huge number of phishing 2.0 threats, especially those driven by AI-driven attack payloads readily available online to bad actors,” said Patrick Harr, CEO of SlashNext. “Our risk assessment discovers these threats and provides an actionable report for further remedial steps.”

The onboarding process is easy and straightforward:

  • It takes only 2 minutes to initiate the phishing risk assessment.
  • It’s safe and secure, using OAuth 2.0 to authorize the scan of Microsoft 365 inboxes.
  • For firewalls, proxies, DNS, and secure web gateways, logs are uploaded by a console to identify phishing webpages.
  • The assessment quantifies the number of phishing emails sitting in user inboxes and lists threats by category.
  • It also identifies high-risk users and easily deploys protection to target users.
  • It is available for free for corporate use and partners to include in their security risks assessments service offerings.

There’s an option to immediately remediate risks by deploying SlashNext Total Phishing Protection for complete protection from corporate credential theft, SMishing, BEC/financial fraud, supply chain attacks, ransomware, and data exfiltration across all communication channels. The assessment can also automatically delete links to the same or similar attacks from other devices within the enterprise.

“SlashNext’s Risk Assessment is an important tool for our customers to immediately understand the risks within their organization,” said Nick Donarski, CTO or Atlantic IT Group. “The actionable report provides a roadmap to remediate threats that penetrated the current defenses and who participated in those phishing attacks. I encourage businesses to try the risk assessment and see the power of SlashNext for themselves, based on real data from their own network.”

Read More About CIO InterviewCIO Influence Interview with Petri Kuivala, CISO Advisor at Hoxhunt

Try the Phishing Risk Assessment and Test Drive the Full Service
The Risk Assessment service is immediately available, free of charge, to enterprises of all sizes and also through Microsoft365 Azure Marketplace. Resellers can bundle the service with their own offerings as a value-add.

Browse The Complete Interview About CIO : CIO Influence Interview with Francesco Brenna, Global VP & Senior Partner, Microsoft Practice at IBM Consulting

 [To share your insights with us, please write to sghosh@martechseries.com] 

Related posts

PAGO Chooses Stellar Cyber’s Open XDR Security Platform to Unify Stand-Alone Tools, Accelerate Detection

CIO Influence News Desk

Alpha Wireless Unveils Antenna Solutions to Enable Utility Network Modernization

TYAN Drives Innovation in the Data Center with 3rd Gen AMD EPYC Processors with AMD 3D V-Cache Technology

CIO Influence News Desk