Inbound Email Security Solution Based on Email Security Standards

An intelligent preemptive response solution for scam emails that blocks 17 types of targeted email attacks outlined in international standards, which detects a wide range of threats, including emerging malware, similar domain fraud, tracing sender paths, and checking for altered reply addresses.

Characteristics

The Integration of AI and Email Security

Based on machine learning technology, AI analyzes the entire email body to determine its level of risk.

Proactive Response to Fraudulent Emails
Proactive defense against corporate-targeted scam emails, including APT (Advanced Persistent Threat) and financial fraud.
(ITU-T Standard Security Requirements 8.2.1)
Blocking Zero-Day Malware
Proactively blocks ransomware and new malware risks by directly executing attachments in a virtual environment.
(ITU-T Standard Security Requirements 8.1.1)

Key Features

1. Detection of Unknown Threats

Blocks various forms of email threats with custom spam filtering policies through three-stage behavior analysis.
(ITU-T Standard Security Requirements 8.1.1)

2. Analysis of Inbound Email Reliability

Assesses the authenticity of each inbound email, using machine learning technology, by learning from all received emails and comparing and analyzing them against the data it has learned for emails sent from the same account.
(ITU-T Standard Security Requirements 8.1.2)

3. Fraudulent Similar Domain Inspection

Detects fraudulent emails that create accounts similar to those of business partners, conducting similarity checks through the construction of corporate and individual user data, and identifying similar domains that are difficult to distinguish with human eyes.
(ITU-T Standard Security Requirements 8.2.2)

4. Tracking the Sending Path

Tracks the path through which an email was sent to verify the authenticity of the sender and displaying any changes in the sending path compared to the previous one, thus provides early detection for emails sent from compromised accounts.
(ITU-T Standard Security Requirements 8.2.3)

5. Forged Header Detection

Checks the validity of the sender’s address to conduct forgery inspection, and detects emails with changed reply addresses by modifying headers, enabling proactive responses to information leaks and payment fraud emails.
(ITU-T Standard Security Requirements 8.2.1)

6. URL Inspection for Hidden Risks

Runs links within email bodies and documents directly in a virtual environment to detect potential risks, converts emails containing risky URLs into images for user safety, and blocks the activation of malicious URLs.
(ITU-T Standard Security Requirements 8.2.4)

Expected Outcomes

Proactive response to intelligent scam emails through analysis of learned emails.
*click on diagram to view in large image.

Recommend for

Companies that exchange large amounts of sensitive corporate information via email.
Companies that have experienced financial losses due to payment errors or incorrect transactions.
Companies that want to protect themselves against scam emails that do not contain malware.
Companies that exchange large amounts of sensitive corporate information via email.
Companies that have experienced financial losses due to payment errors or incorrect transactions.
Companies that want to protect themselves against scam emails that do not contain malware.

Configuration Diagram

*click on diagram to view in large image.

Share your successful story with ReceiveGUARD

Trading Company A

“I received a scam email that used a domain similar to our business partners.”
“I could prevent financial losses since ReceiveGUARD blocked it.”

Public Institution B

“”I was worried that clicking on the links embedded in the email body might infect me with malware.”
“Now, I’m no longer worried because I can see what the links are about in the images.”

Pharmaceutical
Company C

“I almost sent confidential documents without realizing it was from a hacked account.”
“ReceiveGUARD alerted me when the sender’s information changed, allowing me to prevent any potential harm.”

Any Questions on
ReceiveGUARD?