Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

SlashNext Announces Multi-Vector Phishing Protection Solutions For Mobile Devices And Endpoint Web Browsers

January 2020 by Marc Jacob

SlashNext announced two new products designed to protect enterprise mobile and endpoint users from increasingly dangerous phishing and social engineering threats. These solutions protect users from the growing variety of phishing threats occurring across multiple attack vectors, including email, SMS/text, social media, messaging apps, ads, pop-ups, and more.

With enterprise mobility requirements and remote workers becoming more commonplace, mobile and remote workers are increasingly operating outside of network security protections. This makes users, and their employers, more vulnerable to a growing variety of sophisticated phishing threats. Mobile devices also lack the breadth of safe browsing protections available on standard desktop browsers due to device resource constraints. Further complicating matters is the fact that even cyber-savvy users can struggle to identify phishing attacks on mobile as smaller screen layouts hide important clues such as full URLs, senders’ details, and more.

The new products being announced today are SlashNext Mobile Phishing Protection and SlashNext Browser Phishing Protection. Both are comprised of lightweight, cloud-powered endpoint agents continuously updated with real-time phishing threat intelligence from SlashNext’s patented SEER™ threat detection technology.

SLASHNEXT MOBILE PHISHING PROTECTION

With SlashNext Mobile Phishing Protection, enterprise security teams can protect iOS and Android device users with more effective multi-vector, multi-payload phishing protection. A lightweight agent blocks live phishing sites, regardless of where users get the link, and offers a helpful warning page and safe preview of the site for education purposes. It also blocks and alerts users to incoming SMS phishing (SMiShing) messages, an increasingly popular attack vector on mobile. Security administrators get visibility with real-time incident reporting.

SlashNext Mobile Phishing Protection is designed to address the many special challenges presented by mobile phishing in both managed device and BYOD environments. It is a lightweight agent featuring negligible impact on device performance, battery consumption, and data usage. No network traffic or personally identifiable information leaves the device, so PII and user privacy remain secure. It is easily deployed and managed via integrations with leading Unified Endpoint Management (UEM) platforms and Single Sign-On (SSO) solutions. For customers without a UEM, the solutions can also be deployed via the SlashNext Endpoint Management System.

BROWSER PHISHING PROTECTION

With SlashNext Browser Phishing Protection, enterprise security teams can provide endpoint users with more effective multi-vector, multi-payload phishing protection. Deployed as lightweight browser extensions for all popular desktop browsers (Chrome, FireFox, Safari, and Edge), these extensions block live phishing sites, regardless of where users get the link. Users get helpful warning pages and a safe preview of the site for education purposes. Security administrators get visibility with real-time incident reporting.

SlashNext Browser Phishing Protection is an important expansion of the Safe Browsing capabilities included with all major desktop browsers. Built-in Safe Browsing protections do not keep pace with thousands of newly emerging zero-hour phishing threats and new phishing payload types. By contrast, SlashNext browser extensions are powered by real-time threat intelligence from the SlashNext SEER technology cloud, providing preemptive detection and protection from a broader range of phishing threats, especially newly emerging zero-hour threats.

SlashNext even helps protects endpoint users from accessing rogue browser extension, which are often promoted through ads on legitimate websites. These rogue browser extensions often work as advertised while secretly also functioning as keyloggers, screen scrapers, and 2FA interceptors for threat actors. As these extensions typically involve only JavaScript and HTML and execute entirely in browser memory, they evade detection by most anti-virus technologies.




See previous articles

    

See next articles