Thank you for Subscribing to CIO Applications Weekly Brief
CIO Applications Weekly Brief
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications
Thank you for Subscribing to CIO Applications Weekly Brief
After a risky email is received, Enabling Technologies’ solution collects complete information about the end user— who received it, where the user logged in from, what tasks they are performing in the account, and other activities that identify behavior of an attacker.
When it comes to sensing cyberattacks and automatically remediating them, companies either don’t know they have been compromised or it takes them an awfully long time to identify it. What makes Enabling Technologies unique is its ability to sense a compromised account and then to immediately remediate the issue by shutting down the account and directing the real user to reset their password and take back control.
Drawing a complete picture of Enabling’s capabilities, Stegh recalls an instance when the company assisted the IT team at Viewpoint, a global construction software developer. Viewpoint was facing frequent phishing scams targeting credential theft and business email compromise, which made Office 365 accounts vulnerable. Viewpoint today uses Enabling Technologies’ PhishHunter service to take immediate action based on the logs created by Microsoft Cloud App Security (MCAS) and Advanced Threat Protection, identifying and mitigating attempted attacks. "With Enabling, we're being proactive, and are much more scalable. Now, we’re dealing with email security only 5 percent of the time," said Chris Gielow, IT Director, Viewpoint.
Enabling Technologies recently introduced its latest solution, PhishHunter 2.0 —a solution that automatically detects and remediates attacks. The company’s next big step is to improve the security of the customer data in Azure.“We’ll do that by collecting data about various application behaviors while they are running in the cloud, like how we alert and auto-remediate phishing attacks. We will perform the same sensing, detection, and remediation methods for breaches that could take over servers or data in Azure,” concludes Stegh.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info