FDR Email Security SaaS

FDR Integrated Cloud Email Security (ICES) - leveraging our Deep File Inspection (DFI®) technology and more - goes to unparalleled levels of scrutiny to analyze, identify, and ultimately prevent malware, exploits, ransomware, phishing, spam, and fraud scams from being delivered to your end-users.

FDR ICES closes the gap left wide open by Google, Microsoft - and even 3rd party - email security solutions. Looking for supporting evidence? See compelling stats in our Dark Reading-sponsored infographic.

View Infographic

Our comprehensive solution protects your end-users from the most dangerous security threats and other unwanted traffic arriving through email everyday:

  • Fraud
    • Account takeovers
    • Business Email Compromise (BEC) scams
    • Brand Impersonation
    • VIP Impersonation
    • Social Engineering
  • Malware
    • Malware Lures
    • Phishing Lures
    • Ransomware
    • Vulnerability Exploits
    • Zero-Day Attacks
    • N-Day Attacks
  • Spam

Pricing is based on:

  • Number of inboxes protected (from 1 to 100,000)
  • Subscription duration (one, two, or three years)

Key features include:

  • Cutting edge, real-time email analysis
    • Deep File Inspection (DFI) rapidly dissects files to expose evasions and malicious content within embedded logic (macros, scripts, applets), semantic context (spreadsheet cells, presentation words, etc.), and metadata (author, edit time, page count, etc).
    • Dozens of Optical Character Recognition (OCR) / Computer Vision / Natural Language Processing (NLP) models automatically inspect all inbound/outbound email
    • Complementary Integrations (MultiAV / Sandbox)
    • Malware analysis
    • Header analysis and link analysis
    • Customer/user feedback loop
    • No impact to user experience or delivery times
  • Rich enforcement
    • Malicious mail can be automatically quarantined
    • Questionable mail can be delivered with a clear, prominent, easy to understand banner
    • Automated remediation (claw back) of mail delivered previous to new threat intelligence
  • Outbound encryption support
  • Seamless integration
    • Microsoft Exchange
    • Office 365
    • Google Workspace
  • End user education via email decorations
    • Real-world training
    • Tunable to taste
    • Email client agnostic
    • Stripped on reply
    • Customizable based on policies and risk tolerance
  • End-user Intelligence
    • Machine Learning models evolve based on end-user feedback
  • 360 degree visibility
    • Pre (inline) and post delivery (ICES)
    • North-South and East-West
    • URL Rewrite and/or ICAP
  • Invisible to outsiders / attackers
  • RetroHunting - retrospectively analyzes historical email header content and associated attachments, enabling you to proactively hunt for advanced threats that may have initially bypassed your real-time defenses
  • Analytics dashboard gives IT/Security total visibility, supporting both quick and advanced search options
  • Deploys organization-wide in less than an hour