Secured Operations

Intrusion Prevention to enforce Corporate Verification Compliance

Intrusion Prevention is designed to stop constantly evolving threats before they impact your business. Essentially customized security that provides levels of Protection from users that are outside the “Circle of Trust”, malicous threats, ransomware, ransomworms, call-home malware, malware propagation between neighbor-to-neighbor.  Intrusion prevention is a preemptive approach to network security used to collaborate circles of users within an enterprise, B2B, B2C, B2G, G2G and C2C with special identity to further secure confidentiality at yet another level of protection responding to internal threats, clicked on URLs, opened attachments that are open from aged emails at rest or simple internet browsers opened that create potential threats – GeoThreatTM responds to them swiftly proactively before they can cause damage and isolates the threat to the single device.

Provide security compliance by enforcing highly confidential corporate, government or highly sensitive email user authentication. Breaches of this compliance are immediately routed to the Security Escalation team as cyber-crime.

eMailGPS GeoAware ConfidentialLockTM

Prevents the piercing of the corporate shield. It’s like fingerprinting your company and then all the employees to ensure 100% integrity and verification of every email, within the corporate structure that all the employees both local and remote have a classified clearance ConfidentialLockTM, at the email level and operate within a Corporate Shield Intrusion ProtectionTM.

Confidential Lock

ConfidentialLockTM Increased Identity Confidence

eMailGPS Confidential LockTM is not intended for individual email users, but instead is a means of improving identity assurance between any two or more Outlook email users that have the eMailGPS Outlook add-in installed and ConfidentialLockTM enabled. When Outlook email users receive an email marked by ConfidentialLockTM with a purple indicator, they can be more confident the email is being sent by person the email claims to be from. For ConfidentialLockTM to mark an email, it must be sent by someone who shares a common security code, and is licensed for Confidential LockTM in eMailGPS making email fraud extremely unlikely. Receiving an email marked by ConfidentialLockTM also ensures the sender’s email address is not spoofed since it was sent while logged in via Microsoft Outlook. ConfidentialLockTM gives higher confidence in the sender’s user identity, domain identity, and workstation identity.

eMailGPS GeoAware GeoThreatTM Traffic Analysis

GeoAware GeoThreatTM Traffic Analysis keeps a constant watch on your workstation’s outbound traffic, and is completely integrated into the eMailGPS threat and trust intelligence algorithms. The result is packet-level traffic awareness that knows instantly when eMailGPS untrusted or known-threat connections are being established by your Outlook workstation, behavior of a propagating malware attack.

Untrusted Traffic

eMailGPS workstation users are made aware, by a Windows notification box, when new “untrusted” connections become active. eMailGPS GeoThreatTM Traffic Analysis also features embedded workflow that allows adding the traffic to the workstation’s local firewall with a simple right-click.

Known Threat Traffic

eMailGPS pin-code verification requires the correct pin-code to proceed with the opening of the email – security teams usually are the only keepers of the code. Known threats need to be prevented from opening since the have a strong chance that malicious intent will be unleashed on the end-user or the corporate environment. If the pin-code is known and the email is opened extreme caution must be exercised when navigating the email. If by chance the a bad URL is clicked on or an attachment with malintent is opened GeoThreatTM Traffic Analysis is another lever that must be crossed and if activated GeoThreatTM Traffic Analysis will intercept and implement a Kill-Defense to stop the Known Threat.