Lastline Defender
for Email

Defeat Advanced Threats to Email

Eliminate Advanced Threats Hiding in Your Existing Email System

Lastline Defender™ for Cloud Email and Lastline Defender for Customer-Managed Email are complementary layers of defense to enhance your email security controls. You can deploy them anywhere you want to improve your email security against advanced threats engineered to evade detection:

  • Lastline Defender for Cloud Email delivers superior Microsoft Office 365 mail and Gmail protection for cloud email systems
  • Lastline Defender for Customer-Managed Email protects on-premises or hosted systems

Lastline Defender works with your existing email system to protect your organization from business email compromise (BEC) and other email-based threats like ransomware, cryptomining, credential stealing, social engineering, and spear phishing.

Secure Any Email System

Use Lastline Defender to improve cloud
email security and customer-managed email.

Lastline Defender for Cloud Email

Lastline Defender for Cloud Email provides unmatched threat protection for Microsoft Office 365 mail and Gmail. It is an additional layer of defense against threats that bypass those applications’ limited security controls.

You get superior cloud email security that defends against advanced malware attacks, phishing, spear phishing, business email compromise (BEC), and account take-overs (ATO). Lastline Defender scans inbound, outbound, and internal emails looking for threats.

Email Systems

Lastline Defender for Email gives you the ability to augment your existing email security controls with a complementary layer of protection that detects the advanced malware other technologies miss, without adding significant cost or complexity.

Lastline Defender for Email complements your SEG (Secure Email Gateway) and MTA (Mail Transport Agent) systems. You can choose between three deployment options to passively monitor or actively block malicious content for complete email security, as shown at right.

You have complete flexibility on how you deploy Lastline Defender for Email in your environment. The only component you need to deploy on-premises are Lastline Sensors, as physical or virtual appliances.

  • Physical appliances: Choose between hardware you supply yourself or the Lastline Sensor Appliance
  • Virtual appliances run on VMware

The other management and analysis components can reside either in the cloud (your cloud, the Lastline cloud, or a service provider’s cloud) or on-premises.

Deploy Lastline Defender for Email in the mode
you need to protect your existing mail system

Option Description Detect or
In-line Deployment?
1 SMTP Monitoring Detect Only No
2A MTA Mode with Email Delivery Detect & Block Yes
2B MTA Mode without Email Delivery Detect Only No
3 BCC Mode Detect Only No

Defeat Account Takeover

Lastline Defender for Cloud Email delivers unmatched threat visibility and accurately detects ransomware, fileless malware, credential stealers, and other mail-based attacks. It enables you to understand the objective of the attack, as well as respond faster to the threat before a data breach occurs.

Lastline’s anti-phishing algorithm combines traditional analysis capabilities with a proprietary machine learning algorithm that looks at all aspects of the email and is specifically trained to catch the threats Microsoft Office 365 mail and Gmail miss. With the addition of account takeover prevention and advanced malware detection, Lastline provides a complete mail security solution to protect your organization from phishing and spear phishing schemes.

Industry-Leading Detection

Lastline Defender gives you unmatched visibility into threats attempting to enter your network by incorporating our industry-leading Deep Content Inspection technology. It deconstructs every malicious behavior engineered into an object entering via mail as well as identifies malicious links. It sees all instructions that a program executes, all memory content, and all operating system activity.

This visibility enables your security team to see a complete inventory of unique file behaviors that other tools fail to detect, such as activity observed when executing programs, opening documents, unpacking archives, and rendering web content.

Lastline’s superior visibility also makes the analysis much harder to evade. It detects malware that’s engineered to evade sandboxes, next-generation firewalls, and other next-gen tools.

Deep Content Inspection Delivers Unmatched Visibility into Malware.

Global Threat Intelligence Network

Lastline also incorporates the latest information on malicious behaviors extracted from millions of malicious objects submitted by our customers and partners. The Lastline Global Threat Intelligence Network, a cloud-based global repository of threats curated by the Lastline threat research team, continuously updates our AI on emerging threats as soon as they are seen by any Lastline partner or customer. This means your deployment is able to detect the latest emerging threats.

Prevent Business Email Compromise

Business Email Compromise attacks often target cloud email systems like Microsoft Office 365 mail and Gmail. They start with a spear phishing attack or spoofed emails targeted at specific executives in order to commit fraud.

Difficult to Identify

These attacks evade detection from email security controls that rely on content scanning or signature-matching. The emails do not contain links to any fraudulent sites or have malicious attachments, which normally trigger alerts.

Instead BEC attackers use publicly available data from social and business media sites to identify reporting relationships as well as names and titles of coworkers, upcoming travel, and so forth. They’ll use this knowledge to create a realistic looking message from a trusted co-worker to initiate a fraudulent transaction, such as a wire transfer. Lastline Defender for Cloud Email detects BEC attacks and blocks them before a bad actor can fool employees.

Yes, we detect
those, too.

See how you can detect and contain sophisticated cyberthreats with Lastline, and regain control.