Lastline Defender™ for Cloud Email and Lastline Defender for Customer-Managed Email are complementary layers of defense to enhance your email security controls. You can deploy them anywhere you want to improve your email security against advanced threats engineered to evade detection:
Lastline Defender works with your existing email system to protect your organization from business email compromise (BEC) and other email-based threats like ransomware, cryptomining, credential stealing, social engineering, and spear phishing.
Lastline Defender for Cloud Email provides unmatched threat protection for Microsoft Office 365 mail and Gmail. It is an additional layer of defense against threats that bypass those applications’ limited security controls.
You get superior cloud email security that defends against advanced malware attacks, phishing, spear phishing, business email compromise (BEC), and account take-overs (ATO). Lastline Defender scans inbound, outbound, and internal emails looking for threats.
Lastline Defender for Email gives you the ability to augment your existing email security controls with a complementary layer of protection that detects the advanced malware other technologies miss, without adding significant cost or complexity.
Lastline Defender for Email complements your SEG (Secure Email Gateway) and MTA (Mail Transport Agent) systems. You can choose between three deployment options to passively monitor or actively block malicious content for complete email security, as shown at right.
You have complete flexibility on how you deploy Lastline Defender for Email in your environment. The only component you need to deploy on-premises are Lastline Sensors, as physical or virtual appliances.
The other management and analysis components can reside either in the cloud (your cloud, the Lastline cloud, or a service provider’s cloud) or on-premises.
Deploy Lastline Defender for Email in the mode
you need to protect your existing mail system
|1||SMTP Monitoring||Detect Only||No|
|2A||MTA Mode with Email Delivery||Detect & Block||Yes|
|2B||MTA Mode without Email Delivery||Detect Only||No|
|3||BCC Mode||Detect Only||No|
Lastline’s anti-phishing algorithm combines traditional analysis capabilities with a proprietary machine learning algorithm that looks at all aspects of the email and is specifically trained to catch the threats Microsoft Office 365 mail and Gmail miss. With the addition of account takeover prevention and advanced malware detection, Lastline provides a complete mail security solution to protect your organization from phishing and spear phishing schemes.
Lastline Defender gives you unmatched visibility into threats attempting to enter your network by incorporating our industry-leading Deep Content Inspection technology. It deconstructs every malicious behavior engineered into an object entering via mail as well as identifies malicious links. It sees all instructions that a program executes, all memory content, and all operating system activity.
This visibility enables your security team to see a complete inventory of unique file behaviors that other tools fail to detect, such as activity observed when executing programs, opening documents, unpacking archives, and rendering web content.
Lastline’s superior visibility also makes the analysis much harder to evade. It detects malware that’s engineered to evade sandboxes, next-generation firewalls, and other next-gen tools.
Lastline also incorporates the latest information on malicious behaviors extracted from millions of malicious objects submitted by our customers and partners. The Lastline Global Threat Intelligence Network, a cloud-based global repository of threats curated by the Lastline threat research team, continuously updates our AI on emerging threats as soon as they are seen by any Lastline partner or customer. This means your deployment is able to detect the latest emerging threats.
These attacks evade detection from email security controls that rely on content scanning or signature-matching. The emails do not contain links to any fraudulent sites or have malicious attachments, which normally trigger alerts.
Instead BEC attackers use publicly available data from social and business media sites to identify reporting relationships as well as names and titles of coworkers, upcoming travel, and so forth. They’ll use this knowledge to create a realistic looking message from a trusted co-worker to initiate a fraudulent transaction, such as a wire transfer. Lastline Defender for Cloud Email detects BEC attacks and blocks them before a bad actor can fool employees.