SAN FRANCISCO--(EON: Enhanced Online News)--GreatHorn, the leading cybersecurity solution for cloud communication platforms, announced the launch of the GreatHorn Threat Platform (GTP) at the RSA Conference taking place in San Francisco, Feb. 13-17, 2017.
“As an increasing number of enterprise workloads and systems move to the cloud, keeping up requires not just threat intelligence, but a proven dataset and machine learning engine that can automate the work of identifying patterns and responding before breaches occur.”
The Threat Platform extends the capabilities of the company’s cloud-native communication security platform, enabling organizations to tap into the threat data, machine-learning, and automated response framework that underpins GreatHorn’s threat detection and response solutions for social engineering, phishing, and targeted attack prevention in cloud email and messaging systems.
With this launch, GreatHorn has built the single most comprehensive platform for detecting and responding to advanced targeted attacks in today’s post-perimeter and cloud-first environment.
“Security teams today face a nearly insurmountable challenge in identifying threats that come in over an ever-changing set of channels, from email to messaging, chatops platforms to in-house chat programs,” said GreatHorn Co-Founder and CEO Kevin O’Brien. “As an increasing number of enterprise workloads and systems move to the cloud, keeping up requires not just threat intelligence, but a proven dataset and machine learning engine that can automate the work of identifying patterns and responding before breaches occur.”
91% of targeted attacks begin with social engineering tactics, making the protection of email and messaging platforms a critical component of any cybersecurity platform; however, communications security at scale is complicated by hybridized cloud adoption and the integration of customized workload integrations with public SaaS communication platforms such as G Suite, Office 365, and Slack. GreatHorn’s existing products provide real-time post-perimeter security for these SaaS platforms; the GTP will enable enterprises to also protect themselves in both custom and emerging cloud systems without compromising the efficiency and collaboration benefits they offer.
GreatHorn CEO Kevin O’Brien will make a 3-minute presentation during today’s RSA Innovation Sandbox Contest, demonstrating GreatHorn and the GTP’s ability to catch low-volume, highly targeted phishing attacks to a panel of highly decorated security experts, entrepreneurs, venture capitalists and an audience of thousands of RSA event attendees.
Built upon the same foundation of big data and machine learning that powers GreatHorn’s email and messaging security products, the GTP provides continuous access to intelligence on both emergent and historical threats.
The GreatHorn Threat Platform provides security and IT teams with the ability to:
- Programmatically query the GreatHorn Data Cloud to determine if a message is suspicious based on source, type, content, or relationship
- Automatically identify malware, ransomware, and malicious content within messaging systems
- Identify anomalous communication patterns both within a single organization’s messaging workflows and globally via the GreatHorn Threat Platform
- Interactively analyze specific messages for indicators of threat and/or social engineering
- Monitor messages for common compromise techniques including display-name spoofing, domain look-alike attacks, and authentication fraud
- Apply automated risk appropriate incident response
- Quickly integrate hybrid and new email systems into the GreatHorn protection framework
GreatHorn is the cybersecurity solution for cloud communication platforms. The company’s flagship product is the only solution that can automatically detect and remediate targeted social engineering attacks in today’s leading communication systems including Google Apps, Office 365 and Slack. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity, and precision necessary to prevent attacks from becoming breaches. For more information on the company, visit www.GreatHorn.com or you can follow GreatHorn on LinkedIn, Twitter and Facebook.