1 in 101 emails have malicious intent*
Many organizations rely on email security
solutions, and yet email continues to be the most prevalent attack vector.
Discover how you can better protect your
email accounts against threats with this analysis from FireEye. The
easy to set up process analyzes your delivered email and surfaces
threats that may bypass your existing email security solutions.
The process is as simple as 1-2-3.
Answers to frequently asked questions:
Where does the analysis take place and are there other requirements?
The analysis takes place in the cloud and currently applies
only to Office 365 deployments. Nothing is required outside of the
steps outlined above. There is no software or hardware to deploy and
no interference with your email delivery.
What level of credentials are needed?
You need to have admin credentials for Office 365 to grant
access to the evaluation.
What do I receive after the analysis?
Once the analysis is complete, you will receive a summary and
discuss the detailed findings with FireEye’s Email Security experts.
How long does access remain open?
FireEye does not keep a copy of your emails once the evaluation
See more frequently asked questions and answers.
*Source: FireEye (August 2018), Get One Step Ahead of Email
Threats, Email Threat Report for January-June 2018.