Cloud Email Threat Analysis

1 in 101 emails have malicious intent*

Many organizations rely on email security solutions, and yet email continues to be the most prevalent attack vector.

Discover how you can better protect your email accounts against threats with this analysis. The easy to set up process analyzes your delivered email and surfaces threats that may bypass your email security solutions.

The process is as simple as 1-2-3.

  1. Fill out the assessment request form.
  2. Authorize access to Office 365.
  3. Review the report in 2-4 days.

Answers to frequently asked questions:

Where does the analysis take place and are there other requirements?
The analysis takes place in the cloud and currently applies only to Office 365 deployments. Nothing is required outside of the steps outlined above. There is no software or hardware to deploy and no interference with your email delivery.

What level of credentials are needed?
You need to have admin credentials for Office 365 to grant access to the evaluation.

What do I receive after the analysis?
Once the analysis is complete, you will receive a summary and discuss the detailed findings with FireEye’s Email Security experts.

How long does access remain open?
FireEye does not keep a copy of your emails once the evaluation is complete.

See more frequently asked questions and answers.

*Source: FireEye (August 2018), Get One Step Ahead of Email Threats, Email Threat Report for January-June 2018.