Recent Posts

Recent Blog Posts

The PhishLabs Blog

The first spear phishing protection solution driven by real-world intelligence

Posted by John LaCour on Feb 2, '16

Today we announced a new solution that I believe will transform how organizations counter spear phishing attacks. We call it T2 Spear Phishing Protection, and it takes advantage of our deep insight into phishing attacks to prepare organizations for the real-world attacks they're most likely to be targeted with, and then mitigate those attacks before damage is done. To do this, it enlists employees in the defensive network and uses our 24/7 SOC to analyze and respond to threats.  

Why did we launch T2 Spear Phishing Protection?

With the vast majority of data breaches being attributed to spear phishing attacks, it was clear to our team that organizations need a better way to fight back against these threats. Email filtering, anti-malware, and other security technologies have proven insufficient because, fundamentally, phishing is a social engineering problem more than it is a technology problem. With our extensive experience investigating and stopping phishing attacks for many of the world's leading companies, we're well-equipped to help organizations address both of those areas. That's why we launched T2 Spear Phishing Protection.

What is included in T2 Spear Phishing Protection?

 T2 Spear Phishing Protection

  • T2 Employee Defense Training, which conditions employees to spot and report phishing emails.
  • T2 Analysis and Mitigation, which provides analysis and response to reported threats by our 24/7 Security Operations Center.
  • T2 Threat Intelligence, which provides an automated, machine-readable feed of targeted attack information gathered from across our client base and research operations that improves technical controls and provides visibility to potential breaches before damage is done.

T2 Employee Defense Training and T2 Analysis and Mitigation services are available now. T2 Threat Intelligence will be released in early Q2. 

All of these services use our insight into the phishing landscape. For example, T2 Employee Defense Training uses simulation content that is based on the real-world phishing attacks we see targeting businesses. The services integrate tightly to provide comprehensive protection, but they can also be used separately with existing defenses organizations already have in place.

How does T2 Spear Phishing Protection help?

We determined that fighting back against spear phishing attacks would require a solution that starts by transforming people from security liabilities into security assets. It's not possible to ensure that employees block social engineering attacks 100% of the time. Human beings are going to make mistakes. But what if when an employee does fall for a phishing email, the attack had already been reported by other employees that were also targeted? That changes the situation and allows for faster detection of phishing attacks that make it past security controls and into user inboxes. 

So, the first objective we set out to accomplish was to make it easy for organizations to condition their users to recognize and report phishing attacks -- effectively enlisting them in their defensive network. With T2 Employee Defense Training, we provide a fully-managed phishing simulation and training service that helps organizations do that. 

But what happens after employees report attacks? Those reports aren't going to analyze themselves, and the last thing most organizations want is a new influx of tickets for their IT helpdesk. And it doesn't do any good if those reports sit in a queue and never undergo quality analysis. That's where T2 Analysis and Mitigation comes into play, providing robust technology and team of experts proficient at analyzing phishing attacks. Our Security Operations Center actively mitigates more than 6,000 phishing attacks every month. Investigating and responding to phishing attacks is right in their wheelhouse. 

The intelligence we gather through investigating and shutting down attack infrastructure helps as well. T2 Threat Intelligence provides this information in an automated, machine-readable feed so that it can be readily integrated into security controls and analytics platforms. This allows organizations to block attacks more proactively and improve their resiliency against targeted threats. 

T2 Spear Phishing Protection makes it possible for organizations to deploy these capabilities quickly and truly transform their security posture against spear phishing attacks. 


Topics: Spear Phishing, Awareness Training, T2, Phishing Simulation

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all