Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Protect all users from Phishing emails and Ransomware. 90% of cyber attacks use fake emails to gain access to your company. One Phishing email can result in massive costs, often reaching the hundreds or thousands, as well as Ransomware, Identity Theft, and Data Breaches. The best phishing solution ensures that your business is protected. You can rest assured that all employees are protected and that you will never be left wondering if an email might pose a threat to your business. Retruster is the best choice when it comes to preventing email phishing. All you need to do is enter your Microsoft username password and you're good to go. No downloads required. Retruster is a Microsoft™, Partner Network member and Microsoft™, Appsource member. It is the ultimate Office 365 anti-phishing tool. It can also be used with other solutions.

Description

Safeguard your email systems and users, regardless of whether they are on-premises or cloud-based. Utilize Trellix Email Security to detect and counter advanced email threats such as ransomware, business email compromise (BEC), and phishing. With top-tier detection and response capabilities, you can establish a trustworthy and resilient email environment. The system quickly identifies current threats with prioritized alerts, enabling analysts to respond promptly. Ensure your email remains secure—whether it's on-premises or cloud-hosted—by leveraging advanced sandbox technology, artificial intelligence, and machine learning. Additionally, integrate with up to 650 Trellix solutions and third-party products to provide valuable insights and foster a cohesive security ecosystem. Reduce the likelihood of breaches while identifying, isolating, and defending against sophisticated URL and attachment-based attacks using this on-premises solution. Opt for Advanced Threat mode to discover harmful URLs through custom plug-ins, or select Full Hygiene mode to mitigate impersonation attempts, BEC, and other risks. With these robust features, you can maintain a secure email environment tailored to your organization's needs.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Blink
Microsoft 365
Microsoft Exchange
Microsoft Outlook
Trellix Detection as a Service
Trellix Security Platform
Trellix XDR

Integrations

Blink
Microsoft 365
Microsoft Exchange
Microsoft Outlook
Trellix Detection as a Service
Trellix Security Platform
Trellix XDR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Retruster

Founded

2016

Country

Israel

Website

retruster.com

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/email-security/

Product Features

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Product Features

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Secure Email Gateway

Anti-Malware
Archiving
Customizable
Data Loss Prevention
End-to-End Encryption
Real-time Dashboards
Reporting / Analytics
Sandbox
Threat Protection

Alternatives

MetaPhish Reviews

MetaPhish

MetaCompliance