Cofense Reporter Description

Our SaaS enabled email toolbar button allows your users to report suspicious emails in one click. It also standardizes the threat and contains it for incident responders. Your SOC can see real-time email threats and stop them faster.

Organizations have not had an efficient way to gather, organize, and analyze user reports of suspicious email that could indicate the early stages of a Cyber Attack. Cofense Reporter is a cost-effective and simple way for organizations to fill this information void. Cofense Reporter for Mobile and Cofense Reporter for Desktop empower users to actively participate in a company's security program. Cofense Reporter simplifies the process of reporting suspicious emails by employees.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Cofense
Year Founded:
2008
Headquarters:
United States
Website:
cofense.com/product-services/reporter/

Media

Cofense Reporter Screenshot 1
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Phone Support
Online

Cofense Reporter Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Email Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Incident Management Software

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response Software

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management