SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, William Schmarzo, Dana Gardner

News Feed Item

GreatHorn and Rhino Security Labs Offer Enterprises Integrated Social Engineering Remediation Solution

RSA Conference 2018 – GreatHorn, the leader in next-generation email security, today announced a new partnership with Rhino Security Labs to offer clients the world’s first truly comprehensive visibility program that uncovers advanced phishing risks, identifies gaps in their email security posture via Rhino’s market-leading assessment services, and then provides comprehensive, automated, risk-appropriate protection via GreatHorn’s cloud-native Inbound Email Security platform.

By identifying both technical and human-factor vulnerabilities with GreatHorn’s advanced Inbound Email Security solution and coupling that intelligence with Rhino’s multi-vector phishing research and assessment processes, security and risk teams can now move beyond static phishing solutions and binary “allow or block” decisions into continuous, post-delivery and fully adaptive risk-based protection. This innovative approach earned GreatHorn a Cyber Defense Magazine’s Infosec Award as a “Cutting Edge” email security company that was also announced today.

“Businesses typically consider social engineering to be an inherent risk that isn’t worth proactively addressing or as a non-risk because workers are trained via an automated ‘email testing’ service or a legacy perimeter-based secure email gateway,” said Rhino Security Labs CEO Benjamin Caudill. “Both positions are incomplete in how they identify the risks of social engineering. Our partnership with GreatHorn will provide enterprises with a nuanced view of their social engineering exposure and demonstrate how an automated, risk-appropriate remediation approach can be used to prevent cybercriminals from compromising critical data or credentials.”

Verizon’s 2018 Data Breach Investigations Report showed that workers continue to be cybercriminals’ primary targets as phishing represents 98 percent of social incidents and are nearly three times more likely to be breached through social attacks than actual vulnerabilities. GreatHorn’s 2017 Global Spear Phishing Report found attackers are increasingly relying on highly targeted, non-payload attacks that exploit trust and leverage pressure tactics to trick users into actions that could potentially compromise critical data and credentials. Of the more than 537,000 phishing threats GreatHorn detected in its research, 91 percent (490,557) contained display name spoor characteristics. It’s an extremely effective tactic against employees deluged with incoming communications all day, every day and have on-demand access to critical infrastructure.

“The traditional approaches to stopping advanced email attacks – both static secure email gateways and compliance-only trainings — are neither sufficient nor effective in preventing data breaches,” said GreatHorn CEO Kevin O’Brien. “Enterprises are fighting a multi-front battle: a historic cybersecurity skills shortage and a pervasive, highly sophisticated cybercriminal threat. In order to protect their employees against the types of advanced attacks that are causing the most damage, organizations should embrace new technological approaches to programmatically identify and automatically remediate them.”

Rhino Security Labs’ techniques go beyond a simple vulnerability scan and instead utilize creative “attacks” that identify gaps within an organization’s email security posture. Once that evaluation is complete, businesses can deploy GreatHorn’s Inbound Email Security platform in less than 5 minutes to proactively detect and remediate advanced social engineering and email-based attacks. The cloud-native email security solution also offers additional features, including post-delivery protection, integrated end-user educational workflows and emergent threat protection.

Security and IT leaders interested in receiving an initial risk assessment from Rhino and GreatHorn can go to this link: https://info.greathorn.com/esra.

About Rhino Security Labs
Rhino Security Labs is a top penetration testing and security assessment firm, with focus on network pentest, web application pentest, IoT, and phishing testing. With manual, deep-dive engagements, we identify and mitigate security vulnerabilities which put clients at risk.

Endorsed by industry leaders, Rhino Security Labs is a trusted security advisor to the Fortune 500.

About GreatHorn
GreatHorn is the leader in next-generation email security that protects organizations using Office 365 and Google G Suite from advanced threats, including targeted phishing attacks that leverage social engineering to compromise access to data, credentials, and financial resources. A cloud-native solution built on a foundation of machine learning and automation, GreatHorn delivers the industry’s most effective email security solution that can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.

For more information on the company, visit www.GreatHorn.com or you can follow GreatHorn on LinkedIn, Twitter and Facebook.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, an...
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: ...
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundat...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...