SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Carmen Gonzalez, Pat Romanski

News Feed Item

GreatHorn and Rhino Security Labs Offer Enterprises Integrated Social Engineering Remediation Solution

RSA Conference 2018 – GreatHorn, the leader in next-generation email security, today announced a new partnership with Rhino Security Labs to offer clients the world’s first truly comprehensive visibility program that uncovers advanced phishing risks, identifies gaps in their email security posture via Rhino’s market-leading assessment services, and then provides comprehensive, automated, risk-appropriate protection via GreatHorn’s cloud-native Inbound Email Security platform.

By identifying both technical and human-factor vulnerabilities with GreatHorn’s advanced Inbound Email Security solution and coupling that intelligence with Rhino’s multi-vector phishing research and assessment processes, security and risk teams can now move beyond static phishing solutions and binary “allow or block” decisions into continuous, post-delivery and fully adaptive risk-based protection. This innovative approach earned GreatHorn a Cyber Defense Magazine’s Infosec Award as a “Cutting Edge” email security company that was also announced today.

“Businesses typically consider social engineering to be an inherent risk that isn’t worth proactively addressing or as a non-risk because workers are trained via an automated ‘email testing’ service or a legacy perimeter-based secure email gateway,” said Rhino Security Labs CEO Benjamin Caudill. “Both positions are incomplete in how they identify the risks of social engineering. Our partnership with GreatHorn will provide enterprises with a nuanced view of their social engineering exposure and demonstrate how an automated, risk-appropriate remediation approach can be used to prevent cybercriminals from compromising critical data or credentials.”

Verizon’s 2018 Data Breach Investigations Report showed that workers continue to be cybercriminals’ primary targets as phishing represents 98 percent of social incidents and are nearly three times more likely to be breached through social attacks than actual vulnerabilities. GreatHorn’s 2017 Global Spear Phishing Report found attackers are increasingly relying on highly targeted, non-payload attacks that exploit trust and leverage pressure tactics to trick users into actions that could potentially compromise critical data and credentials. Of the more than 537,000 phishing threats GreatHorn detected in its research, 91 percent (490,557) contained display name spoor characteristics. It’s an extremely effective tactic against employees deluged with incoming communications all day, every day and have on-demand access to critical infrastructure.

“The traditional approaches to stopping advanced email attacks – both static secure email gateways and compliance-only trainings — are neither sufficient nor effective in preventing data breaches,” said GreatHorn CEO Kevin O’Brien. “Enterprises are fighting a multi-front battle: a historic cybersecurity skills shortage and a pervasive, highly sophisticated cybercriminal threat. In order to protect their employees against the types of advanced attacks that are causing the most damage, organizations should embrace new technological approaches to programmatically identify and automatically remediate them.”

Rhino Security Labs’ techniques go beyond a simple vulnerability scan and instead utilize creative “attacks” that identify gaps within an organization’s email security posture. Once that evaluation is complete, businesses can deploy GreatHorn’s Inbound Email Security platform in less than 5 minutes to proactively detect and remediate advanced social engineering and email-based attacks. The cloud-native email security solution also offers additional features, including post-delivery protection, integrated end-user educational workflows and emergent threat protection.

Security and IT leaders interested in receiving an initial risk assessment from Rhino and GreatHorn can go to this link: https://info.greathorn.com/esra.

About Rhino Security Labs
Rhino Security Labs is a top penetration testing and security assessment firm, with focus on network pentest, web application pentest, IoT, and phishing testing. With manual, deep-dive engagements, we identify and mitigate security vulnerabilities which put clients at risk.

Endorsed by industry leaders, Rhino Security Labs is a trusted security advisor to the Fortune 500.

About GreatHorn
GreatHorn is the leader in next-generation email security that protects organizations using Office 365 and Google G Suite from advanced threats, including targeted phishing attacks that leverage social engineering to compromise access to data, credentials, and financial resources. A cloud-native solution built on a foundation of machine learning and automation, GreatHorn delivers the industry’s most effective email security solution that can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.

For more information on the company, visit www.GreatHorn.com or you can follow GreatHorn on LinkedIn, Twitter and Facebook.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For enterprises to maintain business competitiveness in the digital economy, IT modernization is required. And cloud, with its on-demand, elastic and scalable principles has resoundingly been identified as the infrastructure model capable of supporting fast-changing business requirements that enterprises are challenged with, as a result of our increasingly connected world. In fact, Gartner states that by 2022, 28% of enterprise IT spending will have shifted to cloud. But enterprises still must d...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...