Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

FireEye Adds New Features to Email Security Product

FireEye on Wednesday announced that the latest version of its Email Security – Server Edition product introduces several new features designed to protect organizations against various types of threats.

FireEye on Wednesday announced that the latest version of its Email Security – Server Edition product introduces several new features designed to protect organizations against various types of threats.

Email Security – Server Edition version 8.2 brings new capabilities designed to detect and neutralize emails that impersonate a company’s executives.

Business email compromise (BEC) scams often involve fake emails purporting to come from executives and it’s not always easy for employees to identify these fraudulent messages. FireEye hopes to address this using a system that detects display name and header spoofing by analyzing headers and cross-referencing them with a riskware policy created by administrators.

“While executive impersonation protection has become a commonplace feature within cloud-based email security solutions, this has not been the case on-premises,” said Ken Bagnall, vice president of email security at FireEye. “We’ve added executive impersonation protection to FireEye Email Security – Server Edition as a direct response of customer feedback that they are seeing more impersonation emails getting through their existing security services. This update is designed to catch what other security solutions are missing.”

FireEye enhances Email Security productFour other important features and capabilities have been added to FireEye’s email security product, including the recently launched MalwareGuard machine learning engine.

The company has also added a URL rewrite feature designed to protect users against potentially malicious links found in emails.

“URLs that are being analysed by our online Advanced URL Defence service, which dynamically assesses landing pages for phishing pages and other threats, are rewritten in customers emails,” Bagnall told SecurityWeek. “Then at the time of click the user is taken to a page informing them either that the destination URL is malicious and they are blocked or that it is suspicious and to proceed with caution. If everything is fine they can proceed.”

The latest version of the product also allows users to customize guest images in an effort to mitigate attempts to evade detection.

Guest images, which store the operating system and applications, are run in a virtual machine when analyzing suspicious or captured traffic. Until now, FireEye provided regular updates for these images, but users could not customize them.

Advertisement. Scroll to continue reading.

By allowing users to customize images so that they mimic an actual endpoint when a potentially malicious object in analyzed, FireEye says it increases the chances of evasion techniques being neutralized.

Finally, Email Security can now analyze password-protected files sent via email if the password is sent to the user as an image.

“Password protected files are commonly used to deploy malicious attachments. This evades a number of security products,” Bagnall explained. “Different attackers will go to different lengths to obfuscate the password. Some will put the password in an image in the email. FireEye Email Security already cracks passwords in email to check password protected files. Now it also uses Optical Character Recognition to extract them from images. We have seen attacks like this a number of times in the wild.”

The latest version of FireEye Email Security – Server Edition is available immediately.

Related: FireEye – Tech Firms’ Secret Weapon Against Disinformation

Related: FireEye Unveils New Solutions, Capabilities

Related: Open Source Tool From FireEye Helps Detect Malicious Logins

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybercrime

Enterprise users have been warned that cybercriminals may be trying to phish their credentials by luring them with fake emails that appear to be...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.