Email Security Resources

Spear Phishing: The Targeted Attacks That Aim for Your Business

Spear Phishing: The Targeted Attacks That Aim for Your Business

Spear phishing attacks are quick, to the point, and designed to deceive. In this white paper, you’ll learn how spear phishing emails differ from phishing emails, the methods hackers use to manipulate users, and how you can protect your business and your clients from spear phishing attacks.

Phishers’ favorites 2019 year-in-review

Phishers’ Favorites 2019 Year-in-Review

Phishers’ Favorites is Vade Secure’s quarterly report highlighting the top 20 most impersonated brands in phishing attacks. Our inaugural year-in-review looks at the top 20 most impersonated brands of 2019 and explores key phishing trends from the year, including the role of Office 365 in Microsoft phishing, the rise of PayPal impersonation, and the sophisticated email attacks phishers are using to lure corporate email users.

phishing-attacks

Phishing Attacks: Advanced Techniques That Evade Detection

Sophisticated phishing attacks are bypassing the technologies designed to stop them. Discover the methods hackers are using to infiltrate your business.

Evaluating Microsoft 365 Email Security Solutions

Evaluating Microsoft 365 Email Security Solutions: Architecture Matters

While EOP is sufficient for detecting known threats, you need additional protection. As an MSP, what are the key requirements for a modern Microsoft 365 email security solution that will work for your clients and also your business?

IDC Partner Spotlight

IDC Partner Spotlight: Building O365 Email Security with Value-Added Partnership

Wieda IT chose Vade Secure for Microsoft 365 for its roll-out simplicity, user experience transparency, competitive pricing, and advanced threat protection capabilities. Learn why Wieda IT plans to roll out Vade Secure for Microsoft 365 to 100 percent of its customers.

Get in the Loop: Report Email Threats with One Click

Security awareness training will help staff recognize email threats, but getting staff to actually report them to IT is another matter. The Feedback Loop allows users to report email threats to Vade Secure with one-click through the Microsoft Outlook junk button.

Phishers’ Favorites

Phishers’ Favorites: Most Spoofed Brands in Phishing Attacks
See Phishers’ Favorites

All Resources

Gain insights into the latest email threats, including phishing, spear phishing, and malware.
Learn more about Vade Secure’s email security solutions.

Vade Secure Email Content Filter for Providers

Vade Secure Email Content Filter for Providers

Data Sheet/Solution Brief / MSP Cybersecurity

Vade Secure for Microsoft 365

Vade Secure for Microsoft 365

Data Sheet/Solution Brief / Email Security, Microsoft 365

The City and Urban Community of Dunkirk

The City and Urban Community of Dunkirk

Case Study / Microsoft 365

SMX INTEGRATES VADE SECURE ACROSS ITS EMAIL SECURITY, ARCHIVING, AND PLATFORM SOLUTIONS AND SERVICES

SMX

Case Study / Phishing

Phishers’ favorites 2019 year-in-review

Phishers’ Favorites 2019 Year-in-Review

eBook/White paper / Phishing

The Truth About Microsoft 365 Email Security

The Truth About Microsoft 365 Email Security

Data Sheet/Solution Brief / Microsoft 365

Evaluating Microsoft 365 Email Security Solutions

Evaluating Microsoft 365 Email Security Solutions

Infographic / Microsoft 365, MSP Cybersecurity

Email-Security-for-Microsoft-365-en

Email Security for Microsoft 365

eBook/White paper / Malware/Ransomware, Microsoft 365, Phishing, Spear Phishing

Spear Phishing: Understanding an Evolving Threat

Spear Phishing: Understanding an Evolving Threat

eBook/White paper / Spear Phishing

Protecting Your Company from Ransomware

Protecting Your Company from Ransomware

eBook/White paper / Malware/Ransomware

Email Filtering for Providers

Email Filtering for Providers

eBook/White paper / Email Security

ASL Airlines

ASL Airlines

Case Study / Email Security, Malware/Ransomware

BSPP Fireman's Brigade

BSPP Fireman’s Brigade

Case Study / Email Security, Phishing, Spear Phishing

BT

BT

Case Study / Email Security, Phishing

Fujitsu NIFCLOUD

Fujitsu NIFCLOUD

Case Study / Email Security

KVC Health Systems

KVC Health Systems

Case Study / Email Security, Microsoft 365, Phishing

Boys and Girls Club of Puerto Rico

Boys and Girls Club of Puerto Rico

Case Study / Email Security, Microsoft 365

Anti-Graymail Solution

Anti-Graymail Solution

Data Sheet/Solution Brief / Email Security

IsItPhishing Threat Detection

IsItPhishing Threat Detection

Case Study / Phishing

Email Security Solutions

Email Security Solutions

Data Sheet/Solution Brief / Email Security, Malware/Ransomware, Phishing, Spear Phishing

Anti-Malware Solution

Anti-Malware Solution

Data Sheet/Solution Brief / Email Security, Malware/Ransomware

Vade Secure Gateway

Vade Secure Gateway

Data Sheet/Solution Brief / Email Security

Anti-Spear Phishing Solution

Anti-Spear Phishing Solution

Data Sheet/Solution Brief / Email Security, Spear Phishing

Vade Secure Cloud

Vade Secure Cloud

Data Sheet/Solution Brief / Email Security

Anti-Phishing Solution

Anti-Phishing Solution

Data Sheet/Solution Brief / Email Security, Phishing

IDC Partner Spotlight

IDC Analyst Connection

Report / Email Security, Microsoft 365

SC Magazine Product Review

SC Magazine Product Review

Report / Email Security, Microsoft 365

SC Magazine Expert Focus

SC Magazine Expert Focus

eBook/White paper / Email Security

IDC Partner Spotlight

IDC Technology Spotight

Report / Email Security

IDC Partner Spotlight

IDC Partner Spotlight

Report / Microsoft 365, MSP Cybersecurity

Le centre hospitalier métropole

Le centre hospitalier métropole

Case Study / Spear Phishing

Gandi Case Study

Gandi Case Study

Case Study / Email Security

The Vade Secure Feedback Loop

Infographic / Microsoft 365, MSP Cybersecurity

Interested in our solutions?

Contact us