Anti-Phishing Solution

The days of generic, mass phishing waves have given over to highly targeted, low-volume phishing attacks that bypass reputation and signature-based email filters. Vade Secure’s Anti-Phishing Solution performs real-time behavioral analysis on the entire email to detect and block phishing attacks, protecting MSPs and their clients from unknown attacks.

Download solution brief

The Typology of Phishing Attacks

880 million phishing emails detected in 2018

Phishing emails are designed to look like they were sent from familiar brands such as banks or cloud services like Netflix, Dropbox or Microsoft 365. After clicking on a phishing link, victims are directed to replica webpages where they are instructed to change or update a password or update personally identifiable or financial information. The average user is totally unaware that they’ve been phished until the business recognizes the breach.


AI-based Phishing Protection

Traditional email filters are designed to identify known threats—which has prompted phishers to use a variety of obfuscation techniques to successfully bypass these products. Vade Secure’s Anti-Phishing Solution uses artificial intelligence, including machine learning, to perform real-time behavioral analysis of the origin, content, and context of the email.

Machine Learning-based Phishing Detection

Vade Secure’s machine learning models analyze 47 unique features of the email to identify phishing, including the content and context of the email, the webpage, and the URL, including any redirects, URL shorteners, or other obfuscation techniques.

Token Anonymization

Tokens within URLs are randomly replaced in order to safely explore the page content without triggering any action/tracking on behalf of the user. This capability is critical to Time-of-Click analysis, which prevents attacks that leverage dynamic links and sleeper pages.

Computer Vision

Trained to view webpages and emails as human see them, Vade’s Computer Vision engine identifies images commonly used in phishing attacks, including QR codes, text-based images, and brand logos. It can detect logos from the top 30 impersonated brands, including Microsoft, PayPal, and Facebook.

Mobile Rendering

Pages are explored across more than 30 different device-browser combinations (e.g. Safari on iPhone, Chrome on Android, etc.) in order to thwart attacks designed to only display their content on mobile devices.

Regional Page Exploration

Pages can be explored from four zones—North America, South America, Europe, and Asia—to combat phishing pages that display their content only when accessed from the targeted location.

Auto and One-click Remediation*

Vade Secure augments threat detection with post-delivery threat remediation. With a real-time view of global threats, the engine is continuously learning and will automatically remove any threats from user inboxes. Admins can also manually remediate messages with one click.

*Available in Vade Secure for Microsoft 365

Additional Capabilities

  • Automatic Site Closure: Vade Secure shares information with organizations that are unknowingly involved in phishing attacks, rapidly blocking URLs and automatically closing malicious websites.
  • Brand Alerts: Brands and domains that have been usurped by hackers are alerted by Vade Secure so that they can warn their customers as quickly as possible.
  • IsItPhishing: Vade Secure’s IsItPhishing.AI allows users to enter a URL in a search bar and automatically identify whether a link is a phishing URL.

Can you spot a phishing email?

Take Phishing IQ Test

Phishing Protection for MSPs and their Microsoft 365 Clients

With 200 million corporate users, Microsoft 365 is the #1 target for hackers. Vade Secure for Microsoft 365 is the only native email security solution for Microsoft 365, allowing MSPs to augment Microsoft 365 security with a complementary layer of phishing protection that blocks unknown threats.

Learn about Vade Secure for Microsoft 365

Email Security Resources

Phishers’ Favorites 2020 Year-in-Review


White Paper: Phishing Attacks: Advanced Techniques That Evade Detection

Learn How to Detect a Phishing Email


All resources

Latest blog post

How MSPs Can Use Data in their Cybersecurity Sales Conversations

How MSPs Can Use Data in their Cybersecurity Sales Conversations

All blog posts

Interested in our solutions?

Contact us