News Feed Item

GreatHorn and Rhino Security Labs Offer Enterprises Integrated Social Engineering Remediation Solution

RSA Conference 2018 – GreatHorn, the leader in next-generation email security, today announced a new partnership with Rhino Security Labs to offer clients the world’s first truly comprehensive visibility program that uncovers advanced phishing risks, identifies gaps in their email security posture via Rhino’s market-leading assessment services, and then provides comprehensive, automated, risk-appropriate protection via GreatHorn’s cloud-native Inbound Email Security platform.

By identifying both technical and human-factor vulnerabilities with GreatHorn’s advanced Inbound Email Security solution and coupling that intelligence with Rhino’s multi-vector phishing research and assessment processes, security and risk teams can now move beyond static phishing solutions and binary “allow or block” decisions into continuous, post-delivery and fully adaptive risk-based protection. This innovative approach earned GreatHorn a Cyber Defense Magazine’s Infosec Award as a “Cutting Edge” email security company that was also announced today.

“Businesses typically consider social engineering to be an inherent risk that isn’t worth proactively addressing or as a non-risk because workers are trained via an automated ‘email testing’ service or a legacy perimeter-based secure email gateway,” said Rhino Security Labs CEO Benjamin Caudill. “Both positions are incomplete in how they identify the risks of social engineering. Our partnership with GreatHorn will provide enterprises with a nuanced view of their social engineering exposure and demonstrate how an automated, risk-appropriate remediation approach can be used to prevent cybercriminals from compromising critical data or credentials.”

Verizon’s 2018 Data Breach Investigations Report showed that workers continue to be cybercriminals’ primary targets as phishing represents 98 percent of social incidents and are nearly three times more likely to be breached through social attacks than actual vulnerabilities. GreatHorn’s 2017 Global Spear Phishing Report found attackers are increasingly relying on highly targeted, non-payload attacks that exploit trust and leverage pressure tactics to trick users into actions that could potentially compromise critical data and credentials. Of the more than 537,000 phishing threats GreatHorn detected in its research, 91 percent (490,557) contained display name spoor characteristics. It’s an extremely effective tactic against employees deluged with incoming communications all day, every day and have on-demand access to critical infrastructure.

“The traditional approaches to stopping advanced email attacks – both static secure email gateways and compliance-only trainings — are neither sufficient nor effective in preventing data breaches,” said GreatHorn CEO Kevin O’Brien. “Enterprises are fighting a multi-front battle: a historic cybersecurity skills shortage and a pervasive, highly sophisticated cybercriminal threat. In order to protect their employees against the types of advanced attacks that are causing the most damage, organizations should embrace new technological approaches to programmatically identify and automatically remediate them.”

Rhino Security Labs’ techniques go beyond a simple vulnerability scan and instead utilize creative “attacks” that identify gaps within an organization’s email security posture. Once that evaluation is complete, businesses can deploy GreatHorn’s Inbound Email Security platform in less than 5 minutes to proactively detect and remediate advanced social engineering and email-based attacks. The cloud-native email security solution also offers additional features, including post-delivery protection, integrated end-user educational workflows and emergent threat protection.

Security and IT leaders interested in receiving an initial risk assessment from Rhino and GreatHorn can go to this link: https://info.greathorn.com/esra.

About Rhino Security Labs
Rhino Security Labs is a top penetration testing and security assessment firm, with focus on network pentest, web application pentest, IoT, and phishing testing. With manual, deep-dive engagements, we identify and mitigate security vulnerabilities which put clients at risk.

Endorsed by industry leaders, Rhino Security Labs is a trusted security advisor to the Fortune 500.

About GreatHorn
GreatHorn is the leader in next-generation email security that protects organizations using Office 365 and Google G Suite from advanced threats, including targeted phishing attacks that leverage social engineering to compromise access to data, credentials, and financial resources. A cloud-native solution built on a foundation of machine learning and automation, GreatHorn delivers the industry’s most effective email security solution that can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.

For more information on the company, visit www.GreatHorn.com or you can follow GreatHorn on LinkedIn, Twitter and Facebook.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
"DivvyCloud as a company set out to help customers automate solutions to the most common cloud problems," noted Jeremy Snyder, VP of Business Development at DivvyCloud, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching o...
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...