GigaOm Radar for Phishing Prevention and Detectionv1.0

Table of Contents

  1. Summary
  2. About the GigaOm Radar
  3. Market Categories and Deployment Types
  4. Key Criteria Comparison
  5. GigaOm Radar
  6. Vendor Overview
  7. Analyst’s Take

1. Summary

In 2020, global email usage will top 300 billion messages sent, according to technology market research firm The Radicati Group. And that can be a problem, because email remains a leading conduit for malware delivery and phishing exploits. The message: an effective phishing prevention and detection solution must be a critical component of your enterprise security strategy.

The ability to effectively analyze and understand email traffic gives us the opportunity to derive great insight into different vectors of threat. These threats include malicious activity, crime, extortion, BEC (business email compromise), as well as insider threats. That insight can then be used to respond and effectively secure and protect both employees and organizations alike.

Vendors in the market today tackle this challenge in a variety of ways. Some focus purely on inbound email communications, others on internal communications within the same (or otherwise trusted) domains. As in many other areas of information security however, there is no silver bullet. The best approach will ultimately be some hybrid of these, building a layered approach often called defense in depth.

In this Radar report, we have considered a broad cross-section of the many phishing prevention and detection solutions and approaches in the market today.

When evaluating these vendors and their solutions, it is important to consider your own business and workflow. Different solutions, or combinations of solutions, will be more or less appropriate depending on the nature of your email traffic and business workflow. It is also important to consider your internal ability to handle the potential complexity of the solutions. For some it may be preferable to settle on one comprehensive solution, while for others building a best-of-breed architecture from multiple vendors may be preferable.