Ever wondered if advanced threats have circumnavigated your email security layers?

We have teamed up with our partners at FireEye to provide customers using Office 365 with an email threat analysis report.

This will identify the spear-phishing and malware emails to have already bypassed your email defences.

How does the program work? It’s as easy as 1-2-3:

  1. Fill out the evaluation request form

  2. Authorise access to Office 365

  3. The analysis will perform and complete in 2-4 days.

Register now

Please click here to start the process and receive your report.

Where does the analysis take place and are there other requirements?

The analysis takes place in the cloud and currently applies only to Office 365 deployments. Nothing is required outside of the steps outlined above. There is no software or hardware to deploy and no interference with your email delivery.

What level of credentials are needed?

You need to have admin credentials for Office 365 to grant access to the evaluation.

What do I receive after the analysis?

Once the analysis is complete, you will receive a summary and can discuss the detailed findings with one of our Email Security experts.

How long does access remain open?

FireEye does not keep a copy of your emails once the evaluation is complete.

When the analysis has finished, we can set up a time to review the findings with a Security Engineer.

You can read the full FAQ document here.

 

Register now

Please click here to start the process and receive your report.