Inbound Email Security Solution Based on ITU-T X.1236

An intelligent preemptive response solution for scam emails that blocks 17 types of targeted email attacks outlined in ITU-T X.1236, which detects a wide range of threats, including emerging malware, similar domain fraud, tracing sender paths, and checking for altered reply addresses.

Characteristics

The Integration of AI
and Email Security

Based on machine learning technology, AI analyzes the entire email body to determine its level of risk.

Proactive Response to
Fraudulent Emails
Proactive defense against corporate-targeted scam emails, including APT (Advanced Persistent Threat) and financial fraud.

(ITU-T X.1236 Security Requirements 8.2.1)

Blocking Zero-Day Malware
Proactively blocks ransomware and new malware risks by directly executing attachments in a virtual environment.

(ITU-T X.1236 Security Requirements 8.1.1)

Key Features

1. Detection of Unknown Threats

Blocks various forms of email threats with custom spam filtering policies through three-stage behavior analysis.

(ITU-T X.1236 Security Requirements 8.1.1)

2. Analysis of Inbound Email Reliability

Assesses the authenticity of each inbound email, using machine learning technology, by learning from all received emails and comparing and analyzing them against the data it has learned for emails sent from the same account.

(ITU-T X.1236 Security Requirements 8.1.2)

3. Fraudulent Similar Domain Inspection

Detects fraudulent emails that create accounts similar to those of business partners, conducting similarity checks through the construction of corporate and individual user data, and identifying similar domains that are difficult to distinguish with human eyes.

(ITU-T X.1236 Security Requirements 8.2.2)

4. Tracking
the Sending Path

Tracks the path through which an email was sent to verify the authenticity of the sender and displaying any changes in the sending path compared to the previous one, thus provides early detection for emails sent from compromised accounts.

(ITU-T X.1236 Security Requirements 8.2.3)

5. Forged Header Detection

Checks the validity of the sender’s address to conduct forgery inspection, and detects emails with changed reply addresses by modifying headers, enabling proactive responses to information leaks and payment fraud emails.

(ITU-T X.1236 Security Requirements 8.2.1)

6. URL Inspection
for Hidden Risks

Runs links within email bodies and documents directly in a virtual environment to detect potential risks, converts emails containing risky URLs into images for user safety, and blocks the activation of malicious URLs.

(ITU-T X.1236 Security Requirements 8.2.4)

Expected Outcomes

Proactive response to intelligent scam emails through analysis of learned emails.

*Click to enlarge image.

Recommend for

Companies that exchange large amounts of sensitive corporate information via email.
Companies that have experienced financial losses due to payment errors or incorrect transactions.
Companies that want to protect themselves against scam emails that do not contain malware.
Companies that exchange large amounts of sensitive corporate information via email.
Companies that have experienced financial losses due to payment errors or incorrect transactions.
Companies that want to protect themselves against scam emails that do not contain malware.

Configuration Diagram

*Click to enlarge image.

Share your successful story with ReceiveGUARD

Trading Company A

“I received a scam email that used a domain similar to our business partners.”
“I could prevent financial losses since ReceiveGUARD blocked it.”

Public Institution B

“”I was worried that clicking on the links embedded in the email body might infect me with malware.”
“Now, I’m no longer worried because I can see what the links are about in the images.”

Pharmaceutical
Company C

“I almost sent confidential documents without realizing it was from a hacked account.”
“ReceiveGUARD alerted me when the sender’s information changed, allowing me to prevent any potential harm.”

Any Questions on ReceiveGUARD?