With automatic prioritization for emails, PhishER™ helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
Because phishing remains the most widely used cyber attack vector, most end users report a lot of email messages they “think” could be potentially malicious to your incident response team.
Whether or not you step employees through security awareness training doesn’t change the fact that your users are likely already reporting potentially dangerous emails in some fashion within your organization. The increase of this email traffic… can present a new problem!
With the firehose of spam and malicious email that attack your network, some 7-10% of these make it past your filters. With only approximately 1 in 10 user-reported emails being verified as actually malicious, how do you not only handle the high-risk phishing attacks and threats, but also effectively manage the other 90% of user-reported messages accurately and efficiently? Now, there is PhishER.
PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
Additionally, with PhishER you are able to automate the workstream of the 90% of reported emails that are not threats. Incident Response (IR) orchestration can easily deliver immediate efficiencies to your security team, but the potential value is much greater than that.
With the right strategy and planning, your organization can build a fully orchestrated and intelligent SOC that can contend with today’s threats. PhishER enables a critical workstream to help your IR teams work together to mitigate the phishing threat and is suited for any organization that wants to automatically prioritize and manage potentially malicious messages - accurately and fast! PhishER is available as a stand-alone product or as an add-on option for current KnowBe4 customers.
PhishER is a simple and easy-to-use web-based platform with critical workstream functionality that serves as your phishing emergency room to identify and respond to user-reported messages. PhishER helps you prioritize and analyze what messages are legitimate and what messages are not - quickly. With PhishER, your team can prioritize, analyze, and manage a large volume of email messages - fast! The goal is to help you and your team prioritize as many messages as possible automatically, with an opportunity to review PhishER’s recommended focus points and take the actions you desire.
With PhishER Security Roles, you can easily distribute your team's workload of email analysis and dispositioning from within PhishER. Use Limited and Full access Security Roles to implement a multi-tiered incident response system based on the severity levels of your user-reported messages in PhishER.
PhishER processes user-reported phishing and other suspicious emails by grouping and categorizing emails based on rules, tags, and actions. PhishML, the custom machine-learning module, analyzes messages and generates confidence values which are used to tag messages. PhishRIP helps you easily find and quarantine suspicious messages still sitting in mailboxes across your entire organization. PhishFlip automatically turns defanged phishing emails into training opportunities by flipping them into simulated phishing campaigns.
PhishER will help you prioritize every reported message into one of three categories: Clean, Spam, or Threat. Through rules you set, PhishER helps you develop your process to automatically prioritize as many messages as possible without human interaction.
With automatic prioritization of emails that are not threats, PhishER helps your team respond to the most dangerous threats more quickly. PhishER easily integrates with KnowBe4’s email add-in button, Phish Alert, and also works by forwarding to a dedicated mailbox. PhishER reviews attributes of reported messages and stack ranks the most critical messages based on priority.
You can create custom rules, use the built-in YARA-based system rules, or edit existing YARA rules. Using PhishER's YARA Basic Editor, you can easily create strings and conditions for your rules. You can use system rules to help simplify your rules requirements or copy and modify to customize rules depending on the proficiency of your incident response team.
KnowBe4’s PhishML is a PhishER machine-learning module that helps you identify and assess the suspicious messages that are reported by your users, at the beginning of your message prioritization process. PhishML analyzes every message coming into the PhishER platform and gives you the info to make your prioritization process easier, faster, and more accurate.
PhishML is constantly learning based on the messages that are tagged, not only by you but also by other members of the PhishER user community! That means that the learning model is being fed new data to constantly improve its accuracy and more messages can be automatically prioritized based upon PhishER’s categorization, saving you even more time.
KnowBe4’s PhishRIP is an email quarantine feature that integrates with Microsoft 365 and Google Workspace to help you remove, inoculate, and protect your organization against email threats so you can shut down active phishing attacks fast.
PhishRIP enables you to:
With the PhishER Blocklist feature, it’s super easy to create your organization’s unique list of blocklist entries and dramatically improve your Microsoft 365 email filters without ever leaving the PhishER console. You can now use reported messages to prevent future malicious email with the same sender, URL or attachment from reaching other users!
PhishFlip is a PhishER feature that allows you to respond in real time and turn the tables on cybercriminals. With PhishFlip, you can now immediately ‘flip’ a dangerous attack into an instant real-world training opportunity for your users. PhishFlip enables you to take your user-reported phishing email threats identified by PhishER and turn what was an active phishing attack into a safe simulated phishing campaign.
PhishFlip takes those real email threats removed by PhishRIP and creates a defanged look-alike version of that message. Then, PhishFlip automatically kicks off a simulated phishing campaign within your KnowBe4 console, and immediately replaces those real phishing emails sitting in your users’ mailboxes with a defanged phishing security test. That’s about as real-world as you can get!
PhishER features “Emergency Rooms” to help you identify similar messages reported by your users. Emergency Rooms consist of pre-filtered views of your messages that are unresolved in your PhishER inbox. These messages are dynamically grouped by commonalities and include system pre-filtered views for messages by Top Subject Lines, Top Senders, Top Attachments, and Top URLs.
Each room is interactive, allowing you to drill down into filtered inbox views of the messages and take action across all associated messages at the same time. The overview of the Emergency Rooms allows you to immediately prioritize which room contains the most messages and is in need of attention.
PhishER integrates with external services like VirusTotal to help analyze attachments and malicious domains. Using URL Unwinding, PhishER automatically expands shortened URLs to help see the potential threat level of the final destination.
With PhishER’s API integration, you can connect PhishER with your existing security infrastructure and maximize your security investments. Leverage seamless, bi-directional API integration into your current security stack: SIEM, detection tools, ticketing systems, and more.
PhishER also integrates into your organization by pushing data into popular SIEM platforms such as Splunk and QRadar. With support for multiple syslog destinations available it's also possible to push data into as many other systems as you like.