Categories: Email SecurityMailbox

WHAT IS PROACTIVE ID PROTECTION & WHY DOES MY COMPANY NEED IT ?

Evolution of technology has always kept miscreants busy fishing for vulnerabilities that can be exploited. The influx of smart portable devices has only helped scamsters in broadening their activity. Attempts to compromise account credentials have been on an exponential rise. IT managers have been perplexed with situations like spurious login attempts, identity thefts, etc & are looking for proactive protection. IDProtect has been built to protect in real time and act as a shield against most type of access frauds.

“IDProtect”
Evolution of technology has always kept miscreants busy fishing for vulnerabilities that can be exploited. The influx of smart portable devices has only helped scamsters in broadening their activity. Attempts to compromise account credentials have been on an exponential rise.IT managers have been perplexed with situations like spurious login attempts, identity thefts, etc & are looking for proactive protection. IDProtect has been built to protect in real time and act as a shield against most type of access frauds. It is a self-learning engine that uses sophisticated algorithms to map every users legitimate access patterns. Aberrated access patterns are intercepted real time & are red flagged. Users are then notified and is expected to take appropriate actions like Block or Allow these patterns.

How will users be notified?
User will get an email on his id, alternate email id & a text message on his mobile. Notifications sent to the user’s mailbox will be only informative Notifications sent to the user’s alternate email id and mobile will contain a link to view details of the suspicious sign in attempt and take an appropriate action.

What should users do after receiving a notification?
IF IDProtect detects any new access pattern, notification will be sent & the it will have details of Service(Web,App,SMTP,POP3,IMAP) & ISP, Users can Allow or block such access requests. New Access pattern will be detected if user accesses his email from a new location or new network. On users acknowledgement system will Whitelist or Blacklist them. For any unknown access, it is recommended to change PASSWORD immediately & disinfect all devices using standard anti-virus/malwares
Admin can monitor all notifications sent to his users using Admin Panel & can also Block or Allow access on behalf of users in case user himself is unable to get notifications.

Warming up to IDProtect
Admins are requested to keep users Mobile numbers & Alternate mail ids updated in system, Users with no details need to contact Admin for actions to be taken.
You can choose to mention your details or common data for system,group ids.

The Cold Start
New Mailbox created needs to verify every service they will use hence it is recommended to mention their proper Mobile Number & Alternate ids in system. We are Sure this Feature will assist you to keep your mailboxes even more Safe & Secure.

Jeevanand

Biographical Info - Share a little biographical information to fill out your profile. This may be shown publicly.

Share
Published by
Jeevanand
Tags: cloud email

Recent Posts

Debating on Cloud vs On-Premise: Why not choose Hybrid Email Solution?

Hybrid solution combines two models of email delivery on the same domain, offering the best…

4 years ago

Want to stop your customers from getting duped by email spoofing? Implement DMARC now!!

Organizations can stop spoof emails impersonating as them from reaching their customer’s inbox or junk/bulk…

5 years ago

Understanding Email & Collaboration

Teamwork creates human synergy. In today’s age, technology and specifically your Business Email can get…

6 years ago

DataCenter Summit and Awards 2018 – By USB Forums

Venkata Satish Guttula, Director – Security, Rediff.com India Ltd, has won an Award under the…

6 years ago

Demystifying Spear Phishing

Spear phishing is used when a hacker targets specific people using a more personalized approach.…

6 years ago

Protect your domain’s reputation with DMARC

Your brand reputation can be at risk. Cyber criminals can exploit the weaknesses in email…

6 years ago