Advertisment

Votiro incorporates spear phishing protection into its sanitization service

author-image
Sanghamitra Kar
New Update

TEL AVIV, ISRAEL: Votiro, the provider of Secure Data Sanitization solutions for protecting organizations against zero-day and other ongoing cyber-threats, announced that it has extended the usability of its free, cloud-based, sanitization service to include protection against spear phishing and other email-based attacks.

Advertisment

The existing version of Votiro's sanitization service analyzes uploaded files for the presence of malicious code and facilitates the quick neutralization of zero-day and unknown exploits.

Votiro's service sanitizes a file by scanning it with anti-virus programs and then by running an active, patent-pending process on the file, which eliminates the potential presence of any exploit code.

The new version of Votiro's sanitization service includes protection against spear phishing and other email-based attacks. It allows users to forward questionable emails to the service and runs the same scanning and active process on email attachments. By providing this immediate protection, this upgrade improves the usability of the service.

Advertisment

Itay Glick, founder and CEO of Votiro, said: "Statistics consistently show that nearly all cyber-attacks begin with a spear phishing email that appears to be innocent, although its contents are tainted with a hidden exploit or similar advanced cyber-threats. Our mission is to position our customers with a security posture that automatically identifies and eliminates the growing range of unknown and ongoing cybersecurity threats. By extending our free service, we are allowing enterprises and organizations to sample the strengths and benefits of our new spear phishing protection capabilities that are being incorporated into our overall solution."

This sanitization service is part of Votiro's overall Secure Data Sanitization solutions. It automatically performs the sanitization process as the free, cloud-based service on all incoming email contents.

This comprehensive process does not affect the usability of a file and can be seamlessly integrated into an organizationÂ’s IT infrastructure. It eliminates cyber-threats before they have the opportunity to penetrate an organizationÂ’s network and attack critical IT infrastructure and extract sensitive data.

tech-news smac