Address
1000 Sanger Ave,
Oceanport, NJ, 07757
Phone
(800) 666-3996
Email
[email protected]
Fully Managed
Office 365
Full Time, Real Time Security & Monitoring
What’s Included
Pocket Protector by TetherView offers Fully Managed Email & Managed Email Protection that detects business email compromise, spam, and phishing type emails and attacks. The product catches malicious emails by utilizing computer vision, AI, 24 x 7 experts, and machine learning. Pocket Protector Managed Email Protection is fully managed and provides you with the option to either inform your users of suspicious or malicious emails through an HTML banner or block them with quarantine features. Pocket Protector adds an important layer of protection to your inbox Pocket Protect fully manages your email to adhere with any regulatory requirements.
Phishing, Zero Day
Phishing, 3rd Party Brand Impersonation
AI, machine learning, and
computer vision identify
patterns in text, image, and html
to identify potential threats. The
unique banner system allows
for borderline threats to be
flagged without compromising
business functionality
computer vision identify
patterns in text, image, and html
to identify potential threats. The
unique banner system allows
for borderline threats to be
flagged without compromising
business functionality
Personal Device
Home Attacks
Attacks on personal devices
are mitigated by conducting
analysis on the server side and
injecting the results into the
email, completely removing the
need for remote software such
as dedicated email clients.
are mitigated by conducting
analysis on the server side and
injecting the results into the
email, completely removing the
need for remote software such
as dedicated email clients.
Malicious Links
All links in emails are sanitized
using a sandboxed server.
The user cannot access the
link directly. They are brought
to a landing page showing a
screenshot
using a sandboxed server.
The user cannot access the
link directly. They are brought
to a landing page showing a
screenshot
Malicious Files
Scans for malicious links,
infected PDFs, and embedded
code including scripts. Analyzes
text within each email and
attachment(s) to determine if
sensitive words or phrases
are used such as: password,
invoice, payment, etc.
infected PDFs, and embedded
code including scripts. Analyzes
text within each email and
attachment(s) to determine if
sensitive words or phrases
are used such as: password,
invoice, payment, etc.
VIP Impersonations
Identifies attempts to impersonate VIPs via email
spoofing, typo squatting, or
other malicious tactics
spoofing, typo squatting, or
other malicious tactics
Malicious Insider
Machine learning develops
behavior profiles and social
graphs that identify suspicious
emails that don’t match a
known profile, triggering an
impersonation warning
behavior profiles and social
graphs that identify suspicious
emails that don’t match a
known profile, triggering an
impersonation warning
AI Powered Phishing Protection for Office 365.
Computer Vision
All incoming mail is automatically checked against over two dozen computer vision and text analysis models that “see” the message much like a person would – so even very convincing forgeries are blocked.
Forgery Protection
Protects against both spear phishing and brand forgery attacks.
Easy Deployment
Deploys organization-wide in 1-2 hours.
User Friendly
“Report Phish” link in the mail sends to our security experts. HTML sanitization blocks XSS, Javascript, CSS attacks.