Protection against email exploits and Trojans

Protect your company from attacks that target vulnerabilities which can use email as a threat vector, and malicious email-based Trojan executables.

Protection against email exploits and Trojans

GFI's Email Exploit Engine builds on our research into email exploits, safeguarding you from attacks that specifically target vulnerabilities that can use email as a threat vector. This technology is specifically built to protect against email-based attacks, unlike various email protection technologies on the market that were originally built to protect against file-based or other endpoint-based attacks.

The GFI MailEssentials Trojan and Executable Scanner detects unknown malicious executables by analyzing what they do. A Trojan is a computer program which offers some functionality that might be useful to a user, while performing other malicious actions under the hood (e.g., granting an attacker unrestricted access to data). The scanner uses built-in intelligence to rate the risk level by disassembling the executable, detecting what it might do, and comparing its actions to a database of malicious actions. The scanner then quarantines any executables that perform suspicious actions (e.g., making network connections or accessing the address book).