Save to My Lists
Claimed
Claimed

Phish Protection by DuoCircle Features

What are the features of Phish Protection by DuoCircle?

Administration

  • Intelligence Reporting
  • Access Management

Maintenance

  • Allow and block lists

Security

  • Anti-Malware/Anti-Spam
  • Quarantine

Functionality

  • Anti-Spam
  • Anti-Phishing

Top Rated Phish Protection by DuoCircle Alternatives

Filter for Features

Administration

Intelligence Reporting

Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious sources and characteristics of potentially malicious content
95%
(Based on 10 reviews)

Email Integration Suppor

Supports secure implementation with popular email applications and clients.

Not enough data

Access Management

Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Allows administrators to set user access privileges to permit approved parties to access sensitive data.
92%
(Based on 10 reviews)

Data Loss Prevention

Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.

Not enough data

Maintenance

Auditing

Access pre-built and custom reports to monitor user activity and storage.

Not enough data

Allow and block lists

Based on 17 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud and other suspicious accounts from future communications
90%
(Based on 17 reviews)

Archiving

Archives conversations, files, and other communications for future reference

Not enough data

Security

Anti-Malware/Anti-Spam

Based on 16 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
92%
(Based on 16 reviews)

Quarantine

Based on 11 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Isolates potentially malicious content and files before they can gain network access
94%
(Based on 11 reviews)

Advanced Threat Protection (ATP)

Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.

Not enough data

Anti-Phishing

Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.

Not enough data

Account takeover prevention

Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.

Not enough data

Functionality

Anti-Spam

Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes.
93%
(Based on 10 reviews)

Anti-Malware

Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients.

Not enough data

Anti-Phishing

Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks.
92%
(Based on 10 reviews)

Filtering Functionality

Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients.

Not enough data

Quarantine

Includes a quarantine area for users to manually inspect suspicious emails.

Not enough data

Outbound Email Monitoring

Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent.

Not enough data

Advanced Threat Intelligence/Protection

Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing.

Not enough data

Archiving

Offers archival email retention for compliance purposes.

Not enough data

Reporting

Offers standard reporting functionality.

Not enough data

On-prem deployment

Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations.

Not enough data