Phish Protection by DuoCircle Features
What are the features of Phish Protection by DuoCircle?
Administration
- Intelligence Reporting
- Access Management
Maintenance
- Allow and block lists
Security
- Anti-Malware/Anti-Spam
- Quarantine
Functionality
- Anti-Spam
- Anti-Phishing
Top Rated Phish Protection by DuoCircle Alternatives
(548)
4.6 out of 5
Visit Website
Sponsored
Phish Protection by DuoCircle Categories on G2
Filter for Features
Administration
Intelligence Reporting | Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious sources and characteristics of potentially malicious content | 95% (Based on 10 reviews) | |
Email Integration Suppor | Supports secure implementation with popular email applications and clients. | Not enough data | |
Access Management | Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Allows administrators to set user access privileges to permit approved parties to access sensitive data. | 92% (Based on 10 reviews) | |
Data Loss Prevention | Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. | Not enough data |
Maintenance
Auditing | Access pre-built and custom reports to monitor user activity and storage. | Not enough data | |
Allow and block lists | Based on 17 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud and other suspicious accounts from future communications | 90% (Based on 17 reviews) | |
Archiving | Archives conversations, files, and other communications for future reference | Not enough data |
Security
Anti-Malware/Anti-Spam | Based on 16 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools. | 92% (Based on 16 reviews) | |
Quarantine | Based on 11 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Isolates potentially malicious content and files before they can gain network access | 94% (Based on 11 reviews) | |
Advanced Threat Protection (ATP) | Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks. | Not enough data | |
Anti-Phishing | Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks. | Not enough data | |
Account takeover prevention | Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. | Not enough data |
Functionality
Anti-Spam | Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes. | 93% (Based on 10 reviews) | |
Anti-Malware | Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients. | Not enough data | |
Anti-Phishing | Based on 10 Phish Protection by DuoCircle reviews and verified by the G2 Product R&D team. prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks. | 92% (Based on 10 reviews) | |
Filtering Functionality | Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients. | Not enough data | |
Quarantine | Includes a quarantine area for users to manually inspect suspicious emails. | Not enough data | |
Outbound Email Monitoring | Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent. | Not enough data | |
Advanced Threat Intelligence/Protection | Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing. | Not enough data | |
Archiving | Offers archival email retention for compliance purposes. | Not enough data | |
Reporting | Offers standard reporting functionality. | Not enough data | |
On-prem deployment | Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations. | Not enough data |