✕

EG-Platform-logo

International Email Security Standard-Based Email Security Diagnostic Solution

Compliant with 21 security requirements based on ITU-T X.1236. Vulnerability analysis via security inspection of inbound emails. Establishment of countermeasure plans through evaluation of the current email security status. Email security inspection system solution with AI-generated reports.

Malicious Email Analysis and Email Security Diagnostic System Solution

img-Learn

Learn

AI learns the history of inbound emails for 1 month.
img-Analyze

Analyze

Analyzes over 10 risk scenarios and threat possibilities.
img-Diagnose

Diagnose

Customized email security diagnosis for individual users.
img-Report

Report

Produces an email security analysis report generated by AI.

Flowchart for Diagnosis

Flowchart-for-Diagnosis

*Click to enlarge image.

Features

1-Proactive-Countermeasure-System-to-Potential-Threats
Proactive Countermeasure System to Potential Threats
Ensures service availability and continuity for enhancing countermeasure capabilities to security breaches, and establishes a recovery system to unforeseen accidents.
2-Security-Vulnerabilities-Analysis
Security Vulnerabilities Analysis
Prevents security breaches through countermeasures for handling security vulnerabilities and checks compliance on protective measures.
Providing-Security-Diagnosis-Customized-for-Users
Providing Security Diagnosis Customized for Users
Provides diagnostic reports on a regular basis to analyze risk factors for businesses and offer countermeasure plans.

(ITU-T X.1236 Security Requirements 8.5.2)

Sample Analysis Report

Summary-of-Diagnostic-Results

1. Summary of Diagnostic Results

2. Number of Attacks by Date

Number-of-Attacks-by-Date
Number-of-emails-by-type-of-threat

3. Number of Emails by Type of Threat

4. Details of the Latest Received Emails

Details-of-the-Latest-Received-Emails
Summary-of-Detection-Results

5. Summary of Detection Results

6. Countermeasures

Countermeasures
Examples-and-Detection-Information

7. Examples and Detection Information

8. Risk Factors for
Top 5 Users Requiring Caution

Risk-Factors
Risk-Countries

9. Risk Countries for
Top 5 Users Requiring Caution

10. Information on Countries
Sending Malicious Email

Information-on-Countries
Information-on-Countries

10. Information on Countries
Sending Malicious Email

11. Result of Final Diagnosis

Result-of-Final-Diagnosis
Email-Security-Requirements-Checklist

12. Email Security Requirements Checklist

Recommend to

Companies in need of raising security awareness among employees.
Companies looking to establish a countermeasure system for new malware & emails containing ransomware.
Companies in need of regular security inspections for malicious mails.
Companies in need of raising security awareness among employees.
blue-line-straight
Companies looking to establish a countermeasure system for new malware & emails containing ransomware.
blue-line-straight
Companies in need of regular security inspections for malicious mails.

Any Questions on EG-Platform?