www.armorblox.com Open in urlscan Pro
2a05:d014:275:cb01::c8  Public Scan

Submitted URL: https://em.armorblox.com/MTc2LVhNSi0wMzAAAAGLxJcRR0C_XmGt2tBwgLtTrbIfvgsJQ_MJ4vOvu5mKsWj56ekQWb8vI1Nxe1KtRuHAzAdEipY=
Effective URL: https://www.armorblox.com/blog/esg-report-highlights-persisting-weaknesses-in-email-security/?utm_medium=offer&utm_source=...
Submission: On May 17 via api from NL — Scanned from NL

Form analysis 2 forms found in the DOM

<form id="mktoForm_1082" class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate">
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired input"
          aria-required="true" style="width: 150px;" placeholder="Email" data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton action" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid"
    class="mktoField mktoFieldDescriptor input" value="1082" placeholder="formid"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor input" value="176-XMJ-030" placeholder="munchkinId">
</form>

<form class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="-138368615" __biza="W___" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

Why Armorblox
Why ArmorbloxAbout UsNews & PressContact Us
Popular Content

 * Blog
   
   
   HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER
   
   Learn more

Product
Product Capabilities
 * Advanced Threat Protection
 * Advanced URL Protection
 * Advanced Malware Detection
 * Advanced Data Loss Prevention
 * Security Operations
 * All Products

Product Tours
 * Main Product Tour
 * Phishing Product Tour
 * Business Email Compromise Tour
 * Brand Impersonation Tour
 * Data Loss Prevention Product Tour
 * Vendor Compromise Tour
 * Security Operations Product Tour
 * All Product Tours

Integrations
 * All Integrations

Popular Content

 * Blog
   
   
   HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER
   
   Learn more

Solutions
By Use Case
 * Business Email Compromise
 * Email Account Compromise
 * Graymail and Recon Threats
 * Executive Phishing
 * Data Loss Prevention
 * Abuse Mailbox Remediation

By Platform
 * Microsoft Office 365
 * Google Workspace
 * Secure Email Gateway Augmentation

By Industry
 * Financial Services
 * Education
 * Healthcare
 * Manufacturing
 * Retail

Popular Content

 * Blog
   
   
   HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER
   
   Learn more

CustomersResources
Learning Center
 * Business Email Compromise
 * Vendor Email Compromise
 * Spear Phishing
 * Ransomware
 * Vishing
 * Email DLP
 * Tools and Templates
 * All Topics

Resources
 * Templates
 * Whitepapers
 * Solution Briefs
 * Datasheets
 * Videos
 * Webinars
 * All Resources

Blog
 * Articles & Thought Leadership
 * Threat Research
 * Product Features
 * Customer Success Stories
 * All Articles

Humans of Cybersecurity
 * All Stories

Popular Content


 * UNDERSTANDING YOUR ORGANIZATION’S VENDOR FRAUD AND SUPPLY CHAIN RISK


 * PROTECTING YOUR ORGANIZATION AGAINST VENDOR FRAUD AND SUPPLY CHAIN ATTACKS


 * PREVENT VENDOR AND SUPPLY CHAIN ATTACKS WITH ARMORBLOX

Pricing

Get a Demo

Articles & Thought Leadership | 5 min read


ENTERPRISE STRATEGY GROUP REPORT HIGHLIGHTS PERSISTING WEAKNESSES IN EMAIL
SECURITY DESPITE MATURITY

Share:

 1. Armorblogs
    /
 2. Articles & Thought Leadership
    /
 3. Enterprise Strategy Group Report Highlights Persisting Weaknesses in Email
    Security Despite Maturity

Lauryn Cash
May 11, 2023

Recent report released by Enterprise Strategy Group (ESG) highlights the
persisting weaknesses in email security, with 38% of respondents viewing email
as the most vulnerable channel to threat actors.

--------------------------------------------------------------------------------

The recently released Armorblox and Enterprise Strategy Group (ESG) report
provides an in-depth analysis of the current state of enterprise email security
and the challenges that organizations face in securing their communications
channels. The report highlights the critical need for organizations to adopt
more robust and comprehensive email security measures to protect against today's
advanced email threats, and underscores the importance of prioritizing
sophisticated email security as a key component of a comprehensive cybersecurity
strategy, particularly as remote work and digital transformation continue to
shape the modern enterprise landscape.


EMAIL REMAINS CHANNEL MOST VULNERABLE TO THREAT ACTORS

When looking at the communication and collaboration mechanisms considered most
vulnerable to threats, we see file sharing and cloud storage tools plus
messaging in the top four. But by almost 4x, we see email taking the lead by a
significant percentage. This vulnerability is likely due to the widespread use
of email for both internal and external communications, as well as the sensitive
information that may be exchanged through email.

Fig 1: Email considered most vulnerable threat compared to top 8 communication
and collaboration mechanisms [source: Enterprise Strategy Group, a division of
TechTarget, Inc. eBook, The Freedom to Communicate and Collaborate, April 2023.]

> “While most organizations are leveraging six or more tools for communication
> and collaboration, email tops the list by a wide margin as the channel
> considered most vulnerable to threat actors.”
> - Dave Gruber, Principal Analyst at Enterprise Strategy Group (ESG)

The significant gap between email and file sharing and cloud storage tools
(coming in second place at 13%, emphasizes the high level of risk associated
with email communication. To combat these risks and the vulnerabilities these
collaboration tools present, organizations should look to augment native email
security with API-based email security that provide strong email security
measures to identify and prevent targeted, email-based attacks.

Other communication and collaboration tools listed: messaging,
application-specific workflow communications, video conferencing, shared
whiteboarding, shared project management, and shared calendar also pose a
certain level of risk. It is best practice for organizations to implement
security measures specific to each mechanism – multi-factor authentication,
secure messaging and password protection tools, and access control for shared
communication and project management tools.

The data gathered from Armorblox and ESG shed light on the importance of
prioritizing email security, as it is considered the most vulnerable mechanism
for communication and collaboration. It is crucial for organizations to adopt
and implement API-based email security that mitigates the risks associated with
legacy security tools to ensure the safety and protection of end users, the
organization, and sensitive information.


THE GAPS IN PRIMARY EMAIL FAIL TO PROVIDE THE NECESSARY PROTECTION TO COMBAT
TODAY’S THREATS

The data gathered by Armorblox and ESG highlights the multitude of gaps that
still persist in legacy and native email security solutions that many
organizations rely on. As the data suggests, these solutions fail to provide the
necessary protection to combat today's email attacks, which include both
external and internal threats.

In a recent report, Armorblox found that a significant 56% of all email attacks
bypassed legacy security filters, indicating the inadequacy of traditional
security solutions to detect and prevent new and evolving email-based threats.
Additionally, a startling 52% of all attacks involved sensitive user data,
highlighting the severity of the consequences of email attacks.

Coupled with the data gathered by ESG, both parties are in agreement that
primary email security solutions are ineffective in providing the necessary
protection to combat today’s email attacks. The lack of protection, in turn,
undermines the efficacy, compliance, and reliability of email communication,
leading to potentially severe consequences for organizations.

Fig 2: Challenges experienced with current primary email security solution
[source: Enterprise Strategy Group, a division of TechTarget, Inc. eBook, The
Freedom to Communicate and Collaborate, April 2023.]

These findings point towards the need for organizations to reassess their email
security measures and adopt more robust and comprehensive solutions that address
the gaps in legacy and native security solutions. Such measures may include the
use of GPT-powered email security solutions that can detect and prevent advanced
email threats, including spear phishing, vendor fraud, internal threats and
account compromise, and social engineering attacks.

--------------------------------------------------------------------------------


READ THE FULL ANALYSIS OF THE CHALLENGES THAT ORGANIZATIONS FACE IN SECURING
THEIR COMMUNICATION CHANNELS BY DOWNLOADING THE FULL ESG REPORT.

Download Report


SUBSCRIBE FOR THE MOST UP-TO-DATE EMAIL SECURITY INSIGHTS

Sign up for our newsletter to get the latest updates on the email threat
landscape, including new trends and attacks.

*
Email:




Subscribe


SEE ARMORBLOX IN ACTION

See how Armorblox uses the power of Natural Language Understanding (NLU) and
machine learning models to prevent BEC and targeted phishing attacks, prevent
unauthorized exposure of  sensitive PII, PCI, and PHI, and reduce incident
response times.

Take Product Tour


RELATED ARTICLES

Articles & Thought Leadership


KEY TAKEAWAYS: ARMORBLOX 2023 EMAIL SECURITY THREAT REPORT

Key findings of Armorblox 2023 Email Security Threat Report, which documents the
rise in targeted attacks, a shift in trends across a broad range of attacks, and
highlights the use of language to bypass existing email security controls. See
some of the key findings of this this report, a study of email-based attack
trends compiled by analyzing over 4 billion emails and stopping over 800,000
threats every month, while protecting over 58,000 customers.

Articles & Thought Leadership


HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER

In a time when bad actors can easily access AI, ML, and LLM tools for malicious
intent, organizations will need to take extra steps to protect themselves from
targeted email attacks. Here are some of the most frequently asked questions our
CEO, DJ Sampath, gets about AI and LLMs like GPT and his thoughts on this
technology to date, where he believes it’s headed next, and how it will change
cybersecurity forever.

Articles & Thought Leadership


ARMORBLOX CONTEXT 2023 - RSAC EDITION RECAP

Check out a full recap of Armorblox CONTEXT 2023 - RSAC Edition event that
happened on April 24, 2023, at the Children's Creativity Museum in San
Francisco. The event brought together top cybersecurity experts from the FBI,
CISA, Albertsons Companies, and SentinelOne, among others, to share their
insights and have impactful discussions about topics such as AI, supply chain
attacks, financial fraud, and more.

Articles & Thought Leadership


5 STEPS CISOS SHOULD TAKE TO IMPROVE THEIR SECURITY POSTURE IN 2023

CISOs are tasked with ensuring the security of their organization by guarding
them against cyberattacks and data loss. Let's review 5 important steps that
CISOs can take to improve their organization's security posture in 2023 and
beyond.

Articles & Thought Leadership


EMAIL SECURITY PREDICTIONS FOR 2023 AND BEYOND

2022 has been a year full of changes for cybersecurity teams worldwide, and new
variants of targeted email attacks –compromising vendors to launch supply chain
attacks, attempts at stealing credentials, and different flavors of executive
impersonation. Read our astute predictions for 2023 - and how Armorblox is
leading the charge to better protect organizations.

Articles & Thought Leadership


PROTECTING CRITICAL BUSINESS WORKFLOWS IN THE AGE OF CHATGPT

ChatGPT, an AI-generated chatbot, presents cybercriminals and scammers with a
free and easy-to-use tool for generating socially engineered attacks such as
financial fraud, credential phishing, vendor fraud, and more. Learn how to
protect your employees and organization from these types of attacks and data
loss.






EXPERIENCE THE ARMORBLOX DIFFERENCE

If you have questions about email security, Armorblox has the answers you're
looking for. Request a product demo to find out more.

Get a Demo



100 S. Murphy Avenue, Suite 200
Sunnyvale, CA 94086
(650) 260-5352




ARMORBLOX


EMAIL SECURITY

4.7
11 Ratings
Submit a review
As of 17 May 2023
Company
 * Why Armorblox
 * About Us
 * News
 * Careers
 * Customers

Product
 * Overview
 * Product Tour
 * Integrations
 * Pricing

Solutions
 * Business Email Compromise
 * Email Account Compromise
 * Graymail and Recon Threats
 * Executive Phishing
 * Email Data Loss Prevention
 * Abuse Mailbox Remediation

Resources
 * Resources
 * Trust Center
 * Blog
 * Contact Support

© 2023 Armorblox. All Rights Reserved. Privacy Policy.

Cookies Settings


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Privacy Policy

Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

SOCIAL MEDIA COOKIES

Social Media Cookies

These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Cookies Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
Switch Label label
Switch Label label
Switch Label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Reject All Confirm My Choices