www.mailinblack.com
Open in
urlscan Pro
20.19.188.86
Public Scan
Submitted URL: https://www.mailinblack.com/en/product/mailinblack-spam-protection/?utm_source=DA&utm_medium=emailda&utm_campaign=new-banner...
Effective URL: https://www.mailinblack.com/en/products/mailinblack-spam-protection/?utm_source=DA&utm_medium=emailda&utm_campaign=new-banne...
Submission: On October 05 via manual from NL — Scanned from FR
Effective URL: https://www.mailinblack.com/en/products/mailinblack-spam-protection/?utm_source=DA&utm_medium=emailda&utm_campaign=new-banne...
Submission: On October 05 via manual from NL — Scanned from FR
Form analysis
2 forms found in the DOMGET
<form class="jsonform-hasrequired" name="" id="foss-65094e4dd59cbc496998724f" language="en" method="GET" action="" style="display: block;">
<div class="" name="">
<div class="control-group plezi-form-field jsonform-error-company jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-company">Company<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="company" id="jsonform-1-elt-company" required="required" type="text">
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="87"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-headcount jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-headcount">Headcount<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><select class="form-control" name="headcount" id="jsonform-1-elt-headcount" required="required" style="color: rgb(117, 117, 117);">
<option class="" name="" value="" selected="selected"></option>
<option class="" name="" value="63779902e317a74efc868f45" data-key-record="1-50">1 - 50</option>
<option class="" name="" value="635173c4007fb76af404c938" data-key-record="51-250">51 - 250</option>
<option class="" name="" value="6368cd17e317a75ef404895c" data-key-record="251-1000">251 - 1000</option>
<option class="" name="" value="6368cd29f420870f6ce0e223" data-key-record="-1000">>1000</option>
</select>
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="88"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-first_name jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-first_name">First Name<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="first_name" id="jsonform-1-elt-first_name" required="required" type="text">
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="89"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-last_name jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-last_name">Last Name<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="last_name" id="jsonform-1-elt-last_name" required="required" type="text">
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="90"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-email jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-email">Email<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="email" id="jsonform-1-elt-email" data-contains="["@"]"
data-not-contains="["gmail", "orange", "yahoo", "free", "hotmail", "wanadoo", "s3.guardianmail", "tab.buzzcluby", "sfr", "outlook", "icloud", "live", "gmx", "aol", ".me"]"
data-reject-disposable="true" required="required" type="email">
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="91"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-phone jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-phone">Phone<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="phone" id="jsonform-1-elt-phone" required="required" type="text">
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="92"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-message keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-message">Message</label>
<div class="controls" name=""><textarea class="form-control" name="message" id="jsonform-1-elt-message"></textarea>
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="93"></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_adgroupe_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_adgroupe_ga" id="jsonform-1-elt-plz_adgroupe_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_campagne_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_campagne_ga" id="jsonform-1-elt-plz_campagne_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_details_lead_source keep-field" name="" style="display:none;">
<div class="controls" name=""><select class="form-control" name="plz_details_lead_source" id="jsonform-1-elt-plz_details_lead_source" style="color: rgb(27, 27, 27);">
<option class="" name="" value="" selected="selected"></option>
<option class="" name="" value="63458e7f54067a69ebc2bee8" data-key-record="formulaire-partenaires">Formulaire Partenaires</option>
<option class="" name="" value="64ff0c6bf420874ee40fa09e" data-key-record="formulaire-simulation-de-cyberattaques">Formulaire simulation de cyberattaques</option>
<option class="" name="" value="65020f3a54067a05472fb96f" data-key-record="formulaire-page-cyber-academy">Formulaire Page Cyber Academy</option>
<option class="" name="" value="65030fc9f4208718ae403722" data-key-record="liste-nurturing-livre-blanc">Liste Nurturing Livre Blanc</option>
<option class="" name="" value="65094ce1e317a7746461a46b" data-key-record="formulaire-en-page-produit-protect">Formulaire EN page produit protect</option>
<option class="" name="" value="65094cf0f420873cdd63c66b" data-key-record="formulaire-en-page-produit-cyber-coach">Formulaire EN page produit Cyber Coach</option>
<option class="" name="" value="65094d01e317a7433434bc6f" data-key-record="formulaire-en-page-produit-cyber-academy">Formulaire EN page produit Cyber Academy</option>
<option class="" name="" value="65094d1254067a790c9d4add" data-key-record="formulaire-en-anti-malware">Formulaire EN anti-malware</option>
<option class="" name="" value="65094d2054067a4f9ba05095" data-key-record="formulaire-en-anti-phishing">Formulaire EN anti-phishing</option>
<option class="" name="" value="65094d2de317a7746461a46e" data-key-record="formulaire-en-anti-ransomware">Formulaire EN anti-ransomware</option>
<option class="" name="" value="65094d3bf420874e0d79e2fe" data-key-record="formulaire-en-anti-spam">Formulaire EN anti-spam</option>
<option class="" name="" value="65094d4ee317a74dffd6e0ed" data-key-record="formulaire-right-to-disconnect">Formulaire Right to disconnect</option>
<option class="" name="" value="65094d67e317a72c88c9feff" data-key-record="formulaire-audit-of-human-vulnerabilities">Formulaire Audit of human vulnerabilities</option>
<option class="" name="" value="65094d82e317a72c88c9ff00" data-key-record="formulaire-phishing-simulation">Formulaire Phishing simulation</option>
<option class="" name="" value="65094d91f420874e0d79e300" data-key-record="formulaire-ransomware-simulation">Formulaire Ransomware simulation</option>
<option class="" name="" value="65094da0f420873cdd63c675" data-key-record="formulaire-cyber-attacks-simulation">Formulaire Cyber attacks simulation</option>
<option class="" name="" value="6509532af420873cdd63c682" data-key-record="formulaire-en-spearphishing">Formulaire EN spearphishing</option>
<option class="" name="" value="64fefbeef4208733993394e4" data-key-record="formulaire-droit-a-la-deconnexion">Formulaire droit a la deconnexion</option>
<option class="" name="" value="64fefed154067a4d870c670b" data-key-record="formulaire-formation-cybersecurite">Formulaire formation cybersecurite</option>
<option class="" name="" value="64ff017b54067a5f260bf9f3" data-key-record="formulaire-des-vulerabilites-humaines">Formulaire des vulerabilites humaines </option>
<option class="" name="" value="64e4627254067a3b226ff025" data-key-record="formulaire-devis-es-protect">Formulaire Devis ES Protect</option>
<option class="" name="" value="64e46342e317a77ffce0e542" data-key-record="formulaire-devis-es-cyber-coach">Formulaire Devis ES Cyber Coach</option>
<option class="" name="" value="64e4636354067a35c8fecc9e" data-key-record="formulaire-devis-es-cyber-academy">Formulaire Devis ES Cyber Academy</option>
<option class="" name="" value="64e46380f420875b6982cdb7" data-key-record="formulaire-demo-es-protect">Formulaire Demo ES Protect</option>
<option class="" name="" value="64e463b1f420873774aae5d8" data-key-record="formulaire-demo-es-cyber-coach">Formulaire Demo ES Cyber Coach</option>
<option class="" name="" value="64e46546e317a70362de22c1" data-key-record="formulaire-demo-es">Formulaire Demo ES </option>
<option class="" name="" value="64e4656154067a7c190ccb11" data-key-record="formulaire-devis-es">Formulaire Devis ES</option>
<option class="" name="" value="64e48018e317a7281dcfe6ac" data-key-record="formulaire-demo-es-cyber-academy">Formulaire Demo ES Cyber Academy</option>
<option class="" name="" value="64e71989e317a72adc9ab19b" data-key-record="formulaire-partenaires-esp">Formulaire Partenaires ESP</option>
<option class="" name="" value="64eda058e317a71f07f2cdd0" data-key-record="formulaires-ressources-guides-comment-former-et-prot-ger-vos-quipes-contre-les-attaques-informatiques">Formulaires Ressources Guides : Comment former et protéger vos
équipes contre les attaques informatiques</option>
<option class="" name="" value="64ede78fe317a70534979d9e" data-key-record="formulaire-intelligence-artificielle-comment-l-ia-r-volutionne-t-elle-la-cybers-curit-en-entreprise">Formulaire Intelligence artificielle Comment l’IA
révolutionne-t-elle la cybersécurité en entreprise</option>
<option class="" name="" value="64dcd38bc41190618233dc1d" data-key-record="facebook">facebook</option>
<option class="" name="" value="64dcd3b1c41190618233dc1e" data-key-record="formulaire-demande-de-demo">Formulaire demande de demo</option>
<option class="" name="" value="64dcd409c41190618233dc1f" data-key-record="mib-ressources-20211013-formulaire-dsi-6-conseils-pour-diminuer-vos-risques-cyber">MIB-RESSOURCES-20211013- Formulaire DSI : 6 conseils pour diminuer vos risques
cyber</option>
<option class="" name="" value="64dcd4dac41190618233dc20" data-key-record="facebook-ads">Facebook Ads</option>
<option class="" name="" value="64dcd7ccc41190618233dc21" data-key-record="formulaire-guides-quels-sont-les-principaux-vecteurs-d-attaques-informatiques">Formulaire Guides : Quels sont les principaux vecteurs d’attaques informatiques ?
</option>
<option class="" name="" value="64dcd815c41190618233dc22" data-key-record="webinar-webikeo-12-10-21">Webinar Webikeo 12/10/21</option>
<option class="" name="" value="64dcda20c41190618233dc23" data-key-record="formulaire-devis-anti-spam">Formulaire devis anti-spam</option>
<option class="" name="" value="64dcda3ac41190618233dc24" data-key-record="webinar-webikeo-21-09">Webinar Webikeo 21/09</option>
<option class="" name="" value="64dcdabac41190618233dc25" data-key-record="become-digital-21">Become Digital 21</option>
<option class="" name="" value="64dcdaeec41190618233dc26" data-key-record="mib-ressources-202106-formulaires-ressources-guides-quelles-sont-les-tendances-et-les-innovations-des-hackers-en-2020">MIB-RESSOURCES-202106- Formulaires Ressources
Guides : Quelles sont les tendances et les innovations des hackers en 2020 ?</option>
<option class="" name="" value="64dcdb0ec41190618233dc27" data-key-record="mib-ressources-202106-formulaires-ressources-guides-cyberattaques-comment-se-prot-ger">MIB-RESSOURCES-202106- Formulaires Ressources Guides : Cyberattaques : comment
se protéger ?</option>
<option class="" name="" value="64dcdb1ec41190618233dc28" data-key-record="mib-ressources-202106-formulaires-ressources-guides-tablissements-de-sant-panorama-des-cyberattaques">MIB-RESSOURCES-202106- Formulaires Ressources Guides :
Établissements de santé : Panorama des cyberattaques</option>
<option class="" name="" value="64dcdb7fc41190618233dc29" data-key-record="sites-r-f-rents-sea-direct">Sites référents;SEA;;direct;</option>
<option class="" name="" value="64dcdbdec41190618233dc2a" data-key-record="da-sites-r-f-rents">DA;;Sites référents;</option>
<option class="" name="" value="64dcdc3cc41190618233dc2b" data-key-record="da-sites-r-f-rents-da">DA;Sites référents;;DA;</option>
<option class="" name="" value="64dcdc44c41190618233dc2c" data-key-record="formulaire-cyber-r-silience">Formulaire Cyber résilience</option>
<option class="" name="" value="64dcdc94c41190618233dc2d" data-key-record="webinar-webikeo-13-01-22">Webinar Webikeo 13/01/22</option>
<option class="" name="" value="64dcdd66c41190618233dc2e" data-key-record="da-da-seo-seo">DA;DA;SEO;;SEO;</option>
<option class="" name="" value="64dcddf8c41190618233dc2f" data-key-record="access-security">Access Security</option>
<option class="" name="" value="64dcde03c41190618233dc30" data-key-record="access-security-2022">Access Security 2022</option>
<option class="" name="" value="64dcde77c41190618233dc31" data-key-record="seo-seo">SEO;;SEO;</option>
<option class="" name="" value="64dcdf47c41190618233dc32" data-key-record="formulaire-guides-cyberattaques-comment-pr-parer-et-entra-ner-vos-collaborateurs">Formulaire Guides : Cyberattaques, comment préparer et entraîner vos collaborateurs
?</option>
<option class="" name="" value="64dcdf75c41190618233dc33" data-key-record="email">email</option>
<option class="" name="" value="64dce093c41190618233dc34" data-key-record="formulaire-demande-de-devis-classique">Formulaire demande de devis classique</option>
<option class="" name="" value="64dce3d3c41190618233dc35" data-key-record="da-seo-seo-sea">DA;SEO;SEO;;SEA;</option>
<option class="" name="" value="64dce3e6c41190618233dc36" data-key-record="da-sea-da">DA;SEA;;DA;</option>
<option class="" name="" value="64dce4d0c41190618233dc37" data-key-record="-invitation">;Invitation;</option>
<option class="" name="" value="64dce777c41190618233dc38" data-key-record="formuliares-guides-covid-19-hausse-significative-des-cyberattaques-en-t-l-travail">Formuliares : Guides : Covid 19, hausse significative des cyberattaques en
télétravail</option>
<option class="" name="" value="64dcea71c41190618233dc39" data-key-record="apporteurs-d-affaire">Apporteurs d'affaire</option>
<option class="" name="" value="64dcea95c41190618233dc3a" data-key-record="formulaire-lb-les-sciences-cognitives-la-face-cach-e-de-la-cybers-curit">Formulaire LB - Les sciences cognitives : la face cachée de la cybersécurité</option>
<option class="" name="" value="64dceaaac41190618233dc3b" data-key-record="sites-r-f-rents-da">Sites référents;;DA;</option>
<option class="" name="" value="64dceacec41190618233dc3c" data-key-record="formulaire-ressources-collectivit-s-pourquoi-et-comment-investir-dans-la-cybers-curit">Formulaire Ressources Collectivités : pourquoi et comment investir dans la
cybersécurité</option>
<option class="" name="" value="64dceafbc41190618233dc3d" data-key-record="formulaire-guides-manifeste-pour-un-droit-la-d-connexion">Formulaire Guides : Manifeste pour un droit à la déconnexion</option>
<option class="" name="" value="64dcef25c41190618233dc3e" data-key-record="formulaire-comment-l-ia-mailinblack-prot-ge-les-messageries-des-cyberattaques">Formulaire Comment l'IA Mailinblack protège les messageries des cyberattaques ?
</option>
<option class="" name="" value="64dcf328c41190618233dc3f" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement-participants">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Participants</option>
<option class="" name="" value="64dcfe43c41190618233dc40" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard-participants">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Participants</option>
<option class="" name="" value="64de2ab1f420877ec1498759" data-key-record="comment-former-et-proteger-vos-equipes-contre-les-attaques-informatiques">Comment former et proteger vos equipes contre les attaques informatiques</option>
<option class="" name="" value="64cced2de317a707dfc7ec50" data-key-record="formulaire-devis-page-protect">Formulaire Devis Page Protect</option>
<option class="" name="" value="64d9e02f54067a59af8d9257" data-key-record="formulaire-demo-en">Formulaire Demo EN</option>
<option class="" name="" value="64d9e03ce317a77e1a83792c" data-key-record="formulaire-devis-en">Formulaire Devis EN</option>
<option class="" name="" value="64be6da354067a70ae48fd04" data-key-record="formulaire-demo-en-cyber-academy">Formulaire Demo EN Cyber Academy</option>
<option class="" name="" value="64be6db054067a1f0e017d5a" data-key-record="formulaire-demo-en-cyber-coach">Formulaire Demo EN Cyber Coach</option>
<option class="" name="" value="64be6dbc54067a4b20d0d0ed" data-key-record="formulaire-demo-en-protect">Formulaire Demo EN Protect</option>
<option class="" name="" value="64be6dc554067a1f0e017d5b" data-key-record="formulaire-devis-en-protect">Formulaire Devis EN Protect</option>
<option class="" name="" value="64be6dcee317a72bee8b52d8" data-key-record="formulaire-devis-en-cyber-coach">Formulaire Devis EN Cyber Coach</option>
<option class="" name="" value="64be6dd9e317a72bbbcc10c5" data-key-record="formulaire-devis-en-cyber-academy">Formulaire Devis EN Cyber Academy</option>
<option class="" name="" value="6499498e54067a1fb1206ea6" data-key-record="formulaire-clients-cyber-academy">Formulaire clients Cyber Academy</option>
<option class="" name="" value="6470cc0754067a0882d79ca4" data-key-record="formulaire-lb-formation-cybers-curit-en-entreprise">Formulaire LB Formation Cybersecurite en Entreprise</option>
<option class="" name="" value="64424bb8f42087520a57a3b1" data-key-record="formulaire-protect-phishing-coach-cyber-academy">Formulaire Protect & Phishing Coach & Cyber Academy</option>
<option class="" name="" value="6425912e54067a4348024c09" data-key-record="wbn-30-02-23-5-conseils-ia-chatgpt-google-bard-participants">WBN - 30/02/23 - 5 conseils + IA, CHATGPT, GOOGLE BARD - Participants</option>
<option class="" name="" value="6436b51c54067a58f3568d9e" data-key-record="formulaire-devis-cyber-academy">Formulaire Devis Cyber Academy</option>
<option class="" name="" value="6441013ee317a7615d00f511" data-key-record="formulaire-demo-cyber-academy">Formulaire Demo Cyber Academy</option>
<option class="" name="" value="6423f422e317a719f63824d4" data-key-record="wbn-30-02-23-d-mo-ia-chatgpt-google-bard-non-participants">WBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Non Participants</option>
<option class="" name="" value="6423f452f4208735e2bbac72" data-key-record="wbn-30-02-202-d-mo-5-conseils-pour-se-prot-ger-efficacement-participants">WBN - 30/02/202 - Démo + 5 conseils pour se protéger efficacement - Participants</option>
<option class="" name="" value="6423f46354067a4f685084b2" data-key-record="wbn-30-02-2023-d-mo-5-conseils-pour-se-prot-ger-efficacement-non-participants">WBN - 30/02/2023 / Démo + 5 conseils pour se protéger efficacement - Non Participants
</option>
<option class="" name="" value="6423f649e317a70fe5969c8a" data-key-record="wbn-30-02-2023-webinars-participants">WBN - 30/02/2023 - 3 webinars - Participants</option>
<option class="" name="" value="6423f89f54067a53d667cce8" data-key-record="wbn-30-02-2023-webinars-non-participants">WBN - 30/02/2023 - webinars - Non Participants</option>
<option class="" name="" value="641c59afe317a7494fa279c8" data-key-record="liste-d-exclusion-mailjet">Liste d'exclusion Mailjet </option>
<option class="" name="" value="641c6cb854067a5d9e91eeb9" data-key-record="getquanty-protect-et-cyber-coach-251-1000-1000">Getquanty - Protect et Cyber Coach - 251-1000 & >1000</option>
<option class="" name="" value="641c6cc5f420875541fcb6b8" data-key-record="getquanty-protect-et-cyber-coach-51-250">Getquanty - Protect et Cyber Coach - 51-250</option>
<option class="" name="" value="641c6cd254067a2fef01c989" data-key-record="getquanty-cyber-coach-251-1000-1000">Getquanty - Cyber Coach - 251-1000 & > 1000</option>
<option class="" name="" value="641c6ce654067a2fef01c98a" data-key-record="getquanty-cyber-coach-51-250">Getquanty - Cyber Coach - 51-250</option>
<option class="" name="" value="641c6cf6e317a74fb3f3e7c8" data-key-record="getquanty-protect-251-1000-1000">Getquanty - Protect - 251-1000 & >1000</option>
<option class="" name="" value="641c6d0354067a4a7099fc8c" data-key-record="getquanty-protect-51-250">Getquanty - Protect - 51-250</option>
<option class="" name="" value="641c6d1954067a5d9e91eeba" data-key-record="getquanty-protect-1-50">Getquanty - Protect - 1-50</option>
<option class="" name="" value="641c6d28e317a72606620b7a" data-key-record="getquanty-cyber-coach-1-50">Getquanty - Cyber Coach - 1-50</option>
<option class="" name="" value="641c6d36e317a72606620b7b" data-key-record="getquanty-protect-et-cyber-coach-1-50">Getquanty - Protect et Cyber Coach - 1-50</option>
<option class="" name="" value="6422da0bf4208701e91ad52b" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Participants</option>
<option class="" name="" value="6422da2ce317a77333f3aa3e" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Participants</option>
<option class="" name="" value="6422da50e317a75178b6fcfa" data-key-record="wbn-30-02-23-d-mo-live">WBN - 30/02/23 - Démo live - Participants</option>
<option class="" name="" value="6422da7b54067a6a78ffbb83" data-key-record="wbn-30-02-23-d-mo-ia-chatgpt-google-bard">WBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Participants</option>
<option class="" name="" value="6422dc55f42087027c02c434" data-key-record="wbn-30-02-23-d-mo-5-conseils-pour-se-prot-ger-efficacement">WBN - 30/02/23 - Démo + 5 conseils pour se protéger efficacement</option>
<option class="" name="" value="6422ee87f4208755ff9f8b7a" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard-non-participants">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Non Participants</option>
<option class="" name="" value="6422f054f42087513de88a74" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement-non-participants">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Non Participants</option>
<option class="" name="" value="6422fb0c54067a6e54667783" data-key-record="wbn-30-02-23-d-mo-live-non-participants">WBN - 30/02/23 - Démo live - Non Participants</option>
<option class="" name="" value="641c1673e317a706b4492086" data-key-record="sql-perdus-mql-recyclage-protect-virginie">SQL perdus - MQL recyclage - Protect - Virginie</option>
<option class="" name="" value="641c169ce317a705f16ff728" data-key-record="sql-perdus-mql-recyclage-cyber-coach-virginie">SQL perdus - MQL recyclage - Cyber Coach - Virginie</option>
<option class="" name="" value="641c16c6e317a706b4492089" data-key-record="sql-perdus-mql-recyclage-cyber-coach-et-protect-virginie">SQL perdus - MQL recyclage - Cyber Coach et protect - Virginie</option>
<option class="" name="" value="63ecae4cf420871af6d42400" data-key-record="barom-tre-cyber-2023">baromètre cyber 2023</option>
<option class="" name="" value="63ff705ce317a711228839d8" data-key-record="sql-perdus-coach-maiwenn">SQL perdus Coach - Maiwenn</option>
<option class="" name="" value="63ff708df42087376261cf88" data-key-record="sal-coach-maiwenn">SAL Coach - Maiwenn</option>
<option class="" name="" value="63ff70c2f420872ad38cf1d2" data-key-record="mql-sql-paca-maiween">MQL SQL PACA - Maiween</option>
<option class="" name="" value="63ea0f24e317a75162904546" data-key-record="formulaire-partenaire-coach">Formulaire partenaire coach </option>
<option class="" name="" value="63d15d8e54067a446c24c5f0" data-key-record="formulaire-barometre-cyber-2023">Formulaire Barometre Cyber 2023</option>
<option class="" name="" value="6391aec0e317a7295c53f3a9" data-key-record="formulaire-en">Formulaire EN</option>
<option class="" name="" value="63bd21d8f4208738f34f0615" data-key-record="formulaires-guides-phishing-tous-les-moyens-sont-bons-pour-nuire-votre-entreprise">Formulaires Guides Phishing : tous les moyens sont bons pour nuire à votre
entreprise</option>
<option class="" name="" value="6375112754067a2e3b74ecab" data-key-record="formulaire-ressources-comment-l-ia-mailinblack-prot-ge-les-messageries-des-cyberattaques">Formulaire Ressources Comment l'IA Mailinblack protège les messageries des
cyberattaques ?</option>
<option class="" name="" value="6368e074eeec37721e469434" data-key-record="leadeo">Leadeo</option>
<option class="" name="" value="6368e075eeec37721e469435" data-key-record="formulaire-d-mo-protect">Formulaire Démo Protect</option>
<option class="" name="" value="63497631e317a74cd2bdd600" data-key-record="sensi-kit">Sensi Kit</option>
<option class="" name="" value="634977a5f420872e6694502e" data-key-record="formulaire-guide-comp-tences-cyber-des-salari-s-une-perception-des-risques-bien-diff-rente-de-la-r-alit">Formulaire guide : compétences cyber des salariés : une
perception des risques bien différente de la réalité</option>
<option class="" name="" value="63497a81e317a74cd2bdd60a" data-key-record="formulaire-cyberattaques-comment-pr-parer-et-entra-ner-vos-collaborateurs">Formulaire Cyberattaques, comment préparer et entraîner vos collaborateurs ?</option>
<option class="" name="" value="635173c3007fb76af404c936" data-key-record="sea">SEA</option>
<option class="" name="" value="635173c3007fb76af404c937" data-key-record="infopro">Infopro</option>
<option class="" name="" value="6351c82beeec377a2dcbf515" data-key-record="26-guides-quelles-sont-les-bonnes-pratiques-pour-s-curiser-ma-messagerie">26. Guides : Quelles sont les bonnes pratiques pour sécuriser ma messagerie ?</option>
<option class="" name="" value="6351c830eeec377a2dcbf516" data-key-record="manageo">Manageo</option>
<option class="" name="" value="6351c832eeec377a2dcbf517" data-key-record="campagne-braqueur-de-cerveau">Campagne Braqueur de cerveau</option>
<option class="" name="" value="635270f3c41190221886b5ca" data-key-record="formulaire-d-mo-phishing-coach">Formulaire Démo Phishing Coach</option>
<option class="" name="" value="6352a934eeec3756d01ed772" data-key-record="formulaire-infographie-mois-de-la-cybersecurite-tat-des-lieux-de-la-cybers-curit-en-2022-par-mailinblack">Formulaire Infographie - MOIS DE LA CYBERSECURITE : ÉTAT
DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACK</option>
<option class="" name="" value="6352c62beeec3725caa24221" data-key-record="formulaire-ressources-guides-6-tapes-pour-former-vos-collaborateurs-la-cybers-curit">Formulaire Ressources guides : 6 étapes pour former vos collaborateurs à la
cybersécurité</option>
<option class="" name="" value="6353c263007fb713dee11af9" data-key-record="it-facto">IT FACTO</option>
<option class="" name="" value="63562d24007fb73d38f7c7e3" data-key-record="formulaire-guide-infographie-5-tendances-cyber-2022">Formulaire guide : Infographie : 5 tendances cyber 2022</option>
<option class="" name="" value="635667bd007fb726b0e14389" data-key-record="formulaire-partenaires-acc-s-au-qg">Formulaire Partenaires accès au QG</option>
<option class="" name="" value="6357ad491dc973532f431777" data-key-record="fic">FIC</option>
<option class="" name="" value="6357e4fd1dc97308d453d6a6" data-key-record="formulaire-guide-livre-blanc-cybers-curit-industrielle-autre-enjeu-industrie-4-0">Formulaire guide Livre Blanc cybersécurité industrielle autre enjeu industrie 4.0
</option>
<option class="" name="" value="635871f41dc973659b22aded" data-key-record="-da">;DA;</option>
<option class="" name="" value="6359197ec411904cd9d72baf" data-key-record="formulaire-ressources-guides">Formulaire Ressources guides</option>
<option class="" name="" value="63593d361dc973302a2fc9bb" data-key-record="it-partner">IT Partner</option>
<option class="" name="" value="63593d3c1dc973302a2fc9bc" data-key-record="da-seo">DA;;SEO;</option>
<option class="" name="" value="635958961dc9730a5cf06789" data-key-record="formulaire-guide-infographie-ransomware-3-tapes-pour-comprendre-la-menace-et-s-en-prot-ger">Formulaire guide : Infographie - Ransomware : 3 étapes pour comprendre la
menace et s’en protéger</option>
<option class="" name="" value="635a3aa3c41190332d4eb3fe" data-key-record="formulaire-ressources-comment-prot-ger-ses-bo-tes-mails-des-menaces-cyber-quand-on-est-une-pme">Formulaire Ressources Comment protéger ses boîtes mails des menaces
cyber ! Quand on est une PME</option>
<option class="" name="" value="635a7292007fb768b6cc8185" data-key-record="formulaire-anti-ransmoware">Formulaire anti-ransmoware</option>
<option class="" name="" value="635a8ebc1dc97363208f5ad7" data-key-record="formulaire-guide-cyberattaques-comment-se-prot-ger">Formulaire :Guide Cyberattaques : Comment se protéger ?</option>
<option class="" name="" value="635be029007fb7103ee7ed7c" data-key-record="-seo">;SEO;</option>
<option class="" name="" value="635f9bb7c411906ad4fc84db" data-key-record="-facebook">;Facebook;</option>
<option class="" name="" value="635f9bbac411906ad4fc84dc" data-key-record="formulaire-ressources-dsi-6-conseils-pour-diminuer-vos-risques-cyber">Formulaire Ressources DSI : 6 conseils pour diminuer vos risques cyber</option>
<option class="" name="" value="635fb9311dc9736eb334b1b7" data-key-record="percy-miller">Percy Miller</option>
<option class="" name="" value="636375241dc973209bec760c" data-key-record="formulaire-guides-rgpd-email-et-spam-quel-est-le-lien">Formulaire Guides : RGPD, email et spam : quel est le lien ?</option>
<option class="" name="" value="63654117007fb759e780e775" data-key-record="source-to-set">source-to-set</option>
<option class="" name="" value="634970eb54067a6ca77a0bbc" data-key-record="formulaires-ressources-webinar">Formulaires Ressources Webinar</option>
<option class="" name="" value="634968c8f420876f9626a592" data-key-record="formulaires-ressources-guides-quels-sont-les-principaux-vecteurs-d-attaques-informatiques">Formulaires Ressources Guides : Quels sont les principaux vecteurs
d’attaques informatiques ?</option>
<option class="" name="" value="63458e7f54067a69ebc2bee9" data-key-record="formulaire-devis">Formulaire Devis</option>
<option class="" name="" value="63458e7f54067a69ebc2beea" data-key-record="formulaire-demo">Formulaire Démo</option>
<option class="" name="" value="63458e7f54067a69ebc2beeb" data-key-record="formulaire-newsletter">Formulaire Newsletter</option>
<option class="" name="" value="63458e7f54067a69ebc2beec" data-key-record="formulaire-devis-phishing-coach">Formulaire Devis Phishing Coach</option>
<option class="" name="" value="63458e7f54067a69ebc2beed" data-key-record="formulaire-devis-protect">Formulaire devis protect</option>
<option class="" name="" value="63458e7f54067a69ebc2beee" data-key-record="formulaire-anti-spam">Formulaire anti-spam</option>
<option class="" name="" value="63458e7f54067a69ebc2beef" data-key-record="formulaire-cyber-coach-sensibilisation-a-la-cybersecurite-au-travail">Formulaire Cyber Coach, sensibilisation à la cybersécurité au travail</option>
<option class="" name="" value="63458e7f54067a69ebc2bef0" data-key-record="formulaire-cyber-resilience-en-entreprise">Formulaire cyber résilience en entreprise</option>
<option class="" name="" value="63458e8054067a69ebc2bef1" data-key-record="formulaire-demo-cyber-coach">Formulaire demo Cyber coach</option>
<option class="" name="" value="63458e8054067a69ebc2bef2" data-key-record="formulaires-simulation-d-attaques-de-phishing">Formulaires Simulation d’attaques de phishing</option>
<option class="" name="" value="63458e8054067a69ebc2bef3" data-key-record="formulaires-simulation-d-attaques-de-ransomware">Formulaires Simulation d’attaques de ransomware</option>
<option class="" name="" value="63458e8054067a69ebc2bef4" data-key-record="formulaire-page-produit-cyber-coach">Formulaire page produit cyber coach</option>
<option class="" name="" value="63458e8054067a69ebc2bef5" data-key-record="formulaire-coach-audit">Formulaire coach audit</option>
<option class="" name="" value="63458e8054067a69ebc2bef6" data-key-record="formulaire-demo-protect">Formulaire demo protect</option>
<option class="" name="" value="63458e8054067a69ebc2bef7" data-key-record="formulaire-messagerie-office-365">Formulaire messagerie Office 365</option>
<option class="" name="" value="63458e8054067a69ebc2bef8" data-key-record="formulaire-devis-cyber-coach">Formulaire devis Cyber Coach</option>
<option class="" name="" value="63458e8054067a69ebc2bef9" data-key-record="formulaire-anti-malware">Formulaire anti-malware</option>
<option class="" name="" value="63458e8054067a69ebc2befa" data-key-record="formulaire-anti-ransomware">Formulaire anti-ransomware</option>
<option class="" name="" value="63458e8054067a69ebc2befb" data-key-record="formulaire-anti-phishing">Formulaire anti-phishing</option>
<option class="" name="" value="63458e8054067a69ebc2befc" data-key-record="formulaire-anti-spear-phishing">Formulaire anti-spear phishing</option>
<option class="" name="" value="63458e8054067a69ebc2befd" data-key-record="formulaire-page-produit-protect">Formulaire Page Produit Protect</option>
<option class="" name="" value="63458e8054067a69ebc2befe" data-key-record="formulaires-ressources-guides-etablissements-de-sante-panorama-des-cyberattaques">Formulaires Ressources Guides : Établissements de santé : Panorama des
cyberattaques</option>
<option class="" name="" value="63458e8054067a69ebc2beff" data-key-record="formulaires-ressources-guides-quel-est-le-niveau-de-vulnerabilite-des-entreprises-face-aux-cyberattaques-en-2020">Formulaires Ressources Guides : Quel est le niveau
de vulnérabilité des entreprises face aux cyberattaques en 2020</option>
<option class="" name="" value="63458e8054067a69ebc2bf00" data-key-record="formulaires-ressources-guides-spear-phishing-6-conseils-pour-lutter-contre-ce-type-d-attaque">Formulaires Ressources Guides :(Spear)Phishing : 6 conseils pour lutter
contre ce type d’attaque</option>
<option class="" name="" value="63458e8154067a69ebc2bf01" data-key-record="formulaires-ressources-guides-cyberattaques-comment-preparer-et-entrainer-vos-collaborateurs">Formulaires Ressources Guides Cyberattaques, comment préparer et
entraîner vos collaborateurs ?</option>
<option class="" name="" value="63458e8154067a69ebc2bf02" data-key-record="formulaires-ressources-guides-cyberattaques-couts-et-consequences">Formulaires Ressources Guides Cyberattaques : coûts et conséquences</option>
<option class="" name="" value="63458e8154067a69ebc2bf03" data-key-record="formulaires-guides-6-etapes-pour-former-vos-collaborateurs-a-la-cybersecurite">Formulaires Guides : 6 étapes pour former vos collaborateurs à la cybersécurité
</option>
<option class="" name="" value="63458e8154067a69ebc2bf04" data-key-record="formulaire-ressources-guides-dsi-6-conseils-pour-diminuer-vos-risques-cyber">Formulaire Ressources Guides DSI : 6 conseils pour diminuer vos risques cyber</option>
<option class="" name="" value="63458e8154067a69ebc2bf05" data-key-record="formulaire-guides-collectivites-pourquoi-et-comment-investir-dans-la-cybersecurite">Formulaire guides : Collectivités : pourquoi et comment investir dans la
cybersécurité</option>
<option class="" name="" value="63458e8154067a69ebc2bf06" data-key-record="formulaire-guide-lb-les-sciences-cognitives-la-face-cachee-de-la-cybersecurite">Formulaire Guide LB - Les sciences cognitives : la face cachée de la cybersécurité
</option>
<option class="" name="" value="63458e8154067a69ebc2bf07" data-key-record="formulaire-guide-competences-cyber-des-salaries-une-perception-des-risques-bien-differente-de-la-realite">Formulaire guide : compétences cyber des salariés : une
perception des risques bien différente de la réalité</option>
<option class="" name="" value="63458e8154067a69ebc2bf08" data-key-record="formulaires-ressources-guides-quelles-sont-les-bonnes-pratiques-pour-securiser-ma-messagerie">Formulaires Ressources Guides : Quelles sont les bonnes pratiques pour
sécuriser ma messagerie ?</option>
<option class="" name="" value="63458e8154067a69ebc2bf09" data-key-record="formulaires-ressources-guides-cyberattaques-comment-se-proteger">Formulaires Ressources Guides : Cyberattaques : comment se protéger ?</option>
<option class="" name="" value="63458e8154067a69ebc2bf0a" data-key-record="formulaires-ressources-guides-pourquoi-installer-une-solution-de-protection-de-messagerie">Formulaires Ressources Guides : Pourquoi installer une solution de
protection de messagerie</option>
<option class="" name="" value="63458e8154067a69ebc2bf0b" data-key-record="formulaires-ressources-guides-rgpd-email-et-spam-quel-est-le-lien">Formulaires Ressources Guides : RGPD, email et spam : quel est le lien ?</option>
<option class="" name="" value="63458e8154067a69ebc2bf0c" data-key-record="formulaires-ressources-guides-zoom-sur-la-messagerie-chiffres-et-menaces">Formulaires Ressources Guides : Zoom sur la messagerie, chiffres et menaces</option>
<option class="" name="" value="63458e8154067a69ebc2bf0d" data-key-record="formulaires-guides-proteger-sa-messagerie-professionnelle-premiere-etape-dans-la-lutte-contre-les-cyberattaques">Formulaires Guides Protéger sa messagerie
professionnelle première étape dans la lutte contre les cyberattaques</option>
<option class="" name="" value="63458e8154067a69ebc2bf0e" data-key-record="formulaires-ressources-guides-covid-19-hausse-significative-des-cyberattaques-en-teletravail">Formulaires Ressources Guides : Covid 19, hausse significative des
cyberattaques en télétravail</option>
<option class="" name="" value="63458e8154067a69ebc2bf0f" data-key-record="formulaires-ressources-guides-education-et-technologies-les-deux-faces-d-une-cybersecurite-a-360-pour-votre-organisation">Formulaires Ressources Guides : Éducation
et technologies : les deux faces d’une cybersécurité à 360° pour votre organisation</option>
<option class="" name="" value="63458e8154067a69ebc2bf10" data-key-record="formulaires-ressources-guides-manifeste-pour-un-droit-a-la-deconnexion">Formulaires Ressources Guides : Manifeste pour un droit à la déconnexion</option>
<option class="" name="" value="63458e8154067a69ebc2bf11" data-key-record="formulaires-ressources-guides-quelles-sont-les-tendances-et-les-innovations-des-hackers-en-2020">Formulaires Ressources Guides : Quelles sont les tendances et les
innovations des hackers en 2020</option>
<option class="" name="" value="63458e8154067a69ebc2bf12" data-key-record="formulaire-guides-infographie-5-tendances-cyber-2022">Formulaire guides : Infographie : 5 tendances cyber 2022</option>
<option class="" name="" value="63458e8154067a69ebc2bf13" data-key-record="formulaire-guide-lb-cybersecurite-industrielle-autre-enjeu-industrie-4-0">Formulaire guide - LB - cybersécurité industrielle autre enjeu industrie 4.0</option>
<option class="" name="" value="63458e8154067a69ebc2bf14" data-key-record="formulaire-guide-infographie-ransomware-3-etapes-pour-comprendre-la-menace-et-s-en-proteger">Formulaire guide Infographie - Ransomware : 3 étapes pour comprendre la
menace et s’en protéger</option>
<option class="" name="" value="63458e8154067a69ebc2bf15" data-key-record="formulaire-infographie-panorama-cyberattaques-tpe-pme">Formulaire Infographie - panorama cyberattaques TPE PME</option>
<option class="" name="" value="63458e8154067a69ebc2bf16" data-key-record="formulaire-infographie-mois-de-la-cybersecurite-etat-des-lieux-de-la-cybersecurite-en-2022-par-mailinblack">Formulaire infographie -MOIS DE LA CYBERSECURITE : ÉTAT
DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACK</option>
<option class="" name="" value="63458f9554067a67f80b964c" data-key-record="formulaires-ressources-guides">Formulaires Ressources Guides</option>
<option class="" name="" value="63458fa654067a6d9fe48a13" data-key-record="formulaires-ressources-blog">Formulaires Ressources Blog</option>
<option class="" name="" value="63458fbae317a75edd57dc64" data-key-record="formulaires-ressources-vid-os">Formulaires Ressources Vidéos</option>
</select>
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_mots_cles_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_mots_cles_ga" id="jsonform-1-elt-plz_mots_cles_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_support_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_support_ga" id="jsonform-1-elt-plz_support_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_source_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_source_ga" id="jsonform-1-elt-plz_source_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_produit keep-field" name="" style="display:none;">
<div class="controls" name=""><select class="form-control" name="plz_produit" id="jsonform-1-elt-plz_produit" style="color: rgb(27, 27, 27);">
<option class="" name="" value="" selected="selected"></option>
<option class="" name="" value="637795f654067a704f6c0f0d" data-key-record="mib-protect">MIB Protect</option>
<option class="" name="" value="64dcb4adc411900acbe9003e" data-key-record="mib-protect-cyber-coach-cyber-academy">MIB Protect & Cyber Coach & Cyber Academy</option>
<option class="" name="" value="63ee3ae6e317a70d9012812e" data-key-record="mib-academy">MIB Academy</option>
<option class="" name="" value="6441609ae317a74d976242cc" data-key-record="mib-protect-phishing-coach-cyber-academy">MIB Protect & Cyber Coach & Cyber Academy</option>
<option class="" name="" value="6377960ff4208719ff67d54a" data-key-record="mib-phishing-coach">MIB Cyber Coach</option>
<option class="" name="" value="6377961de317a77c80fcf3a4" data-key-record="mib-protect-phishing-coach">MIB Protect & Cyber Coach</option>
</select>
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_origine_de_la_piste keep-field" name="" style="display:none;">
<div class="controls" name=""><select class="form-control" name="plz_origine_de_la_piste" id="jsonform-1-elt-plz_origine_de_la_piste" style="color: rgb(27, 27, 27);">
<option class="" name="" value="" selected="selected"></option>
<option class="" name="" value="633bf9d754067a742b9bbf36" data-key-record="chasse">Chasse</option>
<option class="" name="" value="64df8105c41190048aa8c1a7" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-cyber-academy">http://www.mailinblack.com/devis-produit-mailinblack-cyber-academy/</option>
<option class="" name="" value="64df81e7c41190048aa8c1a8" data-key-record="http-www-mailinblack-com-en-quote-product-mailinblack-cyber-academy">http://www.mailinblack.com/en/quote-product-mailinblack-cyber-academy/</option>
<option class="" name="" value="64e08c82c411901718e51490" data-key-record="site-web-fr">Site web FR</option>
<option class="" name="" value="64e08c88c411901718e51491" data-key-record="idg">IDG</option>
<option class="" name="" value="64e08c92c411901718e51492" data-key-record="tarifs">Tarifs</option>
<option class="" name="" value="64eca4e3eeec37364d91cab1" data-key-record="calendly">Calendly</option>
<option class="" name="" value="650805a9c411906d7c50f73c" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-protect">http://www.mailinblack.com/devis-produit-mailinblack-protect/</option>
<option class="" name="" value="64df7acde317a76f2c551cae" data-key-record="revendeur">Revendeur</option>
<option class="" name="" value="64df7af2f420876c9490cd52" data-key-record="social-ads">Social Ads</option>
<option class="" name="" value="64df7d19c41190048aa8c1a6" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-phishing-coach">http://www.mailinblack.com/devis-produit-mailinblack-phishing-coach/</option>
<option class="" name="" value="64d60acc1dc9733e6fb221de" data-key-record="call-in">Call In</option>
<option class="" name="" value="64d6108e1dc9733e6fb221ff" data-key-record="salon">Salon</option>
<option class="" name="" value="64d62a601dc9733e6fb2221a" data-key-record="nurturing">Nurturing</option>
<option class="" name="" value="633bf9ecf4208711b7d1b38a" data-key-record="bpce">BPCE</option>
<option class="" name="" value="633bfa3fe317a76b07dd8ffb" data-key-record="da">DA</option>
<option class="" name="" value="633bfa74f420877a44ef6cb9" data-key-record="webinar">Webinar</option>
<option class="" name="" value="633c08c3e317a703af334e4d" data-key-record="site">Site</option>
<option class="" name="" value="633c091a54067a7d3be31484" data-key-record="apporteur-d-affaires">Apporteur d'affaires</option>
</select>
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_all_source keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_all_source" id="jsonform-1-elt-plz_all_source" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_client_id_ga keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_client_id_ga" id="jsonform-1-elt-plz_client_id_ga" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_first_source keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_first_source" id="jsonform-1-elt-plz_first_source" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_last_source keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_last_source" id="jsonform-1-elt-plz_last_source" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-plz_gclid keep-field" name="" style="display:none;">
<div class="controls" name=""><input class="form-control" name="plz_gclid" id="jsonform-1-elt-plz_gclid" type="text">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-consents jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
<div class="" name=""></div>
<div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="94"></div>
</span></div>
<div class="control-group plezi-form-field jsonform-error-plezi_user_id keep-field" name=""><input class="" name="plezi_user_id" style="display:none;" type="text"></div>
<div class="submit" name=""><input class="plezi-submit-btn" name="" value="Send" type="submit"></div>
</div><input type="hidden" name="plz_csrf_token" value="65xmwb7dT3N4yZA8mBp44w=="><input type="hidden" name="plz_csrf_key" value="6322e41f54067a5cf215337a643e8b39d59cbc794d6783a5178.33.144.1791696496128Y9omMTNtHfcHLw==">
</form>
GET
<form class="jsonform-hasrequired" name="" id="foss-64424a25d59cbc7956684a28" language="en" method="GET" action="" style="display: block;">
<div class="" name="">
<div class="control-group plezi-form-field jsonform-error-plz_customers_resellers_others jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
<div class="" name=""><label class="checkbox" name=""><input class="" name="plz_customers_resellers_others[0]" data-key-record="customers" type="checkbox"><span class="" name="">Customers</span></label><label class="checkbox" name=""><input
class="" name="plz_customers_resellers_others[1]" data-key-record="resellers" type="checkbox"><span class="" name="">Resellers</span></label><label class="checkbox" name=""><input class="" name="plz_customers_resellers_others[2]"
data-key-record="others" type="checkbox"><span class="" name="">Others</span></label></div>
<div class="help-block jsonform-errortext" name=""></div>
</span></div>
<div class="control-group plezi-form-field jsonform-error-email jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-2-elt-email">Email<span class="" name="" style="color:red;">*</span></label>
<div class="controls" name=""><input class="form-control" name="email" id="jsonform-2-elt-email" required="required" type="email">
<div class="help-block jsonform-errortext" name=""></div>
</div>
</div>
<div class="control-group plezi-form-field jsonform-error-consents jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
<div class="" name=""></div>
<div class="help-block jsonform-errortext" name=""></div>
</span></div>
<div class="control-group plezi-form-field jsonform-error-plezi_user_id keep-field" name=""><input class="" name="plezi_user_id" style="display:none;" type="text"></div>
<div class="submit" name=""><input class="plezi-submit-btn" name="" value="Send" type="submit"></div>
</div><input type="hidden" name="plz_csrf_token" value="I0S35tAoRvuVMo7WXwMgQA=="><input type="hidden" name="plz_csrf_key" value="6322e41f54067a5cf215337a64424431d59cbc794d680304178.33.144.1791696496128BOu25TZR6F7AZg==">
</form>
Text Content
* Secure your organization * Retour * Secure your organization * Platform The most comprehensive cybersecurity solution for your organization Read more * Protect Email protection, essential in the fight against cyber attacks and spam Read more * Cyber Coach Awareness via attack simulations, the pillar of your cybersecurity Read more * Cyber Academy Cybersecurity training via an interactive e-learning platform Read more * Solutions * Retour * Solutions * Cyber attack protection Anti malware All malware is stopped in quarantine so that no threat reaches your organization Anti phishing Protect yourself from phishing attempts with Mailinblack's Deep Learning model Anti spearphishing Protect your organization from targeted attacks and spear phishing Anti ransomware Fight effectively against ransomware with our technology and secure your emails * Mail pollution Anti spam Enjoy clean and secure messaging with our proprietary AI Right to disconnect Protect the mental health of your employees, while complying with laws and regulations * Awareness & Training Cybersecurity training Cybersecurity training via an interactive e-learning platform Audit of human vulnerabilities Audit your company's level of vulnerability Phishing simulation Test your teams' behavior by simulating phishing attacks Ransomware simulation Test your employees by sending them simulated ransomware attacks Cyber attacks simulation Evaluate your teams' behavior in the face of cyberattacks (BitB, QR Code, USB key...) * Resources * Retour * Resources * News Cybersecurity GDPR Product Spam Well-Being * Mailinblack * Partner * Retour * Partner * Reseller Become a reseller and protect your customers from cyber attacks Partner area Access to the HQ, your partner space * Request a demo English * Français * Español * Help & support * User area Home » Products » Protect EMAIL PROTECTION, FUNDAMENTAL TO FIGHT AGAINST CYBER ATTACKS AND SPAM Thanks to our Deep Learning technology trained on 5 billion emails per year, Protect sets up a filter of fraudulent emails before they are received: phishing, spear phishing, ransomware, spam… Get rid of the dust in your mailboxes and focus the essential. Company* Headcount* 1 - 5051 - 250251 - 1000>1000 First Name* Last Name* Email* Phone* Message Formulaire PartenairesFormulaire simulation de cyberattaquesFormulaire Page Cyber AcademyListe Nurturing Livre BlancFormulaire EN page produit protectFormulaire EN page produit Cyber CoachFormulaire EN page produit Cyber AcademyFormulaire EN anti-malwareFormulaire EN anti-phishingFormulaire EN anti-ransomwareFormulaire EN anti-spamFormulaire Right to disconnectFormulaire Audit of human vulnerabilitiesFormulaire Phishing simulationFormulaire Ransomware simulationFormulaire Cyber attacks simulationFormulaire EN spearphishingFormulaire droit a la deconnexionFormulaire formation cybersecuriteFormulaire des vulerabilites humaines Formulaire Devis ES ProtectFormulaire Devis ES Cyber CoachFormulaire Devis ES Cyber AcademyFormulaire Demo ES ProtectFormulaire Demo ES Cyber CoachFormulaire Demo ES Formulaire Devis ESFormulaire Demo ES Cyber AcademyFormulaire Partenaires ESPFormulaires Ressources Guides : Comment former et protéger vos équipes contre les attaques informatiquesFormulaire Intelligence artificielle Comment l’IA révolutionne-t-elle la cybersécurité en entreprisefacebookFormulaire demande de demoMIB-RESSOURCES-20211013- Formulaire DSI : 6 conseils pour diminuer vos risques cyberFacebook AdsFormulaire Guides : Quels sont les principaux vecteurs d’attaques informatiques ?Webinar Webikeo 12/10/21Formulaire devis anti-spamWebinar Webikeo 21/09Become Digital 21MIB-RESSOURCES-202106- Formulaires Ressources Guides : Quelles sont les tendances et les innovations des hackers en 2020 ?MIB-RESSOURCES-202106- Formulaires Ressources Guides : Cyberattaques : comment se protéger ?MIB-RESSOURCES-202106- Formulaires Ressources Guides : Établissements de santé : Panorama des cyberattaquesSites référents;SEA;;direct;DA;;Sites référents;DA;Sites référents;;DA;Formulaire Cyber résilienceWebinar Webikeo 13/01/22DA;DA;SEO;;SEO;Access SecurityAccess Security 2022SEO;;SEO;Formulaire Guides : Cyberattaques, comment préparer et entraîner vos collaborateurs ?emailFormulaire demande de devis classiqueDA;SEO;SEO;;SEA;DA;SEA;;DA;;Invitation;Formuliares : Guides : Covid 19, hausse significative des cyberattaques en télétravailApporteurs d'affaireFormulaire LB - Les sciences cognitives : la face cachée de la cybersécuritéSites référents;;DA;Formulaire Ressources Collectivités : pourquoi et comment investir dans la cybersécuritéFormulaire Guides : Manifeste pour un droit à la déconnexionFormulaire Comment l'IA Mailinblack protège les messageries des cyberattaques ?WBN - 30/02/23 - 5 conseils pour se protéger efficacement - ParticipantsWBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - ParticipantsComment former et proteger vos equipes contre les attaques informatiquesFormulaire Devis Page ProtectFormulaire Demo ENFormulaire Devis ENFormulaire Demo EN Cyber AcademyFormulaire Demo EN Cyber CoachFormulaire Demo EN ProtectFormulaire Devis EN ProtectFormulaire Devis EN Cyber CoachFormulaire Devis EN Cyber AcademyFormulaire clients Cyber AcademyFormulaire LB Formation Cybersecurite en EntrepriseFormulaire Protect & Phishing Coach & Cyber AcademyWBN - 30/02/23 - 5 conseils + IA, CHATGPT, GOOGLE BARD - ParticipantsFormulaire Devis Cyber AcademyFormulaire Demo Cyber AcademyWBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Non ParticipantsWBN - 30/02/202 - Démo + 5 conseils pour se protéger efficacement - ParticipantsWBN - 30/02/2023 / Démo + 5 conseils pour se protéger efficacement - Non ParticipantsWBN - 30/02/2023 - 3 webinars - ParticipantsWBN - 30/02/2023 - webinars - Non ParticipantsListe d'exclusion Mailjet Getquanty - Protect et Cyber Coach - 251-1000 & >1000Getquanty - Protect et Cyber Coach - 51-250Getquanty - Cyber Coach - 251-1000 & > 1000Getquanty - Cyber Coach - 51-250Getquanty - Protect - 251-1000 & >1000Getquanty - Protect - 51-250Getquanty - Protect - 1-50Getquanty - Cyber Coach - 1-50Getquanty - Protect et Cyber Coach - 1-50WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - ParticipantsWBN - 30/02/23 - 5 conseils pour se protéger efficacement - ParticipantsWBN - 30/02/23 - Démo live - ParticipantsWBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - ParticipantsWBN - 30/02/23 - Démo + 5 conseils pour se protéger efficacementWBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Non ParticipantsWBN - 30/02/23 - 5 conseils pour se protéger efficacement - Non ParticipantsWBN - 30/02/23 - Démo live - Non ParticipantsSQL perdus - MQL recyclage - Protect - VirginieSQL perdus - MQL recyclage - Cyber Coach - VirginieSQL perdus - MQL recyclage - Cyber Coach et protect - Virginiebaromètre cyber 2023SQL perdus Coach - MaiwennSAL Coach - MaiwennMQL SQL PACA - MaiweenFormulaire partenaire coach Formulaire Barometre Cyber 2023Formulaire ENFormulaires Guides Phishing : tous les moyens sont bons pour nuire à votre entrepriseFormulaire Ressources Comment l'IA Mailinblack protège les messageries des cyberattaques ?LeadeoFormulaire Démo ProtectSensi KitFormulaire guide : compétences cyber des salariés : une perception des risques bien différente de la réalitéFormulaire Cyberattaques, comment préparer et entraîner vos collaborateurs ?SEAInfopro26. Guides : Quelles sont les bonnes pratiques pour sécuriser ma messagerie ?ManageoCampagne Braqueur de cerveauFormulaire Démo Phishing CoachFormulaire Infographie - MOIS DE LA CYBERSECURITE : ÉTAT DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACKFormulaire Ressources guides : 6 étapes pour former vos collaborateurs à la cybersécuritéIT FACTOFormulaire guide : Infographie : 5 tendances cyber 2022Formulaire Partenaires accès au QGFICFormulaire guide Livre Blanc cybersécurité industrielle autre enjeu industrie 4.0;DA;Formulaire Ressources guidesIT PartnerDA;;SEO;Formulaire guide : Infographie - Ransomware : 3 étapes pour comprendre la menace et s’en protégerFormulaire Ressources Comment protéger ses boîtes mails des menaces cyber ! Quand on est une PMEFormulaire anti-ransmowareFormulaire :Guide Cyberattaques : Comment se protéger ?;SEO;;Facebook;Formulaire Ressources DSI : 6 conseils pour diminuer vos risques cyberPercy MillerFormulaire Guides : RGPD, email et spam : quel est le lien ?source-to-setFormulaires Ressources WebinarFormulaires Ressources Guides : Quels sont les principaux vecteurs d’attaques informatiques ?Formulaire DevisFormulaire DémoFormulaire NewsletterFormulaire Devis Phishing CoachFormulaire devis protectFormulaire anti-spamFormulaire Cyber Coach, sensibilisation à la cybersécurité au travailFormulaire cyber résilience en entrepriseFormulaire demo Cyber coachFormulaires Simulation d’attaques de phishingFormulaires Simulation d’attaques de ransomwareFormulaire page produit cyber coachFormulaire coach auditFormulaire demo protectFormulaire messagerie Office 365Formulaire devis Cyber CoachFormulaire anti-malwareFormulaire anti-ransomwareFormulaire anti-phishingFormulaire anti-spear phishingFormulaire Page Produit ProtectFormulaires Ressources Guides : Établissements de santé : Panorama des cyberattaquesFormulaires Ressources Guides : Quel est le niveau de vulnérabilité des entreprises face aux cyberattaques en 2020Formulaires Ressources Guides :(Spear)Phishing : 6 conseils pour lutter contre ce type d’attaqueFormulaires Ressources Guides Cyberattaques, comment préparer et entraîner vos collaborateurs ?Formulaires Ressources Guides Cyberattaques : coûts et conséquencesFormulaires Guides : 6 étapes pour former vos collaborateurs à la cybersécuritéFormulaire Ressources Guides DSI : 6 conseils pour diminuer vos risques cyberFormulaire guides : Collectivités : pourquoi et comment investir dans la cybersécuritéFormulaire Guide LB - Les sciences cognitives : la face cachée de la cybersécuritéFormulaire guide : compétences cyber des salariés : une perception des risques bien différente de la réalitéFormulaires Ressources Guides : Quelles sont les bonnes pratiques pour sécuriser ma messagerie ?Formulaires Ressources Guides : Cyberattaques : comment se protéger ?Formulaires Ressources Guides : Pourquoi installer une solution de protection de messagerieFormulaires Ressources Guides : RGPD, email et spam : quel est le lien ?Formulaires Ressources Guides : Zoom sur la messagerie, chiffres et menacesFormulaires Guides Protéger sa messagerie professionnelle première étape dans la lutte contre les cyberattaquesFormulaires Ressources Guides : Covid 19, hausse significative des cyberattaques en télétravailFormulaires Ressources Guides : Éducation et technologies : les deux faces d’une cybersécurité à 360° pour votre organisationFormulaires Ressources Guides : Manifeste pour un droit à la déconnexionFormulaires Ressources Guides : Quelles sont les tendances et les innovations des hackers en 2020Formulaire guides : Infographie : 5 tendances cyber 2022Formulaire guide - LB - cybersécurité industrielle autre enjeu industrie 4.0Formulaire guide Infographie - Ransomware : 3 étapes pour comprendre la menace et s’en protégerFormulaire Infographie - panorama cyberattaques TPE PMEFormulaire infographie -MOIS DE LA CYBERSECURITE : ÉTAT DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACKFormulaires Ressources GuidesFormulaires Ressources BlogFormulaires Ressources Vidéos MIB ProtectMIB Protect & Cyber Coach & Cyber AcademyMIB AcademyMIB Protect & Cyber Coach & Cyber AcademyMIB Cyber CoachMIB Protect & Cyber Coach Chassehttp://www.mailinblack.com/devis-produit-mailinblack-cyber-academy/http://www.mailinblack.com/en/quote-product-mailinblack-cyber-academy/Site web FRIDGTarifsCalendlyhttp://www.mailinblack.com/devis-produit-mailinblack-protect/RevendeurSocial Adshttp://www.mailinblack.com/devis-produit-mailinblack-phishing-coach/Call InSalonNurturingBPCEDAWebinarSiteApporteur d'affaires The data entered in this form is processed by Mailinblack to respond to your request. To understand how your personal data is processed by Mailinblack, we invite you to read our Privacy Policy, or to send an email to the address dpo@mailinblack.com. Mail protection NEARLY 30% OF EMAILS ARE HARMFUL. BLOCK THEM BEFORE THEY ARE RECEIVED WITH PROTECT. Anti malware Anti ransomware Anti phishing Anti spearphishing Anti spam Link Analysis O365 complementarity Right to disconnect Anti malware MALWARE: A THREAT IN MANY FORMS The word malware comes from malicious software. As you can see, this software does not want anything good for you. Ransomware, spyware, adware, scareware, virus, worms, Trojan horse… it can take many forms, but its objective will always be the same: to get into your system to do damage. Discover our anti malware Anti ransomware RANSOMWARE: STOP THE RANSOM DEMANDS Ransomware is a specific type of malware, which infiltrates your system, corrupts it and offers you a solution by paying a ransom. Ransomware is particularly harmful to your organization and should therefore be filtered before your employees receive it. Discover our anti ransomware Anti phishing PHISHING: INTERVENE BEFORE CARELESS MISTAKES ARE MADE Phishing consists in usurping the identity of a brand or a person, by inviting your employees to click on a fraudulent link for example. More and more sophisticated, these attacks often owe their success to inattention or a lack of awareness. Prevent your employees from asking themselves this question, and filter phishing attempts before they are received. Discover our anti phishing Anti spearphishing SPEARPHISHING: DO NOT ALLOW IDENTITY THEFT Spearphishing is a personal attack, in which the hacker impersonates a known member of your team (usually one of your employees). These attacks are therefore more difficult to identify and to thwart, hence the need to block them before the email is received. Discover our anti spearphishing Anti spam STOP UNWANTED MAIL Spam may seem harmless, but its impact on your organization’s efficiency is not neutral: more than 25% of the emails we receive are unwanted. Reduce your mental load and clean up your mailbox with our upstream spam detection and filtering technology. Discover our anti spam Link Analysis SECURE LINK: ALWAYS SAFE LINKS Because, at the origin of every cyber attack, there is a fraudulent link that should not have been clicked, Mailinblack has developed its Secure Link technology: an artificial intelligence that analyzes links contained in the emails you receive and warns your collaborators in case they are dangerous. O365 complementarity IMPROVE EMAIL SECURITY IN MICROSOFT 365 WITH MAILINBLACK Businesses that use Microsoft 365 are particularly vulnerable to cyberattacks, given the vast amount of sensitive information stored in Microsoft tools. That’s why Mailinblack offers a complementary solution to enhance your email security with more effective antivirus protection that stops threats before they can reach your computer system and more effectively clean up your mailboxes with a specially designed anti-spam. Right to disconnect GIVE YOUR EMPLOYEES THE ABILITY TO REALLY DISCONNECT Strengthen your employer brand and respect the privacy of your employees with our right to disconnect feature: set up automatic emails at the organization level to inform senders when their messages are sent outside your employees’ time slots. OUR TECHNOLOGIES IMPLEMENT THE HIGHEST LEVEL OF MAIL PROTECTION VIA MULTIPLE FILTER LEVELS The power of Mailinblack's artificial intelligence, at the service of your mailbox Phishing, spear phishing, spam, notifications, newsletters… our AI is trained to extract the content of emails and categorize them according to two criteria: their legitimacy and their productivity. All you have to do is to set the level of filtering you want for your organization and let our technology work for you. Activate the authentication request, an additional security barrier Allow your contacts to declare themselves as legitimate and offer yourself the guarantee of a mailbox free of any unwanted communication. As a bonus, you communicate to your ecosystem your cybersecurity approach and your involvement in securing data that is sent by email, and you encourage them to join the movement! DEEP LEARNING DEEP LEARNING BY MAILINBLACK Our Deep Learning model is based on a principle of automatic extraction of email characteristics It classifies them into different categories and identifies if they are legitimate and productive. Mailinblack’s proprietary artificial intelligence has the ability to detect phishing and spear phishing attempts, spam, unwanted notifications and newsletters and adapts to each user’s choice of which emails to receive or not. Our team of data scientists scans new forms of threats on a daily basis She analyzes the behavior of the 5 billion emails that converge each year through Mailinblack’s French servers to continuously improve our predictive technologies and ensure effective email protection. Your benefits 6 GOOD REASONS TO ENTRUST YOUR MAIL PROTECTION TO MAILINBLACK SECURE YOUR DATA WITH THE HIGHEST STANDARDS All our data is hosted in France, on HDS certified infrastructures, and our processing is 100% compliant with the GDPR. PROTECT YOURSELF FROM CYBER ATTACKS Our AI works for you continuously and scans the content of your emails, as well as links and attachments. REDUCE THE STRESS LEVEL OF YOUR TEAMS Your employees stay focused on the essentials with email filtering and sender authentication. DEMAND A SEAMLESS IMPLEMENTATION The Protect solution is compatible with all messaging systems and hosting providers on the market, and is designed to adapt to your organization. ACTIVATE OUR SECURITY FILTERS IN LESS THAN AN HOUR Our team will assist you in the remote implementation of Protect, for a guaranteed activation in less than an hour. REACH OUR SUPPORT UNLIMITED Our support team based in France will answer you by email, phone or chat, unlimited. SECURE YOUR DATA WITH THE HIGHEST STANDARDS All our data is hosted in France, on HDS certified infrastructures, and our processing is 100% compliant with the GDPR. PROTECT YOURSELF FROM CYBER ATTACKS Our AI works for you continuously and scans the content of your emails, as well as links and attachments. REDUCE THE STRESS LEVEL OF YOUR TEAMS Your employees stay focused on the essentials with email filtering and sender authentication. DEMAND A SEAMLESS IMPLEMENTATION The Protect solution is compatible with all messaging systems and hosting providers on the market, and is designed to adapt to your organization. ACTIVATE OUR SECURITY FILTERS IN LESS THAN AN HOUR Our team will assist you in the remote implementation of Protect, for a guaranteed activation in less than an hour. REACH OUR SUPPORT UNLIMITED Our support team based in France will answer you by email, phone or chat, unlimited. Your INTERFACE CUSTOMIZABLE SECURITY SETTINGS AND FULL CONTROL FOR THE ADMINISTRATOR Protect is a turnkey solution that does not require any setup configuration Activate Protect filters and ensure effective email protection… You can control your email flow at any time, manage your security settings and your users’ rights, or even customize your authentication request from your interface. Keep control of your organization from your administrator interface As a Protect administrator, you keep control of your organization’s parameters: definition of filtering parameters, categorization of emails based on keywords, SPF verification, exclusion of IP addresses, creation of rules, setting up of alerts… You have the power to design the solution that suits you. Your issues WE OFFER YOU A CUSTOM-MADE INSTALLATION ADAPTED TO YOUR NEEDS TPE SME ETI Health care facility Public Administration TPE SECURE YOUR COMPANY'S MAILBOXES WITH EASE With Protect, activate a protection of your emails without changing the habits of your employees. * Filter emails before they are received, without losing track of them: with Protect, no email is deleted * Unpollute your mailboxes and avoid unnecessary solicitations and spam * Save time on a daily basis, without changing your work habits: Protect works for you, not the other way around! SME REDUCE YOUR EMAIL VOLUME BY 70% AND FOCUS ON THE ESSENTIALS Protect secures your mailbox and increases the efficiency of your organization. * Save time managing spam and unwanted solicitations and reduce your email volume by an average of 70%. * Empower your employees and help them focus on the essentials * Secure your entire information system with our anti-spam and anti-virus solution * Adopt a robust technology to be sure you are not mistaken ETI KEEP YOUR ORGANIZATION UP TO DATE WITH OUR CYBERSECURITY SOLUTIONS Protect keeps your email and your organization safe. * Fight phishing and identity theft on a massive scale * Implement an innovative product and access our shared roadmap to track our latest innovations in real time * Control your data and ensure business continuity * Customize Protect with our custom development offer Health care facility ADOPT A CERTIFIED SOLUTION THAT MEETS YOUR REQUIREMENTS Mailinblack has the Health Data Hosting (HDS) certification. * Choose a French solution 100% GDPR compliant * Benefit from the highest level of support and immediate answers to your questions at our support * Secure your establishment and empower your users without incurring liability * Choose Mailinblack and our expertise recognized by health institutions Public Administration CHOOSE A FRENCH SOLUTION TO SECURE YOUR AGENTS' MESSAGING Based in Marseille, Mailinblack is a 100% French company, from design, development and hosting to technical support. * Reduce the number of requests and secure your messaging with a unique solution * Adopt a solution 100% compliant with the requirements of GDPR * Benefit from a personalized and reactive support testimonials THEY HAVE SECURED THEIR EMAIL WITH PROTECT CH de la Candélie The Protect solution fully meets our expectations, with a reduced workload since we no longer have to go through our spam. As for the cost, if we weigh up the risk of not filtering against the time spent by a technician managing spam, it is not even debatable. Patrice Bourdon Head of IS and Organisation Conseil Départemental du Gard We receive an average of 300,000 messages per month, of which more than 50% are spam. Thanks to the Protect solution, users do not have to deal with all these unwanted messages. This protection has become essential for agents, especially as email is one of the most used tools in daily life! Mathieu MOLINA IT Office du tourisme de Fréjus We are very satisfied with Mailinblack's offer, particularly in this period of increased cyber attacks. This season is impacted by the Covid-19 crisis, we want to be vigilant and protect our equipment as much as possible. We are starting the season very late and knowing that we are protected by Mailinblack is very reassuring. Nathalie COURRÈGE Director Mairie de Colombes Efficient and simple! 223,000 spam messages stopped and 4,000 viruses blocked. Mailinblack protects us from a large number of email attacks. I clearly recommend the use of Protect! Nicolas Antoine DSI Grand Port Maritime de Marseille Mailinblack offers a simple and intuitive service which, thanks to sender authentication, enables us to protect ourselves from large volumes of spam and to work in complete security. Michel COLONNA Operations Officer CHU Martinique Mailinblack gives us real extra security. The latest attacks on the hospital have been stopped and quarantined by Protect and the staff mailbox is now sorted and clean. We work more serenely while ensuring constant monitoring of our IT system. Gérald GALIM RSSI References MORE THAN 18,000 ORGANIZATIONS TRUST US FOR THEIR EMAIL PROTECTION The Protect solution SECURE YOUR MAILBOXES WITH PROTECT Demo PROTECT YOUR EMAILS Choose the Protect solution from Mailinblack, the French expert in cybersecurity for 20 years. Request a demo FAQ WHY CHOOSE A MAILBOX PROTECTION SOLUTION? WHAT TYPES OF CYBER ATTACKS CAN A COMPANY FACE? A company can face many cyber attacks among which phishing, and its variant, spearphishing, ransomware or even malware, spyware… It is important to note that the majority of these cyber attacks go through emails, or in other words, through spam. WHY DO I RECEIVE A LOT OF SPAM? Do you, or your company’s employees, receive a lot of spam, often from advertising and/or phishing attempts? This is probably due to the fact that your email address is on address lists owned by unscrupulous companies, obtained through data leaks. These senders are usually based on the same lists, which explains why, even if you block one of them, you still receive many unwanted and potentially dangerous emails. WHO SENDS SPAM? Spam, or unwanted email, is sent by malicious companies that have obtained your email address without your consent. This can be due to a data leak from a software or service you are using, or it can simply be due to a sale of your email address which will result in unwanted, advertising and, sometimes, dangerous messages being sent to your inbox. HOW TO PROTECT YOUR MAILBOX FROM SPAM? To protect your email from spam, you can adopt Protect, the email protection solution by Mailinblack. In addition to saving your employees time by filtering spam, it also prevents the majority of cyber attacks such as phishing, spearphishing or ransomware that often pass through email. HOW CAN I EFFECTIVELY PROTECT MY EMAILS AGAINST SPAM AND VIRUSES? The best way to effectively protect your emails from spam and viruses is to use a reliable email protection solution like Protect by Mailinblack. You can also avoid clicking on suspicious links or downloading unknown attachments and keep your email software up-to-date. WHAT ARE THE BEST SPAM FILTERING TOOLS TO PROTECT MY MAILBOX? There are many effective spam filtering tools, or email protection solutions. Protect is one of them and is edited by Mailinblack, a French cybersecurity company since 20 years, which currently protects more than 18.000 customers. HOW CAN I MAKE SURE THAT MY CONFIDENTIAL E-MAILS DO NOT FALL INTO THE WRONG HANDS? To ensure that your confidential emails do not fall into the wrong hands, it is recommended to use an end-to-end encryption solution. It is also important to maintain a strong password, change it very regularly and never share your login information with anyone. HOW TO MANAGE BUSINESS EMAIL SECURITY RISKS, ESPECIALLY FOR COMPANIES? To manage business email security risks, companies can implement a clear and well-communicated security policy, regularly train their staff on data security, use email protection tools, and perform regular security audits to detect potential vulnerabilities and risks. HOW TO MANAGE BUSINESS EMAIL SECURITY RISKS, ESPECIALLY FOR COMPANIES WITH REMOTE OR TRAVELING USERS? To manage business email security risks for remote or traveling users, organizations can implement a strict security policy for mobile device use, use an enterprise mobility management solution to manage mobile devices and a VPN solution to secure remote connections, but also perform regular security audits to detect potential vulnerabilities and risks. Cybersecurity DISCOVER OUR AWARENESS AND CYBERSECURITY TRAINING SOLUTIONS Cyber Coach Simulate cyberattacks to raise the cyberculture level of your teams Read more Cyber Academy Train your employees effectively and permanently in cybersecurity Read more We take care of the protection of your emails Request a demo Protect Cyber Coach Cyber Academy * Solutions * Anti spam * Anti malware * Anti ransomware * Anti phishing * Anti spearphishing * Right to disconnect * Audit of human vulnerabilities * Phishing simulation * Ransomware simulation * Cyber attacks simulation * Mailinblack * News * About us * Partners * User area * Partners Area * Contact * Jobs * Request a demo * Request a quote * Contact us * Open a support ticket French publisher based in Marseille, Mailinblack has been designing simple and accessible cybersecurity solutions for 20 years, dedicated to companies, healthcare institutions and public administrations. LinkedIn Twitter Youtube Facebook Subscribe to our newsletter CustomersResellersOthers Email* ©2023 Mailinblack Privacy policy GCUM Legal notice Cookies Sitemap