www.mailinblack.com Open in urlscan Pro
20.19.188.86  Public Scan

Submitted URL: https://www.mailinblack.com/en/product/mailinblack-spam-protection/?utm_source=DA&utm_medium=emailda&utm_campaign=new-banner...
Effective URL: https://www.mailinblack.com/en/products/mailinblack-spam-protection/?utm_source=DA&utm_medium=emailda&utm_campaign=new-banne...
Submission: On October 05 via manual from NL — Scanned from FR

Form analysis 2 forms found in the DOM

GET

<form class="jsonform-hasrequired" name="" id="foss-65094e4dd59cbc496998724f" language="en" method="GET" action="" style="display: block;">
  <div class="" name="">
    <div class="control-group plezi-form-field jsonform-error-company jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-company">Company<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="company" id="jsonform-1-elt-company" required="required" type="text">
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="87"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-headcount jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-headcount">Headcount<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><select class="form-control" name="headcount" id="jsonform-1-elt-headcount" required="required" style="color: rgb(117, 117, 117);">
          <option class="" name="" value="" selected="selected"></option>
          <option class="" name="" value="63779902e317a74efc868f45" data-key-record="1-50">1 - 50</option>
          <option class="" name="" value="635173c4007fb76af404c938" data-key-record="51-250">51 - 250</option>
          <option class="" name="" value="6368cd17e317a75ef404895c" data-key-record="251-1000">251 - 1000</option>
          <option class="" name="" value="6368cd29f420870f6ce0e223" data-key-record="-1000">&gt;1000</option>
        </select>
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="88"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-first_name jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-first_name">First Name<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="first_name" id="jsonform-1-elt-first_name" required="required" type="text">
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="89"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-last_name jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-last_name">Last Name<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="last_name" id="jsonform-1-elt-last_name" required="required" type="text">
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="90"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-email jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-email">Email<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="email" id="jsonform-1-elt-email" data-contains="[&quot;@&quot;]"
          data-not-contains="[&quot;gmail&quot;, &quot;orange&quot;, &quot;yahoo&quot;, &quot;free&quot;, &quot;hotmail&quot;, &quot;wanadoo&quot;, &quot;s3.guardianmail&quot;, &quot;tab.buzzcluby&quot;, &quot;sfr&quot;, &quot;outlook&quot;, &quot;icloud&quot;, &quot;live&quot;, &quot;gmx&quot;, &quot;aol&quot;, &quot;.me&quot;]"
          data-reject-disposable="true" required="required" type="email">
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="91"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-phone jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-phone">Phone<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="phone" id="jsonform-1-elt-phone" required="required" type="text">
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="92"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-message keep-field" name=""><label class="control-label" name="" for="jsonform-1-elt-message">Message</label>
      <div class="controls" name=""><textarea class="form-control" name="message" id="jsonform-1-elt-message"></textarea>
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="93"></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_adgroupe_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_adgroupe_ga" id="jsonform-1-elt-plz_adgroupe_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_campagne_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_campagne_ga" id="jsonform-1-elt-plz_campagne_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_details_lead_source keep-field" name="" style="display:none;">
      <div class="controls" name=""><select class="form-control" name="plz_details_lead_source" id="jsonform-1-elt-plz_details_lead_source" style="color: rgb(27, 27, 27);">
          <option class="" name="" value="" selected="selected"></option>
          <option class="" name="" value="63458e7f54067a69ebc2bee8" data-key-record="formulaire-partenaires">Formulaire Partenaires</option>
          <option class="" name="" value="64ff0c6bf420874ee40fa09e" data-key-record="formulaire-simulation-de-cyberattaques">Formulaire simulation de cyberattaques</option>
          <option class="" name="" value="65020f3a54067a05472fb96f" data-key-record="formulaire-page-cyber-academy">Formulaire Page Cyber Academy</option>
          <option class="" name="" value="65030fc9f4208718ae403722" data-key-record="liste-nurturing-livre-blanc">Liste Nurturing Livre Blanc</option>
          <option class="" name="" value="65094ce1e317a7746461a46b" data-key-record="formulaire-en-page-produit-protect">Formulaire EN page produit protect</option>
          <option class="" name="" value="65094cf0f420873cdd63c66b" data-key-record="formulaire-en-page-produit-cyber-coach">Formulaire EN page produit Cyber Coach</option>
          <option class="" name="" value="65094d01e317a7433434bc6f" data-key-record="formulaire-en-page-produit-cyber-academy">Formulaire EN page produit Cyber Academy</option>
          <option class="" name="" value="65094d1254067a790c9d4add" data-key-record="formulaire-en-anti-malware">Formulaire EN anti-malware</option>
          <option class="" name="" value="65094d2054067a4f9ba05095" data-key-record="formulaire-en-anti-phishing">Formulaire EN anti-phishing</option>
          <option class="" name="" value="65094d2de317a7746461a46e" data-key-record="formulaire-en-anti-ransomware">Formulaire EN anti-ransomware</option>
          <option class="" name="" value="65094d3bf420874e0d79e2fe" data-key-record="formulaire-en-anti-spam">Formulaire EN anti-spam</option>
          <option class="" name="" value="65094d4ee317a74dffd6e0ed" data-key-record="formulaire-right-to-disconnect">Formulaire Right to disconnect</option>
          <option class="" name="" value="65094d67e317a72c88c9feff" data-key-record="formulaire-audit-of-human-vulnerabilities">Formulaire Audit of human vulnerabilities</option>
          <option class="" name="" value="65094d82e317a72c88c9ff00" data-key-record="formulaire-phishing-simulation">Formulaire Phishing simulation</option>
          <option class="" name="" value="65094d91f420874e0d79e300" data-key-record="formulaire-ransomware-simulation">Formulaire Ransomware simulation</option>
          <option class="" name="" value="65094da0f420873cdd63c675" data-key-record="formulaire-cyber-attacks-simulation">Formulaire Cyber attacks simulation</option>
          <option class="" name="" value="6509532af420873cdd63c682" data-key-record="formulaire-en-spearphishing">Formulaire EN spearphishing</option>
          <option class="" name="" value="64fefbeef4208733993394e4" data-key-record="formulaire-droit-a-la-deconnexion">Formulaire droit a la deconnexion</option>
          <option class="" name="" value="64fefed154067a4d870c670b" data-key-record="formulaire-formation-cybersecurite">Formulaire formation cybersecurite</option>
          <option class="" name="" value="64ff017b54067a5f260bf9f3" data-key-record="formulaire-des-vulerabilites-humaines">Formulaire des vulerabilites humaines </option>
          <option class="" name="" value="64e4627254067a3b226ff025" data-key-record="formulaire-devis-es-protect">Formulaire Devis ES Protect</option>
          <option class="" name="" value="64e46342e317a77ffce0e542" data-key-record="formulaire-devis-es-cyber-coach">Formulaire Devis ES Cyber Coach</option>
          <option class="" name="" value="64e4636354067a35c8fecc9e" data-key-record="formulaire-devis-es-cyber-academy">Formulaire Devis ES Cyber Academy</option>
          <option class="" name="" value="64e46380f420875b6982cdb7" data-key-record="formulaire-demo-es-protect">Formulaire Demo ES Protect</option>
          <option class="" name="" value="64e463b1f420873774aae5d8" data-key-record="formulaire-demo-es-cyber-coach">Formulaire Demo ES Cyber Coach</option>
          <option class="" name="" value="64e46546e317a70362de22c1" data-key-record="formulaire-demo-es">Formulaire Demo ES </option>
          <option class="" name="" value="64e4656154067a7c190ccb11" data-key-record="formulaire-devis-es">Formulaire Devis ES</option>
          <option class="" name="" value="64e48018e317a7281dcfe6ac" data-key-record="formulaire-demo-es-cyber-academy">Formulaire Demo ES Cyber Academy</option>
          <option class="" name="" value="64e71989e317a72adc9ab19b" data-key-record="formulaire-partenaires-esp">Formulaire Partenaires ESP</option>
          <option class="" name="" value="64eda058e317a71f07f2cdd0" data-key-record="formulaires-ressources-guides-comment-former-et-prot-ger-vos-quipes-contre-les-attaques-informatiques">Formulaires Ressources Guides : Comment former et protéger vos
            équipes contre les attaques informatiques</option>
          <option class="" name="" value="64ede78fe317a70534979d9e" data-key-record="formulaire-intelligence-artificielle-comment-l-ia-r-volutionne-t-elle-la-cybers-curit-en-entreprise">Formulaire Intelligence artificielle Comment l’IA
            révolutionne-t-elle la cybersécurité en entreprise</option>
          <option class="" name="" value="64dcd38bc41190618233dc1d" data-key-record="facebook">facebook</option>
          <option class="" name="" value="64dcd3b1c41190618233dc1e" data-key-record="formulaire-demande-de-demo">Formulaire demande de demo</option>
          <option class="" name="" value="64dcd409c41190618233dc1f" data-key-record="mib-ressources-20211013-formulaire-dsi-6-conseils-pour-diminuer-vos-risques-cyber">MIB-RESSOURCES-20211013- Formulaire DSI : 6 conseils pour diminuer vos risques
            cyber</option>
          <option class="" name="" value="64dcd4dac41190618233dc20" data-key-record="facebook-ads">Facebook Ads</option>
          <option class="" name="" value="64dcd7ccc41190618233dc21" data-key-record="formulaire-guides-quels-sont-les-principaux-vecteurs-d-attaques-informatiques">Formulaire Guides : Quels sont les principaux vecteurs d’attaques informatiques ?
          </option>
          <option class="" name="" value="64dcd815c41190618233dc22" data-key-record="webinar-webikeo-12-10-21">Webinar Webikeo 12/10/21</option>
          <option class="" name="" value="64dcda20c41190618233dc23" data-key-record="formulaire-devis-anti-spam">Formulaire devis anti-spam</option>
          <option class="" name="" value="64dcda3ac41190618233dc24" data-key-record="webinar-webikeo-21-09">Webinar Webikeo 21/09</option>
          <option class="" name="" value="64dcdabac41190618233dc25" data-key-record="become-digital-21">Become Digital 21</option>
          <option class="" name="" value="64dcdaeec41190618233dc26" data-key-record="mib-ressources-202106-formulaires-ressources-guides-quelles-sont-les-tendances-et-les-innovations-des-hackers-en-2020">MIB-RESSOURCES-202106- Formulaires Ressources
            Guides : Quelles sont les tendances et les innovations des hackers en 2020 ?</option>
          <option class="" name="" value="64dcdb0ec41190618233dc27" data-key-record="mib-ressources-202106-formulaires-ressources-guides-cyberattaques-comment-se-prot-ger">MIB-RESSOURCES-202106- Formulaires Ressources Guides : Cyberattaques : comment
            se protéger ?</option>
          <option class="" name="" value="64dcdb1ec41190618233dc28" data-key-record="mib-ressources-202106-formulaires-ressources-guides-tablissements-de-sant-panorama-des-cyberattaques">MIB-RESSOURCES-202106- Formulaires Ressources Guides :
            Établissements de santé : Panorama des cyberattaques</option>
          <option class="" name="" value="64dcdb7fc41190618233dc29" data-key-record="sites-r-f-rents-sea-direct">Sites référents;SEA;;direct;</option>
          <option class="" name="" value="64dcdbdec41190618233dc2a" data-key-record="da-sites-r-f-rents">DA;;Sites référents;</option>
          <option class="" name="" value="64dcdc3cc41190618233dc2b" data-key-record="da-sites-r-f-rents-da">DA;Sites référents;;DA;</option>
          <option class="" name="" value="64dcdc44c41190618233dc2c" data-key-record="formulaire-cyber-r-silience">Formulaire Cyber résilience</option>
          <option class="" name="" value="64dcdc94c41190618233dc2d" data-key-record="webinar-webikeo-13-01-22">Webinar Webikeo 13/01/22</option>
          <option class="" name="" value="64dcdd66c41190618233dc2e" data-key-record="da-da-seo-seo">DA;DA;SEO;;SEO;</option>
          <option class="" name="" value="64dcddf8c41190618233dc2f" data-key-record="access-security">Access Security</option>
          <option class="" name="" value="64dcde03c41190618233dc30" data-key-record="access-security-2022">Access Security 2022</option>
          <option class="" name="" value="64dcde77c41190618233dc31" data-key-record="seo-seo">SEO;;SEO;</option>
          <option class="" name="" value="64dcdf47c41190618233dc32" data-key-record="formulaire-guides-cyberattaques-comment-pr-parer-et-entra-ner-vos-collaborateurs">Formulaire Guides : Cyberattaques, comment préparer et entraîner vos collaborateurs
            ?</option>
          <option class="" name="" value="64dcdf75c41190618233dc33" data-key-record="email">email</option>
          <option class="" name="" value="64dce093c41190618233dc34" data-key-record="formulaire-demande-de-devis-classique">Formulaire demande de devis classique</option>
          <option class="" name="" value="64dce3d3c41190618233dc35" data-key-record="da-seo-seo-sea">DA;SEO;SEO;;SEA;</option>
          <option class="" name="" value="64dce3e6c41190618233dc36" data-key-record="da-sea-da">DA;SEA;;DA;</option>
          <option class="" name="" value="64dce4d0c41190618233dc37" data-key-record="-invitation">;Invitation;</option>
          <option class="" name="" value="64dce777c41190618233dc38" data-key-record="formuliares-guides-covid-19-hausse-significative-des-cyberattaques-en-t-l-travail">Formuliares : Guides : Covid 19, hausse significative des cyberattaques en
            télétravail</option>
          <option class="" name="" value="64dcea71c41190618233dc39" data-key-record="apporteurs-d-affaire">Apporteurs d'affaire</option>
          <option class="" name="" value="64dcea95c41190618233dc3a" data-key-record="formulaire-lb-les-sciences-cognitives-la-face-cach-e-de-la-cybers-curit">Formulaire LB - Les sciences cognitives : la face cachée de la cybersécurité</option>
          <option class="" name="" value="64dceaaac41190618233dc3b" data-key-record="sites-r-f-rents-da">Sites référents;;DA;</option>
          <option class="" name="" value="64dceacec41190618233dc3c" data-key-record="formulaire-ressources-collectivit-s-pourquoi-et-comment-investir-dans-la-cybers-curit">Formulaire Ressources Collectivités : pourquoi et comment investir dans la
            cybersécurité</option>
          <option class="" name="" value="64dceafbc41190618233dc3d" data-key-record="formulaire-guides-manifeste-pour-un-droit-la-d-connexion">Formulaire Guides : Manifeste pour un droit à la déconnexion</option>
          <option class="" name="" value="64dcef25c41190618233dc3e" data-key-record="formulaire-comment-l-ia-mailinblack-prot-ge-les-messageries-des-cyberattaques">Formulaire Comment l'IA Mailinblack protège les messageries des cyberattaques ?
          </option>
          <option class="" name="" value="64dcf328c41190618233dc3f" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement-participants">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Participants</option>
          <option class="" name="" value="64dcfe43c41190618233dc40" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard-participants">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Participants</option>
          <option class="" name="" value="64de2ab1f420877ec1498759" data-key-record="comment-former-et-proteger-vos-equipes-contre-les-attaques-informatiques">Comment former et proteger vos equipes contre les attaques informatiques</option>
          <option class="" name="" value="64cced2de317a707dfc7ec50" data-key-record="formulaire-devis-page-protect">Formulaire Devis Page Protect</option>
          <option class="" name="" value="64d9e02f54067a59af8d9257" data-key-record="formulaire-demo-en">Formulaire Demo EN</option>
          <option class="" name="" value="64d9e03ce317a77e1a83792c" data-key-record="formulaire-devis-en">Formulaire Devis EN</option>
          <option class="" name="" value="64be6da354067a70ae48fd04" data-key-record="formulaire-demo-en-cyber-academy">Formulaire Demo EN Cyber Academy</option>
          <option class="" name="" value="64be6db054067a1f0e017d5a" data-key-record="formulaire-demo-en-cyber-coach">Formulaire Demo EN Cyber Coach</option>
          <option class="" name="" value="64be6dbc54067a4b20d0d0ed" data-key-record="formulaire-demo-en-protect">Formulaire Demo EN Protect</option>
          <option class="" name="" value="64be6dc554067a1f0e017d5b" data-key-record="formulaire-devis-en-protect">Formulaire Devis EN Protect</option>
          <option class="" name="" value="64be6dcee317a72bee8b52d8" data-key-record="formulaire-devis-en-cyber-coach">Formulaire Devis EN Cyber Coach</option>
          <option class="" name="" value="64be6dd9e317a72bbbcc10c5" data-key-record="formulaire-devis-en-cyber-academy">Formulaire Devis EN Cyber Academy</option>
          <option class="" name="" value="6499498e54067a1fb1206ea6" data-key-record="formulaire-clients-cyber-academy">Formulaire clients Cyber Academy</option>
          <option class="" name="" value="6470cc0754067a0882d79ca4" data-key-record="formulaire-lb-formation-cybers-curit-en-entreprise">Formulaire LB Formation Cybersecurite en Entreprise</option>
          <option class="" name="" value="64424bb8f42087520a57a3b1" data-key-record="formulaire-protect-phishing-coach-cyber-academy">Formulaire Protect &amp; Phishing Coach &amp; Cyber Academy</option>
          <option class="" name="" value="6425912e54067a4348024c09" data-key-record="wbn-30-02-23-5-conseils-ia-chatgpt-google-bard-participants">WBN - 30/02/23 - 5 conseils + IA, CHATGPT, GOOGLE BARD - Participants</option>
          <option class="" name="" value="6436b51c54067a58f3568d9e" data-key-record="formulaire-devis-cyber-academy">Formulaire Devis Cyber Academy</option>
          <option class="" name="" value="6441013ee317a7615d00f511" data-key-record="formulaire-demo-cyber-academy">Formulaire Demo Cyber Academy</option>
          <option class="" name="" value="6423f422e317a719f63824d4" data-key-record="wbn-30-02-23-d-mo-ia-chatgpt-google-bard-non-participants">WBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Non Participants</option>
          <option class="" name="" value="6423f452f4208735e2bbac72" data-key-record="wbn-30-02-202-d-mo-5-conseils-pour-se-prot-ger-efficacement-participants">WBN - 30/02/202 - Démo + 5 conseils pour se protéger efficacement - Participants</option>
          <option class="" name="" value="6423f46354067a4f685084b2" data-key-record="wbn-30-02-2023-d-mo-5-conseils-pour-se-prot-ger-efficacement-non-participants">WBN - 30/02/2023 / Démo + 5 conseils pour se protéger efficacement - Non Participants
          </option>
          <option class="" name="" value="6423f649e317a70fe5969c8a" data-key-record="wbn-30-02-2023-webinars-participants">WBN - 30/02/2023 - 3 webinars - Participants</option>
          <option class="" name="" value="6423f89f54067a53d667cce8" data-key-record="wbn-30-02-2023-webinars-non-participants">WBN - 30/02/2023 - webinars - Non Participants</option>
          <option class="" name="" value="641c59afe317a7494fa279c8" data-key-record="liste-d-exclusion-mailjet">Liste d'exclusion Mailjet </option>
          <option class="" name="" value="641c6cb854067a5d9e91eeb9" data-key-record="getquanty-protect-et-cyber-coach-251-1000-1000">Getquanty - Protect et Cyber Coach - 251-1000 &amp; &gt;1000</option>
          <option class="" name="" value="641c6cc5f420875541fcb6b8" data-key-record="getquanty-protect-et-cyber-coach-51-250">Getquanty - Protect et Cyber Coach - 51-250</option>
          <option class="" name="" value="641c6cd254067a2fef01c989" data-key-record="getquanty-cyber-coach-251-1000-1000">Getquanty - Cyber Coach - 251-1000 &amp; &gt; 1000</option>
          <option class="" name="" value="641c6ce654067a2fef01c98a" data-key-record="getquanty-cyber-coach-51-250">Getquanty - Cyber Coach - 51-250</option>
          <option class="" name="" value="641c6cf6e317a74fb3f3e7c8" data-key-record="getquanty-protect-251-1000-1000">Getquanty - Protect - 251-1000 &amp; &gt;1000</option>
          <option class="" name="" value="641c6d0354067a4a7099fc8c" data-key-record="getquanty-protect-51-250">Getquanty - Protect - 51-250</option>
          <option class="" name="" value="641c6d1954067a5d9e91eeba" data-key-record="getquanty-protect-1-50">Getquanty - Protect - 1-50</option>
          <option class="" name="" value="641c6d28e317a72606620b7a" data-key-record="getquanty-cyber-coach-1-50">Getquanty - Cyber Coach - 1-50</option>
          <option class="" name="" value="641c6d36e317a72606620b7b" data-key-record="getquanty-protect-et-cyber-coach-1-50">Getquanty - Protect et Cyber Coach - 1-50</option>
          <option class="" name="" value="6422da0bf4208701e91ad52b" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Participants</option>
          <option class="" name="" value="6422da2ce317a77333f3aa3e" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Participants</option>
          <option class="" name="" value="6422da50e317a75178b6fcfa" data-key-record="wbn-30-02-23-d-mo-live">WBN - 30/02/23 - Démo live - Participants</option>
          <option class="" name="" value="6422da7b54067a6a78ffbb83" data-key-record="wbn-30-02-23-d-mo-ia-chatgpt-google-bard">WBN - 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Participants</option>
          <option class="" name="" value="6422dc55f42087027c02c434" data-key-record="wbn-30-02-23-d-mo-5-conseils-pour-se-prot-ger-efficacement">WBN - 30/02/23 - Démo + 5 conseils pour se protéger efficacement</option>
          <option class="" name="" value="6422ee87f4208755ff9f8b7a" data-key-record="wbn-30-02-23-ia-chatgpt-google-bard-non-participants">WBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD - Non Participants</option>
          <option class="" name="" value="6422f054f42087513de88a74" data-key-record="wbn-30-02-23-5-conseils-pour-se-prot-ger-efficacement-non-participants">WBN - 30/02/23 - 5 conseils pour se protéger efficacement - Non Participants</option>
          <option class="" name="" value="6422fb0c54067a6e54667783" data-key-record="wbn-30-02-23-d-mo-live-non-participants">WBN - 30/02/23 - Démo live - Non Participants</option>
          <option class="" name="" value="641c1673e317a706b4492086" data-key-record="sql-perdus-mql-recyclage-protect-virginie">SQL perdus - MQL recyclage - Protect - Virginie</option>
          <option class="" name="" value="641c169ce317a705f16ff728" data-key-record="sql-perdus-mql-recyclage-cyber-coach-virginie">SQL perdus - MQL recyclage - Cyber Coach - Virginie</option>
          <option class="" name="" value="641c16c6e317a706b4492089" data-key-record="sql-perdus-mql-recyclage-cyber-coach-et-protect-virginie">SQL perdus - MQL recyclage - Cyber Coach et protect - Virginie</option>
          <option class="" name="" value="63ecae4cf420871af6d42400" data-key-record="barom-tre-cyber-2023">baromètre cyber 2023</option>
          <option class="" name="" value="63ff705ce317a711228839d8" data-key-record="sql-perdus-coach-maiwenn">SQL perdus Coach - Maiwenn</option>
          <option class="" name="" value="63ff708df42087376261cf88" data-key-record="sal-coach-maiwenn">SAL Coach - Maiwenn</option>
          <option class="" name="" value="63ff70c2f420872ad38cf1d2" data-key-record="mql-sql-paca-maiween">MQL SQL PACA - Maiween</option>
          <option class="" name="" value="63ea0f24e317a75162904546" data-key-record="formulaire-partenaire-coach">Formulaire partenaire coach </option>
          <option class="" name="" value="63d15d8e54067a446c24c5f0" data-key-record="formulaire-barometre-cyber-2023">Formulaire Barometre Cyber 2023</option>
          <option class="" name="" value="6391aec0e317a7295c53f3a9" data-key-record="formulaire-en">Formulaire EN</option>
          <option class="" name="" value="63bd21d8f4208738f34f0615" data-key-record="formulaires-guides-phishing-tous-les-moyens-sont-bons-pour-nuire-votre-entreprise">Formulaires Guides Phishing : tous les moyens sont bons pour nuire à votre
            entreprise</option>
          <option class="" name="" value="6375112754067a2e3b74ecab" data-key-record="formulaire-ressources-comment-l-ia-mailinblack-prot-ge-les-messageries-des-cyberattaques">Formulaire Ressources Comment l'IA Mailinblack protège les messageries des
            cyberattaques ?</option>
          <option class="" name="" value="6368e074eeec37721e469434" data-key-record="leadeo">Leadeo</option>
          <option class="" name="" value="6368e075eeec37721e469435" data-key-record="formulaire-d-mo-protect">Formulaire Démo Protect</option>
          <option class="" name="" value="63497631e317a74cd2bdd600" data-key-record="sensi-kit">Sensi Kit</option>
          <option class="" name="" value="634977a5f420872e6694502e" data-key-record="formulaire-guide-comp-tences-cyber-des-salari-s-une-perception-des-risques-bien-diff-rente-de-la-r-alit">Formulaire guide : compétences cyber des salariés : une
            perception des risques bien différente de la réalité</option>
          <option class="" name="" value="63497a81e317a74cd2bdd60a" data-key-record="formulaire-cyberattaques-comment-pr-parer-et-entra-ner-vos-collaborateurs">Formulaire Cyberattaques, comment préparer et entraîner vos collaborateurs ?</option>
          <option class="" name="" value="635173c3007fb76af404c936" data-key-record="sea">SEA</option>
          <option class="" name="" value="635173c3007fb76af404c937" data-key-record="infopro">Infopro</option>
          <option class="" name="" value="6351c82beeec377a2dcbf515" data-key-record="26-guides-quelles-sont-les-bonnes-pratiques-pour-s-curiser-ma-messagerie">26. Guides : Quelles sont les bonnes pratiques pour sécuriser ma messagerie ?</option>
          <option class="" name="" value="6351c830eeec377a2dcbf516" data-key-record="manageo">Manageo</option>
          <option class="" name="" value="6351c832eeec377a2dcbf517" data-key-record="campagne-braqueur-de-cerveau">Campagne Braqueur de cerveau</option>
          <option class="" name="" value="635270f3c41190221886b5ca" data-key-record="formulaire-d-mo-phishing-coach">Formulaire Démo Phishing Coach</option>
          <option class="" name="" value="6352a934eeec3756d01ed772" data-key-record="formulaire-infographie-mois-de-la-cybersecurite-tat-des-lieux-de-la-cybers-curit-en-2022-par-mailinblack">Formulaire Infographie - MOIS DE LA CYBERSECURITE : ÉTAT
            DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACK</option>
          <option class="" name="" value="6352c62beeec3725caa24221" data-key-record="formulaire-ressources-guides-6-tapes-pour-former-vos-collaborateurs-la-cybers-curit">Formulaire Ressources guides : 6 étapes pour former vos collaborateurs à la
            cybersécurité</option>
          <option class="" name="" value="6353c263007fb713dee11af9" data-key-record="it-facto">IT FACTO</option>
          <option class="" name="" value="63562d24007fb73d38f7c7e3" data-key-record="formulaire-guide-infographie-5-tendances-cyber-2022">Formulaire guide : Infographie : 5 tendances cyber 2022</option>
          <option class="" name="" value="635667bd007fb726b0e14389" data-key-record="formulaire-partenaires-acc-s-au-qg">Formulaire Partenaires accès au QG</option>
          <option class="" name="" value="6357ad491dc973532f431777" data-key-record="fic">FIC</option>
          <option class="" name="" value="6357e4fd1dc97308d453d6a6" data-key-record="formulaire-guide-livre-blanc-cybers-curit-industrielle-autre-enjeu-industrie-4-0">Formulaire guide Livre Blanc cybersécurité industrielle autre enjeu industrie 4.0
          </option>
          <option class="" name="" value="635871f41dc973659b22aded" data-key-record="-da">;DA;</option>
          <option class="" name="" value="6359197ec411904cd9d72baf" data-key-record="formulaire-ressources-guides">Formulaire Ressources guides</option>
          <option class="" name="" value="63593d361dc973302a2fc9bb" data-key-record="it-partner">IT Partner</option>
          <option class="" name="" value="63593d3c1dc973302a2fc9bc" data-key-record="da-seo">DA;;SEO;</option>
          <option class="" name="" value="635958961dc9730a5cf06789" data-key-record="formulaire-guide-infographie-ransomware-3-tapes-pour-comprendre-la-menace-et-s-en-prot-ger">Formulaire guide : Infographie - Ransomware : 3 étapes pour comprendre la
            menace et s’en protéger</option>
          <option class="" name="" value="635a3aa3c41190332d4eb3fe" data-key-record="formulaire-ressources-comment-prot-ger-ses-bo-tes-mails-des-menaces-cyber-quand-on-est-une-pme">Formulaire Ressources Comment protéger ses boîtes mails des menaces
            cyber ! Quand on est une PME</option>
          <option class="" name="" value="635a7292007fb768b6cc8185" data-key-record="formulaire-anti-ransmoware">Formulaire anti-ransmoware</option>
          <option class="" name="" value="635a8ebc1dc97363208f5ad7" data-key-record="formulaire-guide-cyberattaques-comment-se-prot-ger">Formulaire :Guide Cyberattaques : Comment se protéger ?</option>
          <option class="" name="" value="635be029007fb7103ee7ed7c" data-key-record="-seo">;SEO;</option>
          <option class="" name="" value="635f9bb7c411906ad4fc84db" data-key-record="-facebook">;Facebook;</option>
          <option class="" name="" value="635f9bbac411906ad4fc84dc" data-key-record="formulaire-ressources-dsi-6-conseils-pour-diminuer-vos-risques-cyber">Formulaire Ressources DSI : 6 conseils pour diminuer vos risques cyber</option>
          <option class="" name="" value="635fb9311dc9736eb334b1b7" data-key-record="percy-miller">Percy Miller</option>
          <option class="" name="" value="636375241dc973209bec760c" data-key-record="formulaire-guides-rgpd-email-et-spam-quel-est-le-lien">Formulaire Guides : RGPD, email et spam : quel est le lien ?</option>
          <option class="" name="" value="63654117007fb759e780e775" data-key-record="source-to-set">source-to-set</option>
          <option class="" name="" value="634970eb54067a6ca77a0bbc" data-key-record="formulaires-ressources-webinar">Formulaires Ressources Webinar</option>
          <option class="" name="" value="634968c8f420876f9626a592" data-key-record="formulaires-ressources-guides-quels-sont-les-principaux-vecteurs-d-attaques-informatiques">Formulaires Ressources Guides : Quels sont les principaux vecteurs
            d’attaques informatiques ?</option>
          <option class="" name="" value="63458e7f54067a69ebc2bee9" data-key-record="formulaire-devis">Formulaire Devis</option>
          <option class="" name="" value="63458e7f54067a69ebc2beea" data-key-record="formulaire-demo">Formulaire Démo</option>
          <option class="" name="" value="63458e7f54067a69ebc2beeb" data-key-record="formulaire-newsletter">Formulaire Newsletter</option>
          <option class="" name="" value="63458e7f54067a69ebc2beec" data-key-record="formulaire-devis-phishing-coach">Formulaire Devis Phishing Coach</option>
          <option class="" name="" value="63458e7f54067a69ebc2beed" data-key-record="formulaire-devis-protect">Formulaire devis protect</option>
          <option class="" name="" value="63458e7f54067a69ebc2beee" data-key-record="formulaire-anti-spam">Formulaire anti-spam</option>
          <option class="" name="" value="63458e7f54067a69ebc2beef" data-key-record="formulaire-cyber-coach-sensibilisation-a-la-cybersecurite-au-travail">Formulaire Cyber Coach, sensibilisation à la cybersécurité au travail</option>
          <option class="" name="" value="63458e7f54067a69ebc2bef0" data-key-record="formulaire-cyber-resilience-en-entreprise">Formulaire cyber résilience en entreprise</option>
          <option class="" name="" value="63458e8054067a69ebc2bef1" data-key-record="formulaire-demo-cyber-coach">Formulaire demo Cyber coach</option>
          <option class="" name="" value="63458e8054067a69ebc2bef2" data-key-record="formulaires-simulation-d-attaques-de-phishing">Formulaires Simulation d’attaques de phishing</option>
          <option class="" name="" value="63458e8054067a69ebc2bef3" data-key-record="formulaires-simulation-d-attaques-de-ransomware">Formulaires Simulation d’attaques de ransomware</option>
          <option class="" name="" value="63458e8054067a69ebc2bef4" data-key-record="formulaire-page-produit-cyber-coach">Formulaire page produit cyber coach</option>
          <option class="" name="" value="63458e8054067a69ebc2bef5" data-key-record="formulaire-coach-audit">Formulaire coach audit</option>
          <option class="" name="" value="63458e8054067a69ebc2bef6" data-key-record="formulaire-demo-protect">Formulaire demo protect</option>
          <option class="" name="" value="63458e8054067a69ebc2bef7" data-key-record="formulaire-messagerie-office-365">Formulaire messagerie Office 365</option>
          <option class="" name="" value="63458e8054067a69ebc2bef8" data-key-record="formulaire-devis-cyber-coach">Formulaire devis Cyber Coach</option>
          <option class="" name="" value="63458e8054067a69ebc2bef9" data-key-record="formulaire-anti-malware">Formulaire anti-malware</option>
          <option class="" name="" value="63458e8054067a69ebc2befa" data-key-record="formulaire-anti-ransomware">Formulaire anti-ransomware</option>
          <option class="" name="" value="63458e8054067a69ebc2befb" data-key-record="formulaire-anti-phishing">Formulaire anti-phishing</option>
          <option class="" name="" value="63458e8054067a69ebc2befc" data-key-record="formulaire-anti-spear-phishing">Formulaire anti-spear phishing</option>
          <option class="" name="" value="63458e8054067a69ebc2befd" data-key-record="formulaire-page-produit-protect">Formulaire Page Produit Protect</option>
          <option class="" name="" value="63458e8054067a69ebc2befe" data-key-record="formulaires-ressources-guides-etablissements-de-sante-panorama-des-cyberattaques">Formulaires Ressources Guides : Établissements de santé : Panorama des
            cyberattaques</option>
          <option class="" name="" value="63458e8054067a69ebc2beff" data-key-record="formulaires-ressources-guides-quel-est-le-niveau-de-vulnerabilite-des-entreprises-face-aux-cyberattaques-en-2020">Formulaires Ressources Guides : Quel est le niveau
            de vulnérabilité des entreprises face aux cyberattaques en 2020</option>
          <option class="" name="" value="63458e8054067a69ebc2bf00" data-key-record="formulaires-ressources-guides-spear-phishing-6-conseils-pour-lutter-contre-ce-type-d-attaque">Formulaires Ressources Guides :(Spear)Phishing : 6 conseils pour lutter
            contre ce type d’attaque</option>
          <option class="" name="" value="63458e8154067a69ebc2bf01" data-key-record="formulaires-ressources-guides-cyberattaques-comment-preparer-et-entrainer-vos-collaborateurs">Formulaires Ressources Guides Cyberattaques, comment préparer et
            entraîner vos collaborateurs ?</option>
          <option class="" name="" value="63458e8154067a69ebc2bf02" data-key-record="formulaires-ressources-guides-cyberattaques-couts-et-consequences">Formulaires Ressources Guides Cyberattaques : coûts et conséquences</option>
          <option class="" name="" value="63458e8154067a69ebc2bf03" data-key-record="formulaires-guides-6-etapes-pour-former-vos-collaborateurs-a-la-cybersecurite">Formulaires Guides : 6 étapes pour former vos collaborateurs à la cybersécurité
          </option>
          <option class="" name="" value="63458e8154067a69ebc2bf04" data-key-record="formulaire-ressources-guides-dsi-6-conseils-pour-diminuer-vos-risques-cyber">Formulaire Ressources Guides DSI : 6 conseils pour diminuer vos risques cyber</option>
          <option class="" name="" value="63458e8154067a69ebc2bf05" data-key-record="formulaire-guides-collectivites-pourquoi-et-comment-investir-dans-la-cybersecurite">Formulaire guides : Collectivités : pourquoi et comment investir dans la
            cybersécurité</option>
          <option class="" name="" value="63458e8154067a69ebc2bf06" data-key-record="formulaire-guide-lb-les-sciences-cognitives-la-face-cachee-de-la-cybersecurite">Formulaire Guide LB - Les sciences cognitives : la face cachée de la cybersécurité
          </option>
          <option class="" name="" value="63458e8154067a69ebc2bf07" data-key-record="formulaire-guide-competences-cyber-des-salaries-une-perception-des-risques-bien-differente-de-la-realite">Formulaire guide : compétences cyber des salariés : une
            perception des risques bien différente de la réalité</option>
          <option class="" name="" value="63458e8154067a69ebc2bf08" data-key-record="formulaires-ressources-guides-quelles-sont-les-bonnes-pratiques-pour-securiser-ma-messagerie">Formulaires Ressources Guides : Quelles sont les bonnes pratiques pour
            sécuriser ma messagerie ?</option>
          <option class="" name="" value="63458e8154067a69ebc2bf09" data-key-record="formulaires-ressources-guides-cyberattaques-comment-se-proteger">Formulaires Ressources Guides : Cyberattaques : comment se protéger ?</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0a" data-key-record="formulaires-ressources-guides-pourquoi-installer-une-solution-de-protection-de-messagerie">Formulaires Ressources Guides : Pourquoi installer une solution de
            protection de messagerie</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0b" data-key-record="formulaires-ressources-guides-rgpd-email-et-spam-quel-est-le-lien">Formulaires Ressources Guides : RGPD, email et spam : quel est le lien ?</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0c" data-key-record="formulaires-ressources-guides-zoom-sur-la-messagerie-chiffres-et-menaces">Formulaires Ressources Guides : Zoom sur la messagerie, chiffres et menaces</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0d" data-key-record="formulaires-guides-proteger-sa-messagerie-professionnelle-premiere-etape-dans-la-lutte-contre-les-cyberattaques">Formulaires Guides Protéger sa messagerie
            professionnelle première étape dans la lutte contre les cyberattaques</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0e" data-key-record="formulaires-ressources-guides-covid-19-hausse-significative-des-cyberattaques-en-teletravail">Formulaires Ressources Guides : Covid 19, hausse significative des
            cyberattaques en télétravail</option>
          <option class="" name="" value="63458e8154067a69ebc2bf0f" data-key-record="formulaires-ressources-guides-education-et-technologies-les-deux-faces-d-une-cybersecurite-a-360-pour-votre-organisation">Formulaires Ressources Guides : Éducation
            et technologies : les deux faces d’une cybersécurité à 360° pour votre organisation</option>
          <option class="" name="" value="63458e8154067a69ebc2bf10" data-key-record="formulaires-ressources-guides-manifeste-pour-un-droit-a-la-deconnexion">Formulaires Ressources Guides : Manifeste pour un droit à la déconnexion</option>
          <option class="" name="" value="63458e8154067a69ebc2bf11" data-key-record="formulaires-ressources-guides-quelles-sont-les-tendances-et-les-innovations-des-hackers-en-2020">Formulaires Ressources Guides : Quelles sont les tendances et les
            innovations des hackers en 2020</option>
          <option class="" name="" value="63458e8154067a69ebc2bf12" data-key-record="formulaire-guides-infographie-5-tendances-cyber-2022">Formulaire guides : Infographie : 5 tendances cyber 2022</option>
          <option class="" name="" value="63458e8154067a69ebc2bf13" data-key-record="formulaire-guide-lb-cybersecurite-industrielle-autre-enjeu-industrie-4-0">Formulaire guide - LB - cybersécurité industrielle autre enjeu industrie 4.0</option>
          <option class="" name="" value="63458e8154067a69ebc2bf14" data-key-record="formulaire-guide-infographie-ransomware-3-etapes-pour-comprendre-la-menace-et-s-en-proteger">Formulaire guide Infographie - Ransomware : 3 étapes pour comprendre la
            menace et s’en protéger</option>
          <option class="" name="" value="63458e8154067a69ebc2bf15" data-key-record="formulaire-infographie-panorama-cyberattaques-tpe-pme">Formulaire Infographie - panorama cyberattaques TPE PME</option>
          <option class="" name="" value="63458e8154067a69ebc2bf16" data-key-record="formulaire-infographie-mois-de-la-cybersecurite-etat-des-lieux-de-la-cybersecurite-en-2022-par-mailinblack">Formulaire infographie -MOIS DE LA CYBERSECURITE : ÉTAT
            DES LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACK</option>
          <option class="" name="" value="63458f9554067a67f80b964c" data-key-record="formulaires-ressources-guides">Formulaires Ressources Guides</option>
          <option class="" name="" value="63458fa654067a6d9fe48a13" data-key-record="formulaires-ressources-blog">Formulaires Ressources Blog</option>
          <option class="" name="" value="63458fbae317a75edd57dc64" data-key-record="formulaires-ressources-vid-os">Formulaires Ressources Vidéos</option>
        </select>
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_mots_cles_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_mots_cles_ga" id="jsonform-1-elt-plz_mots_cles_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_support_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_support_ga" id="jsonform-1-elt-plz_support_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_source_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_source_ga" id="jsonform-1-elt-plz_source_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_produit keep-field" name="" style="display:none;">
      <div class="controls" name=""><select class="form-control" name="plz_produit" id="jsonform-1-elt-plz_produit" style="color: rgb(27, 27, 27);">
          <option class="" name="" value="" selected="selected"></option>
          <option class="" name="" value="637795f654067a704f6c0f0d" data-key-record="mib-protect">MIB Protect</option>
          <option class="" name="" value="64dcb4adc411900acbe9003e" data-key-record="mib-protect-cyber-coach-cyber-academy">MIB Protect &amp;&nbsp;Cyber Coach &amp; Cyber Academy</option>
          <option class="" name="" value="63ee3ae6e317a70d9012812e" data-key-record="mib-academy">MIB Academy</option>
          <option class="" name="" value="6441609ae317a74d976242cc" data-key-record="mib-protect-phishing-coach-cyber-academy">MIB Protect &amp; Cyber Coach &amp; Cyber Academy</option>
          <option class="" name="" value="6377960ff4208719ff67d54a" data-key-record="mib-phishing-coach">MIB Cyber Coach</option>
          <option class="" name="" value="6377961de317a77c80fcf3a4" data-key-record="mib-protect-phishing-coach">MIB Protect &amp; Cyber Coach</option>
        </select>
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_origine_de_la_piste keep-field" name="" style="display:none;">
      <div class="controls" name=""><select class="form-control" name="plz_origine_de_la_piste" id="jsonform-1-elt-plz_origine_de_la_piste" style="color: rgb(27, 27, 27);">
          <option class="" name="" value="" selected="selected"></option>
          <option class="" name="" value="633bf9d754067a742b9bbf36" data-key-record="chasse">Chasse</option>
          <option class="" name="" value="64df8105c41190048aa8c1a7" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-cyber-academy">http://www.mailinblack.com/devis-produit-mailinblack-cyber-academy/</option>
          <option class="" name="" value="64df81e7c41190048aa8c1a8" data-key-record="http-www-mailinblack-com-en-quote-product-mailinblack-cyber-academy">http://www.mailinblack.com/en/quote-product-mailinblack-cyber-academy/</option>
          <option class="" name="" value="64e08c82c411901718e51490" data-key-record="site-web-fr">Site web FR</option>
          <option class="" name="" value="64e08c88c411901718e51491" data-key-record="idg">IDG</option>
          <option class="" name="" value="64e08c92c411901718e51492" data-key-record="tarifs">Tarifs</option>
          <option class="" name="" value="64eca4e3eeec37364d91cab1" data-key-record="calendly">Calendly</option>
          <option class="" name="" value="650805a9c411906d7c50f73c" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-protect">http://www.mailinblack.com/devis-produit-mailinblack-protect/</option>
          <option class="" name="" value="64df7acde317a76f2c551cae" data-key-record="revendeur">Revendeur</option>
          <option class="" name="" value="64df7af2f420876c9490cd52" data-key-record="social-ads">Social Ads</option>
          <option class="" name="" value="64df7d19c41190048aa8c1a6" data-key-record="http-www-mailinblack-com-devis-produit-mailinblack-phishing-coach">http://www.mailinblack.com/devis-produit-mailinblack-phishing-coach/</option>
          <option class="" name="" value="64d60acc1dc9733e6fb221de" data-key-record="call-in">Call In</option>
          <option class="" name="" value="64d6108e1dc9733e6fb221ff" data-key-record="salon">Salon</option>
          <option class="" name="" value="64d62a601dc9733e6fb2221a" data-key-record="nurturing">Nurturing</option>
          <option class="" name="" value="633bf9ecf4208711b7d1b38a" data-key-record="bpce">BPCE</option>
          <option class="" name="" value="633bfa3fe317a76b07dd8ffb" data-key-record="da">DA</option>
          <option class="" name="" value="633bfa74f420877a44ef6cb9" data-key-record="webinar">Webinar</option>
          <option class="" name="" value="633c08c3e317a703af334e4d" data-key-record="site">Site</option>
          <option class="" name="" value="633c091a54067a7d3be31484" data-key-record="apporteur-d-affaires">Apporteur d'affaires</option>
        </select>
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_all_source keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_all_source" id="jsonform-1-elt-plz_all_source" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_client_id_ga keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_client_id_ga" id="jsonform-1-elt-plz_client_id_ga" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_first_source keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_first_source" id="jsonform-1-elt-plz_first_source" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_last_source keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_last_source" id="jsonform-1-elt-plz_last_source" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-plz_gclid keep-field" name="" style="display:none;">
      <div class="controls" name=""><input class="form-control" name="plz_gclid" id="jsonform-1-elt-plz_gclid" type="text">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-consents jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
        <div class="" name=""></div>
        <div class="help-block jsonform-errortext" name="" data-gtm-vis-polling-id12649491_240="94"></div>
      </span></div>
    <div class="control-group plezi-form-field jsonform-error-plezi_user_id keep-field" name=""><input class="" name="plezi_user_id" style="display:none;" type="text"></div>
    <div class="submit" name=""><input class="plezi-submit-btn" name="" value="Send" type="submit"></div>
  </div><input type="hidden" name="plz_csrf_token" value="65xmwb7dT3N4yZA8mBp44w=="><input type="hidden" name="plz_csrf_key" value="6322e41f54067a5cf215337a643e8b39d59cbc794d6783a5178.33.144.1791696496128Y9omMTNtHfcHLw==">
</form>

GET

<form class="jsonform-hasrequired" name="" id="foss-64424a25d59cbc7956684a28" language="en" method="GET" action="" style="display: block;">
  <div class="" name="">
    <div class="control-group plezi-form-field jsonform-error-plz_customers_resellers_others jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
        <div class="" name=""><label class="checkbox" name=""><input class="" name="plz_customers_resellers_others[0]" data-key-record="customers" type="checkbox"><span class="" name="">Customers</span></label><label class="checkbox" name=""><input
              class="" name="plz_customers_resellers_others[1]" data-key-record="resellers" type="checkbox"><span class="" name="">Resellers</span></label><label class="checkbox" name=""><input class="" name="plz_customers_resellers_others[2]"
              data-key-record="others" type="checkbox"><span class="" name="">Others</span></label></div>
        <div class="help-block jsonform-errortext" name=""></div>
      </span></div>
    <div class="control-group plezi-form-field jsonform-error-email jsonform-required keep-field" name=""><label class="control-label" name="" for="jsonform-2-elt-email">Email<span class="" name="" style="color:red;">*</span></label>
      <div class="controls" name=""><input class="form-control" name="email" id="jsonform-2-elt-email" required="required" type="email">
        <div class="help-block jsonform-errortext" name=""></div>
      </div>
    </div>
    <div class="control-group plezi-form-field jsonform-error-consents jsonform-required keep-field" name="" data-required-multiple-select="true"><span class="checkbox" name="">
        <div class="" name=""></div>
        <div class="help-block jsonform-errortext" name=""></div>
      </span></div>
    <div class="control-group plezi-form-field jsonform-error-plezi_user_id keep-field" name=""><input class="" name="plezi_user_id" style="display:none;" type="text"></div>
    <div class="submit" name=""><input class="plezi-submit-btn" name="" value="Send" type="submit"></div>
  </div><input type="hidden" name="plz_csrf_token" value="I0S35tAoRvuVMo7WXwMgQA=="><input type="hidden" name="plz_csrf_key" value="6322e41f54067a5cf215337a64424431d59cbc794d680304178.33.144.1791696496128BOu25TZR6F7AZg==">
</form>

Text Content

 * Secure your organization
   * 
     Retour
   * Secure your organization
   
   * Platform
     
     The most comprehensive cybersecurity solution for your organization
     
     
     Read more
     
   
   * Protect
     
     Email protection, essential in the fight against cyber attacks and spam
     
     
     Read more
     
   
   * Cyber Coach
     
     Awareness via attack simulations, the pillar of your cybersecurity
     
     
     Read more
     
   
   * Cyber Academy
     
     Cybersecurity training via an interactive e-learning platform
     
     
     Read more
     
 * Solutions
   * 
     Retour
   * Solutions
   
   * Cyber attack protection
     
     Anti malware
     
     
     All malware is stopped in quarantine so that no threat reaches your
     organization
     
     Anti phishing
     
     
     Protect yourself from phishing attempts with Mailinblack's Deep Learning
     model
     
     Anti spearphishing
     
     
     Protect your organization from targeted attacks and spear phishing
     
     Anti ransomware
     
     
     Fight effectively against ransomware with our technology and secure your
     emails
   
   * Mail pollution
     
     Anti spam
     
     
     Enjoy clean and secure messaging with our proprietary AI 
     
     Right to disconnect
     
     
     Protect the mental health of your employees, while complying with laws and
     regulations
   
   * Awareness & Training
     
     Cybersecurity training
     
     
     Cybersecurity training via an interactive e-learning platform
     
     Audit of human vulnerabilities
     
     
     Audit your company's level of vulnerability
     
     Phishing simulation
     
     
     Test your teams' behavior by simulating phishing attacks
     
     Ransomware simulation
     
     
     Test your employees by sending them simulated ransomware attacks
     
     Cyber attacks simulation
     
     
     Evaluate your teams' behavior in the face of cyberattacks (BitB, QR Code,
     USB key...)
 * Resources
   * 
     Retour
   * Resources
   * News
     
     
     
     
     Cybersecurity
     
     
     
     
     GDPR
     
     
     
     
     Product
     
     
     
     
     Spam
     
     
     
     
     Well-Being
     
     
     
 * Mailinblack
 * Partner
   * 
     Retour
   * Partner
   * Reseller
     
     
     Become a reseller and protect your customers from cyber attacks
     
     Partner area
     
     
     Access to the HQ, your partner space
 * Request a demo

English
 * Français
 * Español

 * Help & support
 * User area

Home » Products » Protect


EMAIL PROTECTION, FUNDAMENTAL TO FIGHT AGAINST CYBER ATTACKS AND SPAM

Thanks to our Deep Learning technology trained on 5 billion emails per year,
Protect sets up a filter of fraudulent emails before they are received:
phishing, spear phishing, ransomware, spam… Get rid of the dust in your
mailboxes and focus the essential.


Company*

Headcount*
1 - 5051 - 250251 - 1000>1000

First Name*

Last Name*

Email*

Phone*

Message



Formulaire PartenairesFormulaire simulation de cyberattaquesFormulaire Page
Cyber AcademyListe Nurturing Livre BlancFormulaire EN page produit
protectFormulaire EN page produit Cyber CoachFormulaire EN page produit Cyber
AcademyFormulaire EN anti-malwareFormulaire EN anti-phishingFormulaire EN
anti-ransomwareFormulaire EN anti-spamFormulaire Right to disconnectFormulaire
Audit of human vulnerabilitiesFormulaire Phishing simulationFormulaire
Ransomware simulationFormulaire Cyber attacks simulationFormulaire EN
spearphishingFormulaire droit a la deconnexionFormulaire formation
cybersecuriteFormulaire des vulerabilites humaines Formulaire Devis ES
ProtectFormulaire Devis ES Cyber CoachFormulaire Devis ES Cyber
AcademyFormulaire Demo ES ProtectFormulaire Demo ES Cyber CoachFormulaire Demo
ES Formulaire Devis ESFormulaire Demo ES Cyber AcademyFormulaire Partenaires
ESPFormulaires Ressources Guides : Comment former et protéger vos équipes contre
les attaques informatiquesFormulaire Intelligence artificielle Comment l’IA
révolutionne-t-elle la cybersécurité en entreprisefacebookFormulaire demande de
demoMIB-RESSOURCES-20211013- Formulaire DSI : 6 conseils pour diminuer vos
risques cyberFacebook AdsFormulaire Guides : Quels sont les principaux vecteurs
d’attaques informatiques ?Webinar Webikeo 12/10/21Formulaire devis
anti-spamWebinar Webikeo 21/09Become Digital 21MIB-RESSOURCES-202106-
Formulaires Ressources Guides : Quelles sont les tendances et les innovations
des hackers en 2020 ?MIB-RESSOURCES-202106- Formulaires Ressources Guides :
Cyberattaques : comment se protéger ?MIB-RESSOURCES-202106- Formulaires
Ressources Guides : Établissements de santé : Panorama des cyberattaquesSites
référents;SEA;;direct;DA;;Sites référents;DA;Sites référents;;DA;Formulaire
Cyber résilienceWebinar Webikeo 13/01/22DA;DA;SEO;;SEO;Access SecurityAccess
Security 2022SEO;;SEO;Formulaire Guides : Cyberattaques, comment préparer et
entraîner vos collaborateurs ?emailFormulaire demande de devis
classiqueDA;SEO;SEO;;SEA;DA;SEA;;DA;;Invitation;Formuliares : Guides : Covid 19,
hausse significative des cyberattaques en télétravailApporteurs
d'affaireFormulaire LB - Les sciences cognitives : la face cachée de la
cybersécuritéSites référents;;DA;Formulaire Ressources Collectivités : pourquoi
et comment investir dans la cybersécuritéFormulaire Guides : Manifeste pour un
droit à la déconnexionFormulaire Comment l'IA Mailinblack protège les
messageries des cyberattaques ?WBN - 30/02/23 - 5 conseils pour se protéger
efficacement - ParticipantsWBN - 30/02/23 - IA, CHATGPT, GOOGLE BARD -
ParticipantsComment former et proteger vos equipes contre les attaques
informatiquesFormulaire Devis Page ProtectFormulaire Demo ENFormulaire Devis
ENFormulaire Demo EN Cyber AcademyFormulaire Demo EN Cyber CoachFormulaire Demo
EN ProtectFormulaire Devis EN ProtectFormulaire Devis EN Cyber CoachFormulaire
Devis EN Cyber AcademyFormulaire clients Cyber AcademyFormulaire LB Formation
Cybersecurite en EntrepriseFormulaire Protect & Phishing Coach & Cyber
AcademyWBN - 30/02/23 - 5 conseils + IA, CHATGPT, GOOGLE BARD -
ParticipantsFormulaire Devis Cyber AcademyFormulaire Demo Cyber AcademyWBN -
30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - Non ParticipantsWBN - 30/02/202 -
Démo + 5 conseils pour se protéger efficacement - ParticipantsWBN - 30/02/2023 /
Démo + 5 conseils pour se protéger efficacement - Non ParticipantsWBN -
30/02/2023 - 3 webinars - ParticipantsWBN - 30/02/2023 - webinars - Non
ParticipantsListe d'exclusion Mailjet Getquanty - Protect et Cyber Coach -
251-1000 & >1000Getquanty - Protect et Cyber Coach - 51-250Getquanty - Cyber
Coach - 251-1000 & > 1000Getquanty - Cyber Coach - 51-250Getquanty - Protect -
251-1000 & >1000Getquanty - Protect - 51-250Getquanty - Protect - 1-50Getquanty
- Cyber Coach - 1-50Getquanty - Protect et Cyber Coach - 1-50WBN - 30/02/23 -
IA, CHATGPT, GOOGLE BARD - ParticipantsWBN - 30/02/23 - 5 conseils pour se
protéger efficacement - ParticipantsWBN - 30/02/23 - Démo live - ParticipantsWBN
- 30/02/23 - Démo + IA, CHATGPT, GOOGLE BARD - ParticipantsWBN - 30/02/23 - Démo
+ 5 conseils pour se protéger efficacementWBN - 30/02/23 - IA, CHATGPT, GOOGLE
BARD - Non ParticipantsWBN - 30/02/23 - 5 conseils pour se protéger efficacement
- Non ParticipantsWBN - 30/02/23 - Démo live - Non ParticipantsSQL perdus - MQL
recyclage - Protect - VirginieSQL perdus - MQL recyclage - Cyber Coach -
VirginieSQL perdus - MQL recyclage - Cyber Coach et protect - Virginiebaromètre
cyber 2023SQL perdus Coach - MaiwennSAL Coach - MaiwennMQL SQL PACA -
MaiweenFormulaire partenaire coach Formulaire Barometre Cyber 2023Formulaire
ENFormulaires Guides Phishing : tous les moyens sont bons pour nuire à votre
entrepriseFormulaire Ressources Comment l'IA Mailinblack protège les messageries
des cyberattaques ?LeadeoFormulaire Démo ProtectSensi KitFormulaire guide :
compétences cyber des salariés : une perception des risques bien différente de
la réalitéFormulaire Cyberattaques, comment préparer et entraîner vos
collaborateurs ?SEAInfopro26. Guides : Quelles sont les bonnes pratiques pour
sécuriser ma messagerie ?ManageoCampagne Braqueur de cerveauFormulaire Démo
Phishing CoachFormulaire Infographie - MOIS DE LA CYBERSECURITE : ÉTAT DES LIEUX
DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACKFormulaire Ressources guides : 6
étapes pour former vos collaborateurs à la cybersécuritéIT FACTOFormulaire guide
: Infographie : 5 tendances cyber 2022Formulaire Partenaires accès au
QGFICFormulaire guide Livre Blanc cybersécurité industrielle autre enjeu
industrie 4.0;DA;Formulaire Ressources guidesIT PartnerDA;;SEO;Formulaire guide
: Infographie - Ransomware : 3 étapes pour comprendre la menace et s’en
protégerFormulaire Ressources Comment protéger ses boîtes mails des menaces
cyber ! Quand on est une PMEFormulaire anti-ransmowareFormulaire :Guide
Cyberattaques : Comment se protéger ?;SEO;;Facebook;Formulaire Ressources DSI :
6 conseils pour diminuer vos risques cyberPercy MillerFormulaire Guides : RGPD,
email et spam : quel est le lien ?source-to-setFormulaires Ressources
WebinarFormulaires Ressources Guides : Quels sont les principaux vecteurs
d’attaques informatiques ?Formulaire DevisFormulaire DémoFormulaire
NewsletterFormulaire Devis Phishing CoachFormulaire devis protectFormulaire
anti-spamFormulaire Cyber Coach, sensibilisation à la cybersécurité au
travailFormulaire cyber résilience en entrepriseFormulaire demo Cyber
coachFormulaires Simulation d’attaques de phishingFormulaires Simulation
d’attaques de ransomwareFormulaire page produit cyber coachFormulaire coach
auditFormulaire demo protectFormulaire messagerie Office 365Formulaire devis
Cyber CoachFormulaire anti-malwareFormulaire anti-ransomwareFormulaire
anti-phishingFormulaire anti-spear phishingFormulaire Page Produit
ProtectFormulaires Ressources Guides : Établissements de santé : Panorama des
cyberattaquesFormulaires Ressources Guides : Quel est le niveau de vulnérabilité
des entreprises face aux cyberattaques en 2020Formulaires Ressources Guides
:(Spear)Phishing : 6 conseils pour lutter contre ce type d’attaqueFormulaires
Ressources Guides Cyberattaques, comment préparer et entraîner vos
collaborateurs ?Formulaires Ressources Guides Cyberattaques : coûts et
conséquencesFormulaires Guides : 6 étapes pour former vos collaborateurs à la
cybersécuritéFormulaire Ressources Guides DSI : 6 conseils pour diminuer vos
risques cyberFormulaire guides : Collectivités : pourquoi et comment investir
dans la cybersécuritéFormulaire Guide LB - Les sciences cognitives : la face
cachée de la cybersécuritéFormulaire guide : compétences cyber des salariés :
une perception des risques bien différente de la réalitéFormulaires Ressources
Guides : Quelles sont les bonnes pratiques pour sécuriser ma messagerie
?Formulaires Ressources Guides : Cyberattaques : comment se protéger
?Formulaires Ressources Guides : Pourquoi installer une solution de protection
de messagerieFormulaires Ressources Guides : RGPD, email et spam : quel est le
lien ?Formulaires Ressources Guides : Zoom sur la messagerie, chiffres et
menacesFormulaires Guides Protéger sa messagerie professionnelle première étape
dans la lutte contre les cyberattaquesFormulaires Ressources Guides : Covid 19,
hausse significative des cyberattaques en télétravailFormulaires Ressources
Guides : Éducation et technologies : les deux faces d’une cybersécurité à 360°
pour votre organisationFormulaires Ressources Guides : Manifeste pour un droit à
la déconnexionFormulaires Ressources Guides : Quelles sont les tendances et les
innovations des hackers en 2020Formulaire guides : Infographie : 5 tendances
cyber 2022Formulaire guide - LB - cybersécurité industrielle autre enjeu
industrie 4.0Formulaire guide Infographie - Ransomware : 3 étapes pour
comprendre la menace et s’en protégerFormulaire Infographie - panorama
cyberattaques TPE PMEFormulaire infographie -MOIS DE LA CYBERSECURITE : ÉTAT DES
LIEUX DE LA CYBERSÉCURITÉ EN 2022 PAR MAILINBLACKFormulaires Ressources
GuidesFormulaires Ressources BlogFormulaires Ressources Vidéos




MIB ProtectMIB Protect & Cyber Coach & Cyber AcademyMIB AcademyMIB Protect &
Cyber Coach & Cyber AcademyMIB Cyber CoachMIB Protect & Cyber Coach

Chassehttp://www.mailinblack.com/devis-produit-mailinblack-cyber-academy/http://www.mailinblack.com/en/quote-product-mailinblack-cyber-academy/Site
web
FRIDGTarifsCalendlyhttp://www.mailinblack.com/devis-produit-mailinblack-protect/RevendeurSocial
Adshttp://www.mailinblack.com/devis-produit-mailinblack-phishing-coach/Call
InSalonNurturingBPCEDAWebinarSiteApporteur d'affaires










The data entered in this form is processed by Mailinblack to respond to your
request. To understand how your personal data is processed by Mailinblack, we
invite you to read our Privacy Policy, or to send an email to the
address dpo@mailinblack.com.


Mail protection


NEARLY 30% OF EMAILS ARE HARMFUL. BLOCK THEM BEFORE THEY ARE RECEIVED WITH
PROTECT.

Anti malware
Anti ransomware
Anti phishing
Anti spearphishing
Anti spam
Link Analysis
O365 complementarity
Right to disconnect
Anti malware


MALWARE: A THREAT IN MANY FORMS

The word malware comes from malicious software. As you can see, this software
does not want anything good for you. Ransomware, spyware, adware, scareware,
virus, worms, Trojan horse… it can take many forms, but its objective will
always be the same: to get into your system to do damage.

Discover our anti malware


Anti ransomware


RANSOMWARE: STOP THE RANSOM DEMANDS

Ransomware is a specific type of malware, which infiltrates your system,
corrupts it and offers you a solution by paying a ransom. Ransomware is
particularly harmful to your organization and should therefore be filtered
before your employees receive it.

Discover our anti ransomware


Anti phishing


PHISHING: INTERVENE BEFORE CARELESS MISTAKES ARE MADE

Phishing consists in usurping the identity of a brand or a person, by inviting
your employees to click on a fraudulent link for example. More and more
sophisticated, these attacks often owe their success to inattention or a lack of
awareness. Prevent your employees from asking themselves this question, and
filter phishing attempts before they are received.

Discover our anti phishing


Anti spearphishing


SPEARPHISHING: DO NOT ALLOW IDENTITY THEFT

Spearphishing is a personal attack, in which the hacker impersonates a known
member of your team (usually one of your employees). These attacks are therefore
more difficult to identify and to thwart, hence the need to block them before
the email is received.

Discover our anti spearphishing


Anti spam


STOP UNWANTED MAIL

Spam may seem harmless, but its impact on your organization’s efficiency is not
neutral: more than 25% of the emails we receive are unwanted.

Reduce your mental load and clean up your mailbox with our upstream spam
detection and filtering technology.

Discover our anti spam


Link Analysis


SECURE LINK: ALWAYS SAFE LINKS

Because, at the origin of every cyber attack, there is a fraudulent link that
should not have been clicked, Mailinblack has developed its Secure Link
technology: an artificial intelligence that analyzes links contained in the
emails you receive and warns your collaborators in case they are dangerous.


O365 complementarity


IMPROVE EMAIL SECURITY IN MICROSOFT 365 WITH MAILINBLACK

Businesses that use Microsoft 365 are particularly vulnerable to cyberattacks,
given the vast amount of sensitive information stored in Microsoft tools. That’s
why Mailinblack offers a complementary solution to enhance your email security
with more effective antivirus protection that stops threats before they can
reach your computer system and more effectively clean up your mailboxes with a
specially designed anti-spam.

 


Right to disconnect


GIVE YOUR EMPLOYEES THE ABILITY TO REALLY DISCONNECT

Strengthen your employer brand and respect the privacy of your employees with
our right to disconnect feature: set up automatic emails at the organization
level to inform senders when their messages are sent outside your employees’
time slots.


OUR TECHNOLOGIES


IMPLEMENT THE HIGHEST LEVEL OF MAIL PROTECTION VIA MULTIPLE FILTER LEVELS

The power of Mailinblack's artificial intelligence, at the service of your
mailbox

Phishing, spear phishing, spam, notifications, newsletters… our AI is trained to
extract the content of emails and categorize them according to two criteria:
their legitimacy and their productivity. All you have to do is to set the level
of filtering you want for your organization and let our technology work for you.

Activate the authentication request, an additional security barrier

Allow your contacts to declare themselves as legitimate and offer yourself the
guarantee of a mailbox free of any unwanted communication. As a bonus, you
communicate to your ecosystem your cybersecurity approach and your involvement
in securing data that is sent by email, and you encourage them to join the
movement!

DEEP LEARNING


DEEP LEARNING BY MAILINBLACK

Our Deep Learning model is based on a principle of automatic extraction of email
characteristics

It classifies them into different categories and identifies if they are
legitimate and productive. Mailinblack’s proprietary artificial intelligence has
the ability to detect phishing and spear phishing attempts, spam, unwanted
notifications and newsletters and adapts to each user’s choice of which emails
to receive or not.

Our team of data scientists scans new forms of threats on a daily basis

 She analyzes the behavior of the 5 billion emails that converge each year
through Mailinblack’s French servers to continuously improve our predictive
technologies and ensure effective email protection.


Your benefits


6 GOOD REASONS TO ENTRUST YOUR MAIL PROTECTION TO MAILINBLACK


SECURE YOUR DATA WITH THE HIGHEST STANDARDS



All our data is hosted in France, on HDS certified infrastructures, and our
processing is 100% compliant with the GDPR.




PROTECT YOURSELF FROM CYBER ATTACKS



Our AI works for you continuously and scans the content of your emails, as well
as links and attachments.




REDUCE THE STRESS LEVEL OF YOUR TEAMS



Your employees stay focused on the essentials with email filtering and sender
authentication.




DEMAND A SEAMLESS IMPLEMENTATION



The Protect solution is compatible with all messaging systems and hosting
providers on the market, and is designed to adapt to your organization.




ACTIVATE OUR SECURITY FILTERS IN LESS THAN AN HOUR



Our team will assist you in the remote implementation of Protect, for a
guaranteed activation in less than an hour.




REACH OUR SUPPORT UNLIMITED



Our support team based in France will answer you by email, phone or chat,
unlimited.




SECURE YOUR DATA WITH THE HIGHEST STANDARDS



All our data is hosted in France, on HDS certified infrastructures, and our
processing is 100% compliant with the GDPR.




PROTECT YOURSELF FROM CYBER ATTACKS



Our AI works for you continuously and scans the content of your emails, as well
as links and attachments.




REDUCE THE STRESS LEVEL OF YOUR TEAMS



Your employees stay focused on the essentials with email filtering and sender
authentication.




DEMAND A SEAMLESS IMPLEMENTATION



The Protect solution is compatible with all messaging systems and hosting
providers on the market, and is designed to adapt to your organization.




ACTIVATE OUR SECURITY FILTERS IN LESS THAN AN HOUR



Our team will assist you in the remote implementation of Protect, for a
guaranteed activation in less than an hour.




REACH OUR SUPPORT UNLIMITED



Our support team based in France will answer you by email, phone or chat,
unlimited.



Your INTERFACE


CUSTOMIZABLE SECURITY SETTINGS AND FULL CONTROL FOR THE ADMINISTRATOR

Protect is a turnkey solution that does not require any setup configuration

Activate Protect filters and ensure effective email protection… You can control
your email flow at any time, manage your security settings and your users’
rights, or even customize your authentication request from your interface.

Keep control of your organization from your administrator interface

As a Protect administrator, you keep control of your organization’s parameters:
definition of filtering parameters, categorization of emails based on keywords,
SPF verification, exclusion of IP addresses, creation of rules, setting up of
alerts… You have the power to design the solution that suits you.

Your issues


WE OFFER YOU A CUSTOM-MADE INSTALLATION ADAPTED TO YOUR NEEDS

TPE
SME
ETI
Health care facility
Public Administration
TPE


SECURE YOUR COMPANY'S MAILBOXES WITH EASE

With Protect, activate a protection of your emails without changing the habits
of your employees.

 * Filter emails before they are received, without losing track of them: with
   Protect, no email is deleted
 * Unpollute your mailboxes and avoid unnecessary solicitations and spam
 * Save time on a daily basis, without changing your work habits: Protect works
   for you, not the other way around!


SME


REDUCE YOUR EMAIL VOLUME BY 70% AND FOCUS ON THE ESSENTIALS

Protect secures your mailbox and increases the efficiency of your organization.

 * Save time managing spam and unwanted solicitations and reduce your email
   volume by an average of 70%.
 * Empower your employees and help them focus on the essentials
 * Secure your entire information system with our anti-spam and anti-virus
   solution
 * Adopt a robust technology to be sure you are not mistaken


ETI


KEEP YOUR ORGANIZATION UP TO DATE WITH OUR CYBERSECURITY SOLUTIONS

Protect keeps your email and your organization safe.

 * Fight phishing and identity theft on a massive scale
 * Implement an innovative product and access our shared roadmap to track our
   latest innovations in real time
 * Control your data and ensure business continuity
 * Customize Protect with our custom development offer


Health care facility


ADOPT A CERTIFIED SOLUTION THAT MEETS YOUR REQUIREMENTS

Mailinblack has the Health Data Hosting (HDS) certification.

 * Choose a French solution 100% GDPR compliant
 * Benefit from the highest level of support and immediate answers to your
   questions at our support
 * Secure your establishment and empower your users without incurring liability
 * Choose Mailinblack and our expertise recognized by health institutions


Public Administration


CHOOSE A FRENCH SOLUTION TO SECURE YOUR AGENTS' MESSAGING

Based in Marseille, Mailinblack is a 100% French company, from design,
development and hosting to technical support.

 * Reduce the number of requests and secure your messaging with a unique
   solution
 * Adopt a solution 100% compliant with the requirements of GDPR
 * Benefit from a personalized and reactive support


testimonials


THEY HAVE SECURED THEIR EMAIL WITH PROTECT

CH de la Candélie
The Protect solution fully meets our expectations, with a reduced workload since
we no longer have to go through our spam. As for the cost, if we weigh up the
risk of not filtering against the time spent by a technician managing spam, it
is not even debatable.
Patrice Bourdon
Head of IS and Organisation
Conseil Départemental du Gard
We receive an average of 300,000 messages per month, of which more than 50% are
spam. Thanks to the Protect solution, users do not have to deal with all these
unwanted messages. This protection has become essential for agents, especially
as email is one of the most used tools in daily life!
Mathieu MOLINA
IT
Office du tourisme de Fréjus
We are very satisfied with Mailinblack's offer, particularly in this period of
increased cyber attacks. This season is impacted by the Covid-19 crisis, we want
to be vigilant and protect our equipment as much as possible. We are starting
the season very late and knowing that we are protected by Mailinblack is very
reassuring.
Nathalie COURRÈGE
Director
Mairie de Colombes
Efficient and simple! 223,000 spam messages stopped and 4,000 viruses blocked.
Mailinblack protects us from a large number of email attacks. I clearly
recommend the use of Protect!
Nicolas Antoine
DSI
Grand Port Maritime de Marseille
Mailinblack offers a simple and intuitive service which, thanks to sender
authentication, enables us to protect ourselves from large volumes of spam and
to work in complete security.
Michel COLONNA
Operations Officer
CHU Martinique
Mailinblack gives us real extra security. The latest attacks on the hospital
have been stopped and quarantined by Protect and the staff mailbox is now sorted
and clean. We work more serenely while ensuring constant monitoring of our IT
system.
Gérald GALIM
RSSI

References


MORE THAN 18,000 ORGANIZATIONS TRUST US FOR THEIR EMAIL PROTECTION


The Protect solution


SECURE YOUR MAILBOXES WITH PROTECT


Demo


PROTECT YOUR EMAILS

Choose the Protect solution from Mailinblack, the French expert in cybersecurity
for 20 years.

Request a demo


FAQ


WHY CHOOSE A MAILBOX PROTECTION SOLUTION?


WHAT TYPES OF CYBER ATTACKS CAN A COMPANY FACE?



A company can face many cyber attacks among which phishing, and its variant,
spearphishing, ransomware or even malware, spyware… It is important to note that
the majority of these cyber attacks go through emails, or in other words,
through spam.


WHY DO I RECEIVE A LOT OF SPAM?



Do you, or your company’s employees, receive a lot of spam, often from
advertising and/or phishing attempts? This is probably due to the fact that your
email address is on address lists owned by unscrupulous companies, obtained
through data leaks. These senders are usually based on the same lists, which
explains why, even if you block one of them, you still receive many unwanted and
potentially dangerous emails.


WHO SENDS SPAM?



Spam, or unwanted email, is sent by malicious companies that have obtained your
email address without your consent. This can be due to a data leak from a
software or service you are using, or it can simply be due to a sale of your
email address which will result in unwanted, advertising and, sometimes,
dangerous messages being sent to your inbox.


HOW TO PROTECT YOUR MAILBOX FROM SPAM?



To protect your email from spam, you can adopt Protect, the email protection
solution by Mailinblack. In addition to saving your employees time by filtering
spam, it also prevents the majority of cyber attacks such as phishing,
spearphishing or ransomware that often pass through email.


HOW CAN I EFFECTIVELY PROTECT MY EMAILS AGAINST SPAM AND VIRUSES?



The best way to effectively protect your emails from spam and viruses is to use
a reliable email protection solution like Protect by Mailinblack. You can also
avoid clicking on suspicious links or downloading unknown attachments and keep
your email software up-to-date.


WHAT ARE THE BEST SPAM FILTERING TOOLS TO PROTECT MY MAILBOX?



There are many effective spam filtering tools, or email protection solutions.
Protect is one of them and is edited by Mailinblack, a French cybersecurity
company since 20 years, which currently protects more than 18.000 customers.


HOW CAN I MAKE SURE THAT MY CONFIDENTIAL E-MAILS DO NOT FALL INTO THE WRONG
HANDS?



To ensure that your confidential emails do not fall into the wrong hands, it is
recommended to use an end-to-end encryption solution. It is also important to
maintain a strong password, change it very regularly and never share your login
information with anyone.


HOW TO MANAGE BUSINESS EMAIL SECURITY RISKS, ESPECIALLY FOR COMPANIES?



To manage business email security risks, companies can implement a clear and
well-communicated security policy, regularly train their staff on data security,
use email protection tools, and perform regular security audits to detect
potential vulnerabilities and risks.


HOW TO MANAGE BUSINESS EMAIL SECURITY RISKS, ESPECIALLY FOR COMPANIES WITH
REMOTE OR TRAVELING USERS?



To manage business email security risks for remote or traveling users,
organizations can implement a strict security policy for mobile device use, use
an enterprise mobility management solution to manage mobile devices and a VPN
solution to secure remote connections, but also perform regular security audits
to detect potential vulnerabilities and risks.

Cybersecurity


DISCOVER OUR AWARENESS AND CYBERSECURITY TRAINING SOLUTIONS

Cyber Coach

Simulate cyberattacks to raise the cyberculture level of your teams

Read more

Cyber Academy

Train your employees effectively and permanently in cybersecurity

Read more


We take care of the protection of your emails

Request a demo

Protect
Cyber Coach
Cyber Academy
 * Solutions
 * Anti spam
 * Anti malware
 * Anti ransomware
 * Anti phishing
 * Anti spearphishing
 * Right to disconnect
 * Audit of human vulnerabilities
 * Phishing simulation
 * Ransomware simulation
 * Cyber attacks simulation

 * Mailinblack
 * News
 * About us
 * Partners
 * User area
 * Partners Area

 * Contact
 * Jobs
 * Request a demo
 * Request a quote
 * Contact us
 * Open a support ticket



French publisher based in Marseille, Mailinblack has been designing simple and
accessible cybersecurity solutions for 20 years, dedicated to companies,
healthcare institutions and public administrations.



LinkedIn Twitter
Youtube Facebook
Subscribe to our newsletter
CustomersResellersOthers

Email*




©2023 Mailinblack Privacy policy GCUM Legal notice Cookies Sitemap