IRONSCALES Features
Diagnostics (3)
Account Overview
Dashboard of registered domains.
DMARC Alignment
Status of DMARC compliance across domains.
Analytics
Additional reporting on account activity, history, and performance.
Compliance (4)
Policy Configuration
Settings for establishing and modifying DMARC enforcement within domains.
Alerts
Notifications for compliance issues or potential fraudulent email activity.
Inbound Emails
DMARC alignment on inbound emails.
Outbound Emails
DMARC alignment on outbound emails.
Protection (7)
Threat Identifications
Timely identification of fraudlent emails.
Threat Interception
Blocking fraudlent emails from reaching destination.
Threat Removal
Eliminating or deleting fraudulent emails and containing threats.
Integrations
Integrations with security tools related to threat identification and removal.
Targeted Attack Prevention
Analyzes historical email data, identifies at-risk individuals, then detects and blocks targeted spam emails.
Policy Enforcement
Allows administrators to set policies for security and governance.
Spam Filtering
Prevents spam emails containing phishing links, suspicious URLs, and malicous attatchments from reaching a user's inbox.
Administration (12)
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Clients
Supports secure implementation with popular email applications and clients.
Role-Based Rules
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Risk-scoring
Calculates risk based on user behavior, baselines, and improvements.
Customization
Customizable solution so administers can adjust content to industry, position, etc.
White-Labeling
Allows users to implement their own branding throughout the platform.
Reporting
Provides analytics tools that reveal important business metrics and track progress.
AI-generated Content
Uses generative AI to create training scenarios, deepfake simulations, or tailored modules.
Maintenance (4)
Auditing
Access pre-built and custom reports to monitor user activity and storage.
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Archiving
Archives conversations, files, and other communications for future reference
Security (5)
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
Quarantine
Isolates potentially malicious content and files before they can gain network access
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Detection (3)
Data Exfiltration Detection
Alerts administrators and other related parties about the unauthorized movement or release of company information.
Activity Monitoring
Monitors user email activity, documents behaviors for baselining and anomaly detection.
Real-Time Detection
Constantly monitors system to detect anomalies in real time.
Assessment (3)
Continuous Assessment
The abillity to automate assessment or have assesments scheduled and delivered continuously.
Phishing Assessment
Sends users phishing emails, voicemails, messages through SMS, Slack, Teams, etc. to test user's threat-identification abilities.
Baselining
Assess current state of user security training, prior to training, which can be used to track performance and improvement.
Training (3)
Content Library
Provides users with a pre-built library of useable security-related informational content.
Interactive Training
Engages users through content in the form of interactive applications, games, and modules.
Gamification
Contains gamification tools, including but not limited to badges, leaderboards, and point scoring.
Agentic AI - Email Anti-spam Features (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Intelligent Email Protection (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience





