Phish Protection by DuoCircle Features
Administration (4)
-
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
-
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Loss Prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Maintenance (3)
Auditing
Access pre-built and custom reports to monitor user activity and storage.
-
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
Archiving
Archives conversations, files, and other communications for future reference
Security (5)
-
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
-
Quarantine
Isolates potentially malicious content and files before they can gain network access
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Functionality (10)
-
Anti-Spam
Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes.
Anti-Malware
Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients.
-
Anti-Phishing
prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks.
Filtering Functionality
Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients.
Quarantine
Includes a quarantine area for users to manually inspect suspicious emails.
Outbound Email Monitoring
Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent.
Advanced Threat Intelligence/Protection
Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing.
Archiving
Offers archival email retention for compliance purposes.
Reporting
Offers standard reporting functionality.
On-prem deployment
Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations.
Agentic AI - Secure Email Gateway (1)
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Email Anti-spam Features (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Top-Rated Alternatives



