Tessian is a cloud-based email security platform that uses artificial intelligence (AI) and machine learning to defend against advanced email threats like business email compromise (BEC), account takeover, impersonation attacks, and data loss on email. It employs behavioral analysis to establish baselines for normal email behavior and detect anomalies that could indicate threats. It also performs content analysis on emails, attachments, images, and URLs to identify potential malicious content. Additionally, it leverages a global threat intelligence network to share indicators of compromise across its customer base. Tessian integrates natively with Microsoft 365 and Google Workspace environments to provide inbound email threat protection, outbound data loss prevention, automated incident response, and user coaching through contextual warnings.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
A project providing a low-cost ICS testbed with affordable hardware, instructions, and attacker scenarios to facilitate learning in industrial security.
A tool for analyzing Android applications in local storage with various functionalities.
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
A PowerShell script that assesses security configurations of Siemens SIMATIC PCS 7 industrial control systems by collecting and analyzing data from various Windows and PCS7-specific sources.
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.