Superior Phishing Detection

Email Protection Against the Latest Threats

Protection Against the Latest Threats

RevBits Email Security protects organizations against the latest and most effective phishing campaigns. Unmatched techniques, such as the analysis of password protected attachments, page impersonation attack detection using image analysis, and thorough domain background checks, offer the maximum protection against sophisticated and targeted attacks.

RevBits Email Security

Keep it Local

Utilize RevBits Email Security to eliminate unnecessary analysis latency and the risk of exposing emails to third party cloud-based email security providers. Blocked emails are locked in the cloud and batched, ready for manual review. With RevBits Email Security, blocked emails are transformed into non-actionable states and are displayed to the user for awareness and educational purposes.

RevBits Email Security Automatic Reports, Simplified Analysis

Automatic Reports, Simplified Analysis

Automatic and manually-reported emails are delivered to the RevBits Email Security dashboard. Reported emails are automatically dissected, parsed and analyzed, making them ready for immediate and efficient investigations. Architected for collaborative research, RevBits Email Security allows for streamlined co-operation between internal cybersecurity team members and experienced RevBits analysts.

The Ultimate Anti-Phishing Solution

RevBits Next Generation Email Security Patents

Innovation

Two U.S. patents

RevBits Email Security protects organizations against the latest and most effective phishing campaigns. Unmatched techniques, such as the analysis of password protected attachments, page impersonation attack detection using image analysis, and thorough domain background checks, offer the maximum protection against sophisticated and targeted attacks.

RevBits Email Security Software Design and Architecture

Design and Architecture

A different approach

RevBits Email Security protects organizations against the latest and most effective phishing campaigns. Unmatched techniques, such as the analysis of password protected attachments, page impersonation attack detection using image analysis, and thorough domain background checks, offer the maximum protection against sophisticated and targeted attacks.

RevBits Email Security Custom Policies and Rules

Custom Policies

Individuals & groups

RevBits Email Security protects organizations against the latest and most effective phishing campaigns. Unmatched techniques, such as the analysis of password protected attachments, page impersonation attack detection using image analysis, and thorough domain background checks, offer the maximum protection against sophisticated and targeted attacks.

RevBits Email Security Multidimensional Analysis

Risk Score

50+ algorithms

RevBits Email Security protects organizations against the latest and most effective phishing campaigns. Unmatched techniques, such as the analysis of password protected attachments, page impersonation attack detection using image analysis, and thorough domain background checks, offer the maximum protection against sophisticated and targeted attacks.

RevBits Email Security enhances Email Security Architecture

RevBits Email Security enhances email security by detecting and blocking sophisticated malicious emails that get past the outer layers of an organizations email security stack. With RevBits Email Security, organizations can protect the last point of email interaction – the employee endpoint.

Request a Demo
Datasheet

RevBits Email Security Datasheet

Phishing is one of the easiest and most effective attack vectors into an enterprise network. RevBits Email Security provides maximum and next-generation protection against phishing attacks.

Download Datasheet

Product Features

Email Security Multilayer Analysis

Multi-layer Analysis

Like a Matryoshka doll, threats hidden in multi-layered attachments, including password protected ones, are thoroughly unpacked and analyzed by RevBits Email Security.

Ease of Deployment

Ease of Deployment

RevBits Email Security does not require changes to MX settings in DNS, additional hardware installation or complex infrastructural changes.

Complementary Email Security

Complementary Security

While RevBits Email Security is able to fully replace existing email security solutions in any network, it may also operate in conjunction with them.

Intelligence Sharing

Intelligence Sharing

RevBits Email Security agents provide feedback on malicious indicators of analyzed emails to the central network server.

RevBits Email Security SIEM Integration

SIEM Integration

RevBits Email Security integrates with SIEM solutions in the network, reporting detected emails and analysis results.

RevBits Email Security API

Yara Rules

Client defined custom Yara rules may be added manually and automatically through RevBits Email Security API for accurate and bespoke detection.

Comprehensive Phishing Detection and Prevention

To prevent latency in the company’s email delivery system, current email security solutions operate on the gateway server of a company’s network and can only conduct a superficial level of analysis on each email. By operating at the endpoint, RevBits Email Security utilizes the power of the individual client machine to conduct a deep, thorough analysis without creating delays in email delivery.

Latest Blogs and Research

Walk through RevBits Endpoint Security

Why you Need a Multi-layer Approach to Email Security

Learn More
Key Cybersecurity Considerations When Onboarding New Employees

Key Cybersecurity Considerations When Onboarding New Employees

Learn More
Lookalike Login Pages Pose a Serious Cyber Risk

Lookalike Login Pages Pose a Serious Cyber Risk

Learn More
How to Stop Phishing Attacks

How to Stop Phishing Attacks

Learn More
Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays

Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays

Learn More

Contact Details

Contact RevBits

Message icon Request a Demo
RevBits Inc. Privacy Policy

This privacy policy has been compiled to better serve those who are concerned with how their 'Personally Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app?

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address or other details to help you with your experience.

When do we collect information?

We collect information from you when you register on our site, subscribe to a newsletter, respond to a survey, fill out a form, Use Live Chat or enter information on our site.

How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

You will be notified of any Privacy Policy changes:
  1. To send periodic emails regarding your order or other products and services.
  2. To follow up with them after correspondence (live chat, email or phone inquiries)
How do we protect your information?
  • We use vulnerability scanning and/or scanning to PCI standards.
  • We only provide articles and information. We never ask for credit card numbers.
  • We use regular Malware Scanning.

Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.

We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information.

All transactions are processed through a gateway provider and are not stored or processed on our servers.

Do we use 'cookies'?

Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.

We use cookies to:
  1. Understand and save user's preferences for future visits.

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.

If you turn cookies off, Some of the features that make your site experience more efficient may not function properly.It won't affect the user's experience that make your site experience more efficient and may not function properly.

Third-party disclosure

We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.

Third-party links

We do not include or offer third-party products or services on our website.

Google

Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en

We use Google AdSense Advertising on our website.

Google, as a third-party vendor, uses cookies to serve ads on our site. Google's use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.

We have implemented the following:

We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.

Opting out:

Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.

California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting Personally Identifiable Information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals or companies with whom it is being shared. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf

According to CalOPPA, we agree to the following:
  • Users can visit our site anonymously.
  • Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website.
  • Our Privacy Policy link includes the word 'Privacy' and can easily be found on the page specified above.
You will be notified of any Privacy Policy changes:
  1. On our Privacy Policy Page
Can change your personal information:
  • By emailing us
  • By calling us
  • By chatting with us or by sending us a support ticket
How does our site handle Do Not Track signals?

We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?

It's also important to note that we do not allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.

We do not specifically market to children under the age of 13 years old.
Do we let third-parties, including ad networks or plug-ins collect PII from children under 13?
Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
  1. Within 7 business days
We will notify the users via in-site notification
  1. Within 7 business days

We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:
  1. Send information, respond to inquiries, and/or other requests or questions
    1. Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.
To be in accordance with CANSPAM, we agree to the following:
  1. Not use false or misleading subjects or email addresses.
  2. Identify the message as an advertisement in some reasonable way.
  3. Include the physical address of our business or site headquarters.
  4. Monitor third-party email marketing services for compliance, if one is used.
  5. Honor opt-out/unsubscribe requests quickly.
  6. Allow users to unsubscribe by using the link at the bottom of each email.

If at any time you would like to unsubscribe from receiving future emails, you can email us atinfo@revbits.com and we will promptly remove you from ALL correspondence.

Contacting Us

If there are any questions regarding this privacy policy, you may contact us using the information below.

  • https://www.revbits.com/
  • info@revbits.com
  • (844) 473-8248

Last Edited on 2017-09-05