Email Platform Feature List
Barracuda Incident Response for Email Protection is a cloud-native solution designed to help organizations quickly detect, investigate, and remediate email threats. It provides automated tools for identifying malicious emails, alerting security teams, and removing threats from user inboxes across supported platforms.
Capability | Description | Microsoft 365 | Google Workspace |
|---|---|---|---|
Threat Detection & Prevention | |||
Spear Phishing Detection | AI analyzes message patterns and anomalies to block targeted phishing attacks. | Yes | Yes |
BEC Protection | AI analyzes message patterns and anomalies to block Business Email Compromise. | Yes | Yes |
Conversation Hijacking Protection | AI analyzes message patterns and anomalies to block targeted Conversation Hijacking attacks. | Yes | Yes |
Scamming Detection | AI analyzes message patterns and anomalies to block scamming email attacks. | Yes | Yes |
Extortion Detection | AI analyzes message patterns and anomalies to block extortion emails. | Yes | Yes |
Employee Impersonation Detection | Flags spoofed or typosquatted emails impersonating internal staff. | Yes | Yes |
Web Service Impersonation Detection | Identifies phishing attempts mimicking services like Outlook and DocuSign. | Yes | Yes |
Zero-Day Phishing Protection | Blocks unknown phishing tactics using real-time analysis. | Yes | Yes |
Inbound Spoofing Protection | Prevents spoofed internal emails by verifying sender authenticity. | Yes | Yes |
Outbound Protection | Detections potentially malicious sent email. | Yes Supported via the ATO classifiers. See next section. | Yes |
Continuous Learning / Reporting FPs | Improves detection accuracy through feedback and retraining. | Yes | Yes |
Account Takeover Protection | |||
Suspicious Login Detection / Impossible Travel | Detects compromised accounts based on suspicious login activity. | Yes | No |
Suspicious Inbox Rule Detection | Detects compromised accounts based on suspicious new or modified inbox rules. | Yes | No |
Suspicious Email Activity - Internal Emails | Detects compromised accounts based on suspicious emails sent internally. | Yes | No |
Suspicious Email Activity - Outbound Emails | Detects compromised accounts based on suspicious emails sent externally/outbound. | Yes | No |
Account Compromise Notification | Notification capability to alert regarding potentially compromised accounts. | Yes | Yes |
Remediation of Compromised Accounts | Allows one-click removal of malicious emails from inboxes. | Via XDR integration | Via XDR integration |
After ATO clean up | Ability to clean up emails sent from compromised accounts. | Yes | Yes |
View Sign-in history | View historical login details, along with login status. | Yes | No |
View Inbox-rule history | View historical inbox rule changes. | Yes | No |
Analytics / Reporting | |||
Out of the Box Reporting | Identifies high-risk users based on role and data access. | Yes | Yes |
Exportable Reports | Allows CSV or PDR export of detection data for analysis. | Yes | Yes |
My Reports | Customize and save modified reports for future access. | Yes | Yes |
Report Scheduler | Automatically schedule reports. | Yes | Yes |
Deployment & Integration | |||
API-Based Deployment | Integrates via API for seamless protection without latency. | Yes | Yes |
Lightweight Architecture | Operates without affecting email performance or delivery. | Yes | Yes |