KillPhish Scan & Report

Pushing the endpoints edge.

Contact Sales
PhishingBox Email Threat Protection and Reporting KillPhish

Scanning & Reporting Email Threats
 

KillPhish is an advanced email threat protection add-in for Office 365. It scans known threats on Windows, Mac/iOS, Android Outlook, for Desktop, Web and Mobile. It enables reporting phishing and other type of threats. Each inbox's risk profile is unique, and KillPhish can help expose telltale signs of threats to your security.
 
Our add-in helps users learn what to look for using our email scoring method.
 
Microsoft Office 365
Microsoft Windows, Apple iOS, Android Outlook Versions Supported
 
 
KillPhish Scan & Report
 
 

KillPhish Features
 

Phishing Simulator

SEAMLESS INTEGRATION

Add-in seamlessly integrates with our Phishing Simulator to produce additional reporting with Net Reporting Scores.

Easy to Deploy

Deployment Manager

Very simple deployment using Microsoft Add-in Deployment Manager in the Microsoft Office 365 admin center.

Live Inbox Training

every email

KillPhish helps users learn what to look for using each email as a learning opportunity, combined with security awareness training.

Extending the Endpoint

New Boundaries

KillPhish pushes your endpoint protection even further and helps users better determine a real threat vs legitimate emails.

Multiple Sources

we are always looking

KillPhish gathers IP Addresses, Domains, Email Addresses, words and other likely known threat types from different sources.

Net Reporter Score™

Measure for success

With the Net Reporter Score, organizations has a simple-to-understand metric for measuring security awareness.

Frequently Asked Questions
 

KillPhish works on Microsoft/Office 365 mailboxes. It works on Outlook desktop, Outlook web app (OWA), and the Outlook app for mobile devices. 

Additional Resources
 

PhishingBox Ecosystem

This brochure provides an overview of the PhishingBox security awareness ecosystem.
Download

Business Case

This document outlines controls that should be implemented to prevent or minimize phishing attacks.
Download

Prevention Checklist

This brochure provides an overview of the Phishing Simulator.
Download