PhishingBox
Request Demo Sign Up 14-Day Free TrialNo Credit Card Required.
Security Inbox

Identify and Eliminate Email Threats

With Security Inbox, you can identify email threat patterns faster than ever. Deploy resources where your enterprise needs them and stop wasting valuable time tracking down false positives. Security Inbox gives you a place to centralize all email threats being reported and allows you to manage your own layer of blocklists combined with PhishingBox Advanced Threat Graph (ATG) of email addresses, domain names, URLs, IP addresses, and other points of interest.

  • Intuitive Design

    Mitigate hostile phishing campaigns with ease.

  • KillPhish™ Compatible

    Seamlessly integrates with the KillPhish™ extension, taking phishing email reporting & analysis to the next level.

Phishing Simulation

Lightweight Threat Identification and Mitigation

Security Inbox bridges the gap between security training and daily threat operation management. Our endpoint software allows you to deploy and use Security lnbox quickly with any dedicated IMAP email account.

FAQ

Questions Teams Ask About Security Inbox

See how Security Inbox fits with phishing testing, what deployment looks like, and how reported threats feed remediation and simulation workflows.

Can this be purchased independently?

No. This software is included with the Phishing Simulator.

What is needed to install Security Inbox?

Nothing. Security Inbox is a lightweight, web-based email client. It can be used with most modern browsers, Chrome, Firefox, and similar browsers.

Can the system create automatic replies when end users report emails?

Yes. Automatic replies can be set up and template replies can be used by administrators to send to end users manually.

How does the system work with phishing testing?

A simulated phishing email that is sent from PhishingBox will be identified by Security Inbox and will update the NRS score within the Phishing Simulator.

How does the clone feature work?

The cloning feature removes potentially harmful elements of an email and makes a copy that can then be used within the Phishing Simulator.

Additional Resources

PhishingBox Ecosystem

This brochure provides an overview of the PhishingBox security awareness ecosystem.

Download

Business Case

This document provides an overview of the benefits of using PhishingBox's Phishing Simulator and ongoing cybersecurity training.

Download

Prevention Checklist

This document outlines controls that should be implemented to prevent or minimize phishing attacks.

Download