Powered by
Contact us


Email Spoof Test Panel

Toolbox



 

Phish Grade


The first and only automated email security posture assessment tool


Hello, I'm
ArcherHello I'm Archer, the beginning of a new generation of security robots designed to fully assist all security teams. I test email security services, determine risk, diagnose misconfigurations, and generate guidance to solve any issues.

My team of humans teach me new functions to expand my capabilities every week.
,

I safely and privately assess hundreds of
businessCommercial enterprises, MSPs, Red/ Blue teams, SOCs, use my capabilities daily to assess and tune email security controls for; security, compliance, and change control.

Cybersecurity frameworks like CMMC NIST, ISO, MITRE, etc. say to use my services to implement and test security controls as part of a continous assessment/improvement model. I am the only tool able to assess email security services overall effiectiveness to stop todays email-spread ransomware, bots, drive-by's, and worms.
es every month to validate email security protections against
cyber-threatsPhishing is today's biggest problem in cybersecurity allowing threats to spread and data-loss.

Users are tricked by emails specifically crafted to look like familar email systems and contacts. Popular phishing kits target new users or busy work environments as easy victims for ransomware.

This combined with complex infrastructure: shared cloud environments, cloud email plugins, email security updates, changing email infrastructure, and changes to DNS often cause misconfigurations that allow email-spread threats to enter businesses. Insuring these email defenses work has become mission critical.

Don't worry, I'm built to help!
.

This assessment will grade the ability to defend against phishing attacks:

     1) 
Look-a-likeLook-a-like Attack: These are emails coming from addresses that look like valid email domains but are non-existing domains or use invalid characters
attack
     2) 
BECBEC: These are emails coming from addresses that look like valid email addresses from within your company.
reply-chain, fake insider attack
     3) 
Fake-SubdomainFake-Subdomain Attack: These emails appear to come from a subdmain of a valid email domain.
attack
     4) 
DomainDomain Attack: These are emails that impersonate a valid email domain
attack
     5) 
SubdomainDomain Attack: These are emails that impersonate a valid email subdomain
attack


Enter an email address you have access to, then click test to
tryFree limitations:
Come back for limited free tests every month.

Testing daily is best practice.
a security
assessmentI test your email security controls by sending you 1 valid notification email and 9 diagnostic emails (all harmless and clearly marked) that your email system should reject completely.

If you get any of the test emails then you know you have an issue.

In this test you can see the detailed results and tips that help you understand the severity of any email security holes found and also provides guidance to correct the issue. Subscibers get unlimited testing and access to the advanced tools.
and grade fraud protections

I will only send you email as part of a test.
I do not share your email with anyone.

 

  enter an email to
grade
Enter an email address and click test
to get a report like this for your email domain
pic of grades

 







( Limited Access )








 

---ads by google---


 

---ads by google---


 

---ads by google---