Cofense Logo - Email Security Solutions

Automatisieren Sie Ihre Phishing-E-Mail-Analyse

Cofense Triage™ beschleunigt die Identifizierung und Abwehr von Phishing-E-Mails


Verbessern Sie Ihre Reaktionszeit mit Integration und Automatisierung. Wir verwenden Regeln von Cofense Intelligence™ und eine branchenführende Spam-Engine, um Bedrohungen automatisch zu identifizieren und zu analysieren. Und mit unserem robusten Lese-/Schreib-API können Sie intelligenten Phishing-Schutz in Ihren Arbeitsablauf integrieren, damit sich Ihr Team auf den Schutz Ihrer Organisation konzentrieren kann.

End-to-End Email Security Built to Stop Threats.

Defend your organization with our complete suite of email security solutions.

Identify - Find The Phish That Bypass Your SEG
A screenshot of Cofense Reporter interface highlighting key features.
Detect - Training for Your Team
Cofense Triage incident response and threat detection tool highlight

Rüsten Sie sich für die sich ständig weiterentwickelnden Bedrohungen

Unsere Threat Intelligence- und Research-Teams aktualisieren ständig unsere Bibliothek mit YARA-Regeln, sodass Sie neue Kampagnen leichter erkennen und die Reaktionszeit verbessern können. Und mit dem Cofense Triage Community Exchange können Sie die Analyse von Phishing-E-Mails und Bedrohungsdaten gemeinsam nutzen, sodass Sie nie auf sich allein gestellt sind.

Fully Automated

Reduce dwell time

Red gear icon representing Email Security technology

Smart technology and human infused workflow

Red search icon for Cofense search functionality

Measure and improve end user resiliency

Read Cofense reviews on TrustRadius

What Our Customers Say

“Cofense Triage is an amazing tool for SOC Analysts. It makes the process of analyzing an email so much easier.”
- IT Analyst
Triage is an amazing tool to increase the cyber security defense within the business.
- Information Technology Analyst
All enterprise organization who are trying to correlate emails that are missed by the SEGs should use this system.
- Director, Computer & Network Security
Cofense Triage must be the product in organizations where data is key and important.
- Analyst, Cybersecurity
Previous slide
Next slide

Additional Resources

Frequently Asked Questions

Effective phishing defense is a combination of advanced technology and well-trained end users who act as human sensors when a phishing email turns up in an inbox. A comprehensive platform for phishing defense can detect and stop attacks to a business network in a matter of minutes. While many companies rely on perimeter security technology from Microsoft, Proofpoint, Mimecast and others, phishing threat actors know how to circumvent these controls to get malicious email in front of employees. It only takes one employee to click a link that can result in credential theft, a ransomware attack or other types of serious compromise. Trained humans catching and reporting phish are a critical complement to sound phishing defense.

Cofense Triage prioritizes and remediates phishing threats quickly and efficiently. This SaaS product assists security operations teams by prioritizing suspicious emails reported by users. It automates analysis to help speed remediation. As soon as a suspicious email is reported, thousands of intelligence-driven YARA rules automatically assess the report, clustering it with reports containing similar payloads, and uncovering the highest priority threats for immediate action. Cofense Triage includes powerful tools for a 360-degree view of phishing emails – headers, URLs, attachments, and a powerful hex viewer. With available third-party integrations, analysts can assess a wide array of threat intelligence to determine the exact nature of the attack.

Automated threat intelligence boosts phishing defense by harnessing and directing otherwise manual tasks to stop attacks quickly and efficiently. With automated threat intelligence, phishing attacks can be disrupted as they unfold, freeing time and resources for other strategic efforts.


We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on as a development site.