New Features with Guardz: Enhancing Email Security, Data Protection, and More

Screenshot of the Guardz interface with a purple background. Two sections: Manage Global Block List warns about blocking email senders for enhanced Email Security; Manage Global Allow List advises caution as excluding a sender from future scanning may affect Data Protection. Each section includes an info icon.

As we strive to ensure that Guardz is solving the most pressing challenges within the ever-evolving security landscape, we listen closely to our partners and are proud to announce the latest product updates implemented over the past few weeks.


Check out what’s in store:

Email Quarantine

Manually managing every email issue that comes into your organization requires a considerable amount of effort to differentiate between legitimate emails and those that could potentially compromise your systems, and the consequences of a single misstep can be devastating.

With our new Email Quarantine feature, you no longer have to worry about manually sifting through issues, and you can now manage your email security risk at scale. The automated quarantine capability keeps employee inboxes safe while giving them an opportunity to manually review when required. Since emails are automatically deleted after 30 days, no further action is required by the employee or admin.

Data Protection – Google & Microsoft

Google Drive, along with Microsoft SharePoint and OneDrive, grant users the remarkable capacity and ease to collaborate on documents, presentations, and essential business content, but what potential risks come with these functionalities? If a user intentionally or unintentionally shares a document with external users or via a public link, hackers can exploit these security gaps to exfiltrate valuable data, compromising the organization’s privacy and security.

With the newly launched data protection for cloud applications, we now automatically and regularly scan the permissions of every file and folder across your entire organization. When assets are shared with external/guest users or even exposed via a public link, Guardz alerts the admins and enables visibility over the exposed assets.

Once an admin identifies data exposure that needs to be resolved, remediation actions are given to do so automatically and manually as required.

Table Views & Bulk Actions

As the number of issues increases, it can be difficult to keep track of common threats and ensure that each issue is resolved in a timely and effective manner. That’s why we developed the Table Views & Bulk Actions – to provide a more efficient and streamlined approach for managing issues at scale.

When a table view is selected, the columns dynamically adjust to display the most relevant information for admins at-a-glance, allowing them to search, sort, and filter the data accordingly. For instance, if you have a use case to review all email issues originating from a specific sender or sent to a particular recipient, simply apply the Email View and filter by the relevant field. Similarly, if you need to see all data exposure associated with a specific owner, apply the DLP View and search for the relevant user.

Moreover, bulk actions allow you to review and remediate multiple issues concurrently. By leveraging the multi-select functionality, an admin can ignore or resolve any issues with just a few clicks.

Email Block/Allow Lists

Previously, Senders and Domains could only be added to the block/allow lists via issue remediation. With this product improvement, an admin can proactively add an email address or domain to these lists via manual entry.

Frequency of External Surface Scan

Previously, external scans were conducted quarterly for premium account holders in order to detect any changes in their external security posture. We improved this functionality so that when remediation occurs, scans are initiated to validate any remediations and guarantee a continuously healthy external posture. This enhanced feature ensures that our premium account holders have the most comprehensive and up-to-date security measures in place to protect their valuable assets.


We can’t wait for you to get your hands on the new updates. Be sure to keep your eyes peeled for more updates to come.

Categories:

Subscribe to
Our Newsletter.

A person sits in a futuristic control room, resembling an archive, with large screens displaying stars and planets, suggesting space. The background features abstract mountain outlines under a pale sky with a moon.

Guardz, Cybersecurity
Co-Pilot for MSPs

Demonstrate the value you bring to the table as an MSP and gain visibility into your clients’ external postures.
Holistic Protection.
Hassle-Free.
Cost-Effective.

Guide to Boosting Your Email Security

Discover the Power of Cybersecurity for Your MSP Growth.

Dive into the crucial e-mail security protocols (SPF, DKIM, DMARC) to enhance your e-mail protection and make sure your e-mails are delivered in the inbox of your recipients instead of the spam or quarantine folder.

This guide provides you with innovative strategies and expert insights to elevate your MSP business, strengthen client trust, and stay ahead of ever-evolving threats.

A silhouetted astronaut figure stands in an open door frame, like an exit popup against the cosmos, facing a starry sky with a distant planet in view, contrasting with a plain, stark interior.
Graphic showing several yellow envelopes with letters, one red envelope marked by a red exclamation triangle, on a purple background with circuit lines. Green shield icons are on some envelopes, indicating security against cyber risks.

Guide to Boosting Your Email Security

Discover the Power of Cybersecurity for Your MSP Growth.

Dive into the crucial e-mail security protocols (SPF, DKIM, DMARC) to enhance your e-mail protection and make sure your e-mails are delivered in the inbox of your recipients instead of the spam or quarantine folder.

This guide provides you with innovative strategies and expert insights to elevate your MSP business, strengthen client trust, and stay ahead of ever-evolving threats.

Illustration of yellow envelopes with documents against a purple backdrop. Red warning icons with exclamation marks suggest potential cyber risks. Circuit-like lines enhance the background, reminiscent of a Cyber Risk Prospecting Report alert.
Illustration of yellow envelopes on a purple background, with two red envelopes marked by exclamation points, indicating cyber risk warnings. Green shield icons adorn some envelopes, while a radar-like pattern enhances the sense of alertness in the background.