F.A.Q

Does Skales work with Google?

Yes.

Our customised gmail add-on integrates with your gmail enterprise to provide an authorised and secure layer of defence.

Does Skales work with Microsoft and/or exchange?

Yes.

Our customised Microsoft add-in integrates with your enterprise exchange to provide an authorised and secure layer of defence.

Does Skales work on mobiles?

Many enhancements are being worked on and mobile compatibility is amongst these future features.

Is Skales GDPR compliant?

Yes.

Metadata is used instead of raw data where possible, and where it is not, appropriate controls are used, such as encryption to maintain data privacy.
Speak to us further to better understand how we maintain and safeguard your data.
 

Can Skales help identify user behaviour?

Yes.

Using Skales in a SOAR model, can provide valuable information and functionality
to help defend your organisation and identify users which may require additional support from attacks. Speak with us to understand how Skales works with other products and solutions as a cyber defence force multiplier.
 

What region does the service operate from?

We offer various locations to process your data within the Cloud. When on-prem solutions are acquired (this may include customer owned cloud infrastructure), we store our appliance within your estate.
 

Can I connect Splunk or an alternative SIEM?

Yes.

Skales provides a rich API, providing valuable information for notables to trigger alerts and events.
 

Can I use Skales for TI (Threat Intelligence)?

Yes.

Skales API uses TAXII to present valuable Threat Intelligence in STIX, supporting your security team to identify malicious threats.
 

Why is skales focusing on users and not automatically deleting emails?

Working closely with two separate Universities, the technology behind Skales is strengthened by Computer Scientists and Psychologists to understand both the technical and non-technical elements of phishing attacks and current solutions.

There are many fantastic products on the market that endeavour to completely eradicate the threat of phishing, but it is a difficult task to accomplish without impacting the businesses productivity. Skales uses an organisations best asset – it’s staff.
 

How do you store the data?

Without giving away too much to the ‘nosy attacker’, we have thought about locality, data at rest, data in transit, data retention, algorithm strength, storage of keys, access permissions and more. Skales is designed to be secure. Speak with us to understand how we secure your data.
 

Is Skales secure?

Skales is an enterprise level service, fit for the financial industry and government sector. Speak to us to find out how we maintain security.
 

Is Skales a Cloud service (CaaS)?

Yes.
 
Skales is designed in a modular way, so that it is adaptable in Cloud, on-prem, and hybrid models.
 

Does Skales work on-premise?

Yes.

Skales is designed in a modular way, so that it is adaptable in Cloud, on-prem, and hybrid models.
 

Does Skales work in a hybrid-model?

Yes.

Skales is designed in a modular way, so that it is adaptable in Cloud, on-prem, and hybrid models.
 

Where are the marketing statistics sourced?

“20% of illicit emails bypass spam filters”
Source: A paper by THE RADICATI GROUP, INC. titled ‘Email Statistics Report, 2015 2019’

“The cost of lost business averaged $1.52 million.”
Source: IBM

“350,000 new malware samples discovered every day”
Source: AV Test

“80% of businesses identify phishing attacks as the most likely threat”
In the 2019 cyber security breaches surveys, 32% of businesses reported to having a cyber security breach or attack in the last 12 months. Of these, 80% reported phishing attacks were the most common type of attack.
Source: Department for Digital, Culture, Media and Sport

“30,000+ phishing sites created each day”
Source: Webroot

Have questions? We're here to help