Advanced Threat Protection

GTMailPlus’ Advanced Threat Protection (ATP) adds an additional layer of protection providing advanced malware detection, utilising its Global threat intelligence network.

With its deep content inspection, the ATP solution, within our maritime email, works using behaviour based technology utilising its elastic sandbox environment to visualise and report on exactly what the malware interacts with compared to the typical signature based detection which relies upon previously known exploits.

Why is ATP needed?
Cybercrime is projected to exceed $2 trillion by 2019 and malware is the primary culprit in many of these security breaches. Today’s malware has become so sophisticated that it can detect and outsmart “next generation” security systems, including those with the latest sandbox appliances, firewalls, and IPS. Unlike those other technologies, GTMailPlus.ATP defeats the most advanced and evasive malware.
Sophisticated malware can determine whether it is on an actual user’s device, or inside an environment like a sandbox, or a virtual machine instance. Once it detects these environments it alters its behaviour and avoids detection. Deep content inspection can remain hidden while determining which malicious objects are capable of evasion techniques and then provide the appropriate input to analyse the complete range of malicious behaviour.

Product brochure

Download brochure


Deep content inspection

Designed to provide complete visibility into malware behaviour while remaining hidden.

Zero download or administration

A fully managed service controlled and operated by GTMaritime.

Global threat intelligence networ

Automatically shares with all ATP partners the malware behaviours and indicators of compromise of every malicious object that ATP has curated and analysed.

Complete system emulation

An all-encompassing intelligent environment.

Unmatched accuracy

Delivered 100% threat detection in 2017 NSS Labs’ Breach Detection Systems group test for the second year in a row, outperforming every other vendor.

Behaviour based

Can observe 100% of the actions that a malicious object might take, even when those actions are delegated to the operating system or other programs.

Detects zero day exploits

Unlike antivirus signature based tools which require testing and analysis after infection.