
Overview
PERNIX uses advanced detection techniques and the latest intelligence to identify the good emails from the bad – quarantining those that present a security risk and delivering filtered, scanned emails to a user’s inbox with a traffic light banner indicating how secure the email is, and whether we’ve identified any areas of concern.
From the banner, users have the option to report an email as suspicious. This goes directly to our incident response team, who investigate fully and aim to provide a personal response to the user. The intelligence gained from these emails is fed back into the service, so we can instantly protect other users from the same attacks.
Our cloud-based mail gateway integrates seamlessly into existing mail services, such as Office 365, Exchange, and the G-suite.

Fraud and content checks
PERNIX scans every email against a series of fraud detection and content checks, to verify its legitimacy and level of risk. The checks can be grouped into three categories:
Malware
- Malware content – checks for attached or embedded malware.
- File type – checks for known bad file types.
- Active content – Microsoft Office documents and PDF files containing macros are checked for behaviour which is commonly used to stage the download of malware.
Impersonation
- Domain impersonation – is the email from the domain it appears to be from? Techniques such as substituting adjacent letters and replacing similar letters are used to make the domain look legitimate at a glance.
- Trusted source – is the email from one of the known source IPs that are registered for that domain?
- VIP spoofing – is the email from the VIP it claims to be from? The display name is often spoofed to make an email appear as if it came from a VIP known to you. Your company’s VIPs can be registered in PERNIX, so the email is flagged if it claims to be from one of them but isn’t.
- Previous email activity with sender – have you emailed this person before, or has anyone else in your company?
- Punycode (IDN) detection – has Punycode been used to make the email look like it’s from a genuine source?
- Reply redirection – will your reply go to a different email address to the one that’s displayed?
Malicious content/URLs
- Secure transfer – was the email sent over an encrypted channel?
- Domain age – has the email come from a newly-created domain? New domains are often set up to spoof legitimate domains, and to send spam.
- Spam identification – is the email spam?
- Decode short URLs – URL shorteners can be used to evade the checks performed on full URLs and disguise malicious links. PERNIX follows shortened links to check the actual destination is a genuine and trusted one.
- Encrypted archive protection – password-protected documents can’t be scanned, but sharing the document password securely with PERNIX allows our system to scan the attachment for malicious content, while keeping the content and password confidential.
These checks carry out a comprehensive assessment of each email that passes through PERNIX, ensuring all potential areas of compromise are covered.
Once the checks have been carried out, PERNIX assigns a banner to each email, and sends it to your inbox.
PERNIX banner
The PERNIX banner appears on every email you receive. It uses a simple traffic light rating system (red, amber, and green), so you can be confident of the nature of each email at a glance.
- Red – this banner provides the highest level of alert, making sure your attention is drawn to an issue that should not be ignored. If malware is attached to the email, it will be quarantined so it does not reach your inbox. You’ll still receive an email with the red banner, but we will have removed the malicious content.
- Amber – our scans have found some areas of concern, which will show as warning messages in the banner, but PERNIX has deemed the email safe enough to be sent to your inbox.
- Green – the scans haven’t found any issues, and the email appears to be legitimate.
Warning messages can be customised to suit individual business' needs.
The banner also displays three links to help you manage your emails:
- View email info – an in-depth analysis of your email, including where it came from, and a detailed explanation of any issues identified.
- View all emails – click this link to access email manager.
- Report as suspicious – if you receive an email you think may include suspicious content, click this link to send details to us, so we can investigate.
Email manager
CORVID’s email manager is a web interface where you can manage your protected emails. You can review emails you’ve received, recover deleted emails, resend emails to your inbox, and release emails that have been blocked.
Encrypted attachments are commonly used by attackers to bypass security mechanisms. You could either permit encrypted attachments and rely on users being able to identify the difference between a malicious and benign attachment, or block encrypted files, meaning sensitive information needs to be released by the IT administrator, whether they have a need to know the information or not. Neither solution is secure.
PERNIX allows you to submit passwords for encrypted files, meaning you can retain confidentiality without compromising security or needing to understand every sophisticated type of malware. Our system uses the password to automatically decrypt the file, scan it, then release it if it’s safe – all without administrators being involved, and without security being compromised.
There’s no need to remember another username and password for email manager – it’s reached via a one-time access token link, which expires after 15 minutes. If your session times out, you can request another link.
Email manager has two levels of access:
- User – users can view emails, manage document passwords, view the user guide, and access support. Users only have access to their own content.
- Domain administrator – in addition to the user permissions, domain administrators have access to the dashboard, can customise banner warnings, whitelist new and trusted domains, and access all content for associated domains.