IRONSCALES Winter ‘26 Release

Preemptive Email Security for the Phishing 3.0 Era

A United Approach to Email Security

 Three AI Agents.
One Preemptive System. 

Phishing 3.0 is perfect impersonation at scale. Attackers use AI to research your organization, craft personalized lures, and bypass detection on the first try.
Reactive security can't keep up.

IRONSCALES Winter '26 introduces a three-agent architecture that shifts email security from reactive to preemptive, closing the gap before, during, and after the attack. Plus new outbound encryption and expanded deepfake protection that works without friction.

icon-red-teaming-agent-gradient-simple

anticipate

Red Teaming Agent

See what attackers see. Block what they'd send, before they send it.

Here's what attackers do before they send you a phishing email: they scan LinkedIn, Facebook, your press releases, your job postings, and map your vendor relationships. Our Red Teaming Agent does the exact same thing. It runs the same OSINT reconnaissance real attackers use, then generates attack simulations from what it finds.

Our Adaptive AI learns from attacks across 17,000+ organizations. Our Red Teaming Agent trains it on attacks designed for your organization. Run it on a schedule or on demand. Either way, your detection models get harder to beat before an attack ever lands in someone's inbox.

Red Teaming Agent 118k
icon-phishing-soc-agent-gradient-simple

investigate

Phishing SOC Agent

L2-level forensics in minutes. Not hours. Not "we'll get to it."

Your CEO forwards a suspicious email to the security team. Legal wants an answer by end of day. Sound familiar?

Our Phishing SOC Agent handles exactly this. It runs five parallel analysis tracks at once: verifying the sender, analyzing the body for social engineering, inspecting every link through its full redirect chain, detonating attachments across 100+ engines, and tracing the relay path end to end.

The output is a complete Security Assessment. Clear verdict, key evidence, full activity log showing every step the agent took. Ready for reporting, escalation, or that compliance review nobody wants to wait on.

Phishing SOC Agent 123k
icon-phishing-simulation-agent-gradient-simple

educate

Phishing Simulation Agent

Real reconnaissance. Real attack tactics. Real training.

Are your phishing simulations training employees on the attacks they'll actually face? Or just testing whether they can spot the obvious ones?

Our Phishing Simulation Agent pulls real intelligence about your people. LinkedIn profiles, data breach exposure, recent job changes. It builds simulations that mirror the actual tactics targeting your organization, generates personalized phishing emails in each employee's native language, and prioritizes by risk so your training budget goes where it matters most.

You review and approve one sample per employee cluster. The agent handles the rest.

Phishing Simulation Agent 123k
icon-email-encryption-gradient

new capability

Email Encryption

Inbound and outbound email risk. One platform.

If someone on your team sent sensitive data to the wrong recipient tomorrow, would your current policies catch it?

Our Adaptive AI reads the context of outbound messages and applies encryption surgically, so your team isn't choosing between over-blocking everything and hoping for the best.

Your security team gets broader risk coverage. Your compliance team gets enforceable controls they can actually point to during an audit. And sensitive data leaves your org protected by policy, not by people remembering to do the right thing.

 

Adaptive AI Encryption V2
hex-icon-blue

enhanced

Deepfake Protection Enhancements

Now with enhanced voice analysis and zero-touch enrollment.

Phishing 3.0 attacks don't stop at email. An attacker compromises an account, then joins a Teams call as that person. Our Deepfake Protection catches them there too, verifying identities in real time using both visual and voice analysis. Voice detection works independently of video, so impersonation attempts get caught even when cameras are off.

We've also eliminated enrollment friction. Your employees' protected identity profiles now build automatically from normal meeting activity. No manual uploads, no IT involvement. And while most competing tools rely solely on artifact detection, we layer behavioral and biometric analysis on top of identity verification, covering the full attack chain from email to account takeover to deepfake.

ironscales-deepfake-protection-banner-image

Stop Email Attacks.
Dead In Their Tracks.

Get better protection, simplify your operations, and empower your organization against advanced threats today.