Definitions
Definitions #2
Personas
MEDDICC
Misc.
100

Impersonate trusted entities to trick people into sharing passwords, financial info, or sensitive data. Delivered through email and fueled by social engineering, phishing is one of the most common ways attackers breach systems and spread malware. 

What is Phishing Emails?

100

Translates URLs (names) like www.threatdown.com(opens in a new tab) to IP addresses like 192.0.66.84.

What is Domain Name Server (DNS)?

100

What’s your process for evaluating and purchasing new security solutions? 

Is there a formal RFP, or are you working with a shortlist of vendors? 

What does your timeline look like for selecting and implementing a solution? 

What is D - Decision Process?


100

Two email platofrms ThreatDown Email security supports.

What is Microsoft 365 and Google Workspace?

200

Scammers impersonate trusted figures to trick employees into sending money or sharing sensitive data, often bypassing security controls and causing financial or reputational harm.

What is Business Email Compromise (BEC)?

200

A type of DNS (Domain Name System) record that tells the internet which mail servers are responsible for receiving email for a specific domain.

What is Mail Exchange (MX) Record?

200

Role's Top of Mind:

  • Protect company’s devices, digital assets, and intellectual property 

  • Stop attacks and address potential threats before they cause harm—without increasing complexity  

  • Promptly detect hidden threats to reduce dwell time   

  • Maintain employee productivity; reduce downtime

What is User/Champion?


200

Have you experienced any recent phishing or BEC incidents that impacted the business? 

Are you seeing attacks getting through your SEG or Microsoft 365/Google Workspace native defenses? 

Is alert fatigue or limited security staffing a challenge for your team right now? 

 

What is I - Identify Pain?

200

Most common competitors that we see in Email Security opportunities.

What is Proofpoint, Mimecast, Barracuda?

300

When attackers gain access to a user’s account (often accomplished through stolen credentials or phishing). Once in, they can impersonate the user, steal data, or launch internal attacks. These threats often fly under the radar and cause serious financial and reputational damage.

What is Account Takeover (ATO)?

300

Integrates with cloud email platforms like Microsoft 365 and Google Workspace to detect threats like phising and BEC using AI and behavior anaylsis - offering quick setup and better visibility.

What is Integrated Cloud Email Security (ICES)?

300

What KPIs or metrics are you tracking around email security today (e.g., phishing incident volume, response time, user-reported threats)? 

Do you have an estimate of how much time your team spends on email threat investigation and remediation per week? 

What would reducing that time by 50% mean for your team or organization? 

What is M - Metrics?

300

ThreatDown Email Security combines _________ with human-in-the-loop insight through crowdsourced threat intelligence to stop advanced phishing, Business Email Compromise, and zero-day attacks missed by traditional solutions.

What is Adaptive AI detection?

400

A legacy email security tool that filters messages before they reach inboxes, using signatures, rules, and reputation checks. SEGs often require complete setup and ongoing maintenance.

What is Secure Email Gateway (SEG)?

400

Authentication protocols that ensure email deliverability, protect an organization’s brand, and prevent domain spoofing aimed at employees, partners, and customers.

What is Domain-based Message Authentication, Reporting & Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender Policy Framework (SPF)?

400

What are the most important capabilities you are evaluating in an email security solution? 

Are you prioritizing SEG replacement, augmentation, or integration with your existing tools like EDR/XDR? 

How important are things like automated remediation, user experience, and speed of deployment in your decision? 

What is D - Decision Criteria?