FAQ

Frequently Asked Questions

Find answers to common questions about WaverSec Protect.

General

1

What is WaverSec Protect?

WaverSec Protect is an AI-powered email security tool that prevents misdirected emails, sensitive data leaks, and compliance violations before they're sent. It works inside your email client in real time.

2

How does WaverSec Protect work?

WaverSec Protect scans your emails as you compose them — checking recipients, content, and attachments against your organization's policies. It flags risks like wrong recipients or sensitive data before you hit send.

3

Is my email data sent to WaverSec servers?

Most core processing happens locally on your device. When optional cloud AI is enabled, only the context needed for that analysis is sent to the configured provider. WaverSec Protect is designed not to retain email content, recipients, or attachments in its application databases as normal service records. Operational data like configuration settings, API usage metrics, and optional product analytics if you enable them are still stored to run the service.

4

What email platforms are supported?

Microsoft Outlook via Office 365 Add-in is available now. Google Workspace integration is coming soon.

5

How do I install WaverSec Protect?

Installation takes minutes. Download your organization's Outlook manifest from the admin dashboard and deploy via Microsoft 365 Admin Center. Google Workspace deployment is coming soon.

6

Is WaverSec Protect GDPR compliant?

WaverSec Protect is built in the EU with GDPR compliance as a foundation. It is designed not to retain email content, recipients, or attachments in its application databases as normal service records. Configuration and usage data required to operate the service is still stored and is handled under our Privacy Policy, customer agreement, and applicable retention obligations.

Features

1

How does the advanced AI layer complement the core layers?

The core layers (Policy, DLP, and ML/NLP) provide comprehensive protection on-device and on-prem. Cloud-based AI/LLM models (third-party, tuned for WaverSec Protect) add deeper context as an additional layer under admin control.

2

How do I configure detection sensitivity?

From the admin dashboard, you can adjust severity levels for individual policies and refine detection rules. Available detection layers depend on your plan. Changes apply immediately to all users in your environment.

3

Can administrators tailor features for users?

Yes. Administrators control which detection policies are active, how scanners are configured, and how the cloud-based AI/LLM layer is used. Settings are managed per environment, allowing different configurations across teams or departments.

4

Will features work the same when Gmail is supported?

Yes. The core detection engine will be identical across both platforms. When Gmail support launches, it will provide the same policies, DLP detectors, and ML/NLP scanners. The user interface will be adapted for each email client while maintaining consistent protection.

5

How do allow lists and deny lists work?

Allow lists bypass security checks for trusted email addresses and domains. Deny lists block known threats with configurable severity levels. Both can be managed per environment through the admin dashboard.

6

What analytics and reporting are available?

WaverSec Protect stores API usage metrics to operate the service. Optional product analytics can also be enabled to help improve the product. No email content, recipients, or attachments are included in analytics data.

Detection

1

How accurate is the detection?

The Policy Engine and DLP Engine use deterministic heuristics with checksum validation to reduce false positives. ML/NLP models are tuned for high precision, and cloud-based AI/LLM analysis provides explainable reasoning for edge cases.

2

Can I customize which policies are enabled?

Yes. Administrators choose which policies are active, adjust severity levels, and set custom thresholds. Available policies, DLP detectors, scanners, and AI models depend on your plan. The Business plan includes access to all 47 policies and every detection layer.

3

Does detection slow down email composition?

No. Policy and DLP run on-device and ML/NLP runs on-prem with sub-second latency. Analysis happens in real-time as you type, not when you click send.

4

What's the difference between the Policy Engine and ML/NLP layer?

The Policy Engine uses deterministic heuristics—explicit patterns that either match or don't. ML/NLP models analyze context and meaning, catching subtle mismatches (like discussing "Project Alpha" while emailing "Project Beta" team members) that heuristics can't detect.

5

What happens when the AI/LLM layer detects something?

When used, cloud-based AI/LLM models (third-party, tuned for WaverSec Protect) provide deeper contextual reasoning for ambiguous cases. Results appear in the warning panel with clear explanations under admin control.

6

What data does each layer analyze?

Each layer focuses on different aspects of your email. The Policy Engine checks recipient patterns and metadata. DLP scans content for PII and financial data. ML/NLP analyzes subject and body for entity and topic matching. Cloud-based AI/LLM models provide semantic understanding across all available context.

Integrations

1

What Microsoft 365 plans are supported?

WaverSec Protect works with all Microsoft 365 Business and Enterprise plans that support Office Add-ins. This includes Business Basic, Business Standard, Business Premium, E3, E5, and F1/F3 frontline worker plans.

2

What Google Workspace editions are compatible?

Google Workspace support is coming soon. We will share compatibility updates as it becomes available.

3

How long does deployment take?

From downloading your manifest to having protection active takes minutes. Centralized Deployment through Microsoft 365 Admin Center automatically pushes the add-in to all users—no individual installation needed.

4

What enforcement modes are available?

Choose the manifest enforcement mode per domain: Taskpane Only, Prompt User (warn before send), Soft Block (warn with override), or Block (prevent send). Each mode controls how the add-in responds to detected risks.

5

Do users need to install anything?

No. With Centralized Deployment, administrators push the add-in to users automatically. The protection appears in their email client without any action required from end users.

6

Can I deploy to specific users or groups first?

Yes. Microsoft 365 Centralized Deployment supports user, group, and organization-wide targeting. You can pilot with a small group before rolling out to your entire organization.

7

What happens if users uninstall the add-in?

With Centralized Deployment, administrators control the add-in. Users cannot remove protection deployed by their organization. If needed, administrators can remove or reassign the add-in through the admin center.

Privacy

1

Is my email data sent to WaverSec servers?

Core policy and DLP checks run on-device. Additional scanners can run in the customer environment, and optional cloud AI can be enabled for deeper analysis. WaverSec Protect is designed so message bodies, recipient lists, and attachment files are not retained in its application databases as normal service records.

2

Do you store attachments?

WaverSec Protect is designed not to keep attachment files in its application databases as part of normal operation. The service still stores operational data such as accounts, configuration, usage records, and billing references.

3

Where is data processed?

Policy and DLP engines run locally on the device. Additional scanners can run in the customer environment. Optional cloud AI features are separate and customer-controlled. Operational account, config, usage, and billing data are retained to run the service.

4

Is advanced AI an additional layer?

Yes. Cloud AI/LLM models are an optional additional layer under admin control. On-device policies and DLP detectors, combined with customer-side scanners, can still provide strong protection without that layer.

5

Is telemetry optional?

Landing-site analytics are presented through a consent banner where required. Optional product analytics in the admin dashboard and Outlook add-in are disabled by default and can be managed by an organization administrator through the admin dashboard's Optional product analytics setting. The Outlook add-in follows that organization setting. Operational usage and security records needed to run WaverSec Protect are still collected regardless.

6

Can I delete all my data?

Deleting your organization removes the associated configuration, usage records, and subscription links in the current service design. Account deletion removes the linked admin account as well. Some records can still be retained longer if needed for legal, tax, or security reasons.

The Problem

1

How common are misdirected emails?

Misdirected email is the #1 reported data security incident type. In Q1 2024, 18% of all 2,970 incidents reported to the UK ICO were emails sent to the wrong recipient — a 21% increase from Q1 2023.

2

Are misdirected emails really a security issue?

73% of data security incidents reported to the ICO are non-cyber — caused by human error, not hackers. Misdirected emails consistently rank as the single most common incident type, ahead of phishing and ransomware.

3

Why can't we just train employees better?

73% of employees are aware of security policies, but only 52% actually adhere to them. 54% say they make more email mistakes when busy or overwhelmed, and 38% don't fully understand their organization's email security policies.

4

Do most misdirected email incidents get caught?

No. Only 34% of outbound email incidents are formally reported — the majority go undetected. 33% of employees have sent wrong attachments and 32% have sent emails to the wrong recipient without reporting it.

5

Why not use existing DLP solutions?

Traditional DLP takes an average of 18 months to deploy and find value. Only 41% of IT security practitioners say current DLP solutions effectively prevent misdirected email data loss.

6

Isn't email security mostly about inbound threats?

66% of IT leaders admit that outbound mistakes cause more data loss than inbound attacks. Yet 47% still cite inbound threats like phishing as their primary concern — leaving outbound risk under-addressed.

7

Is the problem getting worse?

Yes. The ICO reported a 21% increase in data security incidents from Q1 2023 to Q1 2024, and misdirected email rose from 18% to 21% of all incidents between Q1 and Q4 2024. In the Netherlands, 85% of data breaches in 2024 were caused by human email errors.

8

How many employees bypass security policies?

60% of employees report using workarounds to bypass security policies. Among frequent mistake-makers, policy confusion climbs to 52%. Even though 73% of employees are aware of policies, only 52% actually adhere to them.

The Solution

1

How does WaverSec Protect fit with user training?

Training still matters. WaverSec Protect reinforces policy at compose-time, when people are under pressure and most likely to make outbound email mistakes.

2

How does WaverSec Protect fit with traditional DLP?

It can cover a large part of outbound email risk on its own, and it also fits well alongside broader DLP programs. The key difference is that WaverSec Protect adds pre-send, user-facing protection where email mistakes actually happen.

3

What data does WaverSec Protect store?

WaverSec Protect does not retain email content, recipients, or attachments. Core detection runs on-device and on-prem, and cloud AI/LLM analysis is stateless and optional for edge cases.

4

Can we start in warn mode first?

Yes. Teams can start with lighter enforcement like Taskpane only or Prompt user, then move to Soft block or Block as confidence and policy maturity increase.

5

How long does rollout take?

Rollout is designed to take minutes, not months. Download the manifest, deploy it through Microsoft 365, and start with a pilot group before expanding further.

6

What happens when something is flagged?

Users see the issue in the add-in with severity and explanation. Depending on policy, they can remove the flagged recipient or attachment, acknowledge the warning, or be blocked from sending until it is fixed.