Skip to content
Higher Education Security

Your email gateway
wasn't built
for this.

72% of student fraud starts outside email — in DMs, marketplace listings, fake job boards, and texts. suss. is browser-level protection that covers the surfaces your existing stack can't see. Deploys campus-wide in under 5 minutes.

Works with your existing infrastructure

Chrome EnterpriseGoogle Admin ConsoleMicrosoft IntuneJamf ProAzure ADOkta SSO

Real scams.
Real interceptions.

These are actual attack patterns from our campus threat library. Every one passes traditional email security. None pass suss.

Student email inbox$6,895 avg + identity theft
URGENT: Your 2026-2027 FAFSA application has been flagged for verification. You must re-verify your identity within 48 hours or your financial aid will be suspended. Click here to complete verification: studentaid-verify.com/fafsa
Your email gateway: Passes SPF/DKIM. No malicious attachment. No known bad URL.
suss. analysis
High Risk
0.89
confidence
financial aid phishing
credential harvest form
government impersonation domain

Legitimate FAFSA communications come from studentaid.gov, never a .com domain. Real financial aid offices don't threaten suspension via email.

What Monday
looks like.

For IT

Push one Chrome policy. Done.

One JSON config via Google Admin Console, Intune, or Jamf. No packages to build. No agents to install. No firewall rules. The extension deploys silently to every managed browser in your org.

Under 5 minutes
For students

Nothing. They don't do anything.

No app to install. No account to create. No training to complete. Protection is ambient — invisible when safe, clear and educational when risk is real. Students only see suss. when it matters.

Zero onboarding
For leadership

A dashboard from day one.

Real-time threat analytics. Weekly threat briefs you can forward to the provost. Incident numbers for your board report. Proof that your campus is proactively protected — not just reactive.

First report within 24 hours

Built for
procurement.

We know this has to pass your security review before anything else matters.

FERPA compliant

No student PII is stored. All scanning happens via ephemeral API calls. Text is scored and discarded.

SOC 2 Type II

Certification in progress. Security controls documented and auditable. Timeline available on request.

HECVAT ready

Pre-filled HECVAT Lite available for download. Designed for higher ed procurement from day one.

US-hosted infrastructure

All processing on Google Cloud (us-central1). No third-country transfers. No data retention.

Purpose-built
for higher ed.

Detection tuned for the threats students, faculty, and staff actually encounter — not generic consumer fraud patterns.

FAFSA & scholarship phishing

Fake portals, SSN harvest, aid diversion

Vendor invoice fraud (BEC)

Wire redirect, bank detail change, CEO impersonation

Fake internship & job postings

Task scams, money mule recruitment, advance fee

Housing deposit fraud

Fake listings, wire-before-viewing, ghost landlords

.edu credential phishing

Fake SSO portals, LMS vendor impersonation

Social engineering via DMs

Instagram, Discord, WhatsApp impersonation

Grant & research fund theft

NSF/NIH impersonation, PI credential phishing

Sextortion & blackmail

Photo threats, escalating payment demands

Attacks we've
analyzed.

We don't ask you to trust projections.

Start a 30-day pilot on one cohort. We'll show you exactly what we caught. You decide if it's worth scaling.

$12

per student per year

$0

for the 30-day pilot

5 min

to deploy campus-wide

For context: the average university spends 12 hours per phishing incident on response, investigation, and communication. At 15 incidents per month, that's 180 hours of staff time. A single BEC wire fraud averages $1.9M in losses in higher education.

Unlimited scans across all surfaces
Email, chat, marketplace, and form protection
Campus-tuned detection profile (.edu signals)
Real-time admin dashboard with threat analytics
Chrome Enterprise managed deployment
SSO / SAML integration support
Dedicated customer success manager
Quarterly threat briefings for leadership
Pre-filled HECVAT Lite documentation
Volume pricing for 10,000+ students

Before you
ask.

Those tools are excellent at catching malicious attachments and known bad URLs. suss. catches the 72% of fraud that starts as pure text — BEC wire requests, social engineering in DMs, fake job postings, marketplace scams. We're the layer that covers what email gateways structurally can't see.

Chrome Enterprise managed install means students can't remove it. But more importantly, suss. is invisible when things are safe — students don't know it's running until it catches something real. In pilot cohorts, the top feedback is "I didn't know I had this until it saved me."

Safe Browsing blocks known malicious URLs from a blocklist. suss. reads the actual content — the text of the scam message, the context of a DM, the patterns in a fake job posting. A BEC email with zero links and zero attachments sails through Safe Browsing. suss. catches it at 94% confidence.

100% detection on our 75-case segment evaluation with 0% false positives. When we're uncertain, we educate rather than block — students see an advisory, not a wall. This is tuned specifically to avoid generating help desk tickets.

Yes. No student PII is stored. All scanning happens via ephemeral API calls — text is scored and discarded. We don't log message content. SOC 2 Type II certification is in progress. All infrastructure is US-hosted on Google Cloud (us-central1).

30 days, one cohort (we recommend a dorm or specific department). You push one Chrome policy. We give you a dashboard. At the end, you get a report showing exactly what we caught. No cost, no commitment, no procurement paperwork.

Practitioner Guide

The CISO's Guide to Campus Scam Protection

6 attack types hitting universities right now. What your email gateway misses. 5-minute deployment walkthrough. ROI data for your budget request.

Read the guide
PDFdownload

See what we catch
that your stack
doesn't.

30-day pilot. One cohort. Zero cost. You get a report showing exactly what suss. intercepted on your campus. We'll let the data make the case.

Read the CISO Guide