Top 8 Email Security

Microsoft Defender for Office 365Proofpoint Email ProtectionTitanHQ SpamTitanCisco Secure EmailFortinet FortiMailAvananIRONSCALESPerception Point Advanced Email Security
  1. leader badge
    Threat Explorer is one of the features that I very much like because it is a real-time report that allows you to identify, analyze, and trace security attacks.
  2. leader badge
    As a cloud-based product, it can scale well. The Phish Alarm button allows users to submit questionable emails for review and complete analysis.
  3. Buyer's Guide
    Email Security
    December 2022
    Find out what your peers are saying about Microsoft, Proofpoint, TitanHQ and others in Email Security. Updated: December 2022.
    656,862 professionals have used our research since 2012.
  4. leader badge
    The encryption feature seems to be the most useful. We didn't have a convenient option for it previously, and having the capability to encrypt from within the message nearly seamlessly is a benefit to us.
  5. leader badge
    It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. There are a lot of things that you cannot handle on the graphic interface, like message filters. For this, you need to go to a lower level where you have more power, like command line interface. So, this solution has the best of both worlds. There are not a lot of bells and whistles. It is more practical with access to most features that you can configure.
  6. Fortinet FortiMail has a lot of valuable features. It works great. It also has an antivirus feature. Support for Fortinet FortiMail was also great when my team wanted to block some geographic IPs, but couldn't figure out how to do it. The support team provided clear communication on how to resolve that issue. Another valuable feature of Fortinet FortiMail is SPAM filtering which tells you how many spammy emails you've received. Based on my current use cases, I'm happy with Fortinet FortiMail.
  7. The integration with all our existing and new applications is great.It can detect corrupted files and filters out documents with viruses.
  8. report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    656,862 professionals have used our research since 2012.
  9. The biggest benefit is that we get fewer phishing and spam emails, so using IRONSCALES has made our environment much safer. Their anti-phishing platform is absolutely fantastic. The automated AI piece is amazing, and their technical support is fantastic.
  10. The most valuable feature I have found is the speed of scanning emails.Their security engines are very effective at stopping malware and potential attacks before they reach a user's mailbox. They have the best detection engine.

Advice From The Community

Read answers to top Email Security questions. 656,862 professionals have gotten help from our community of experts.
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
Read More »
SimonClark - PeerSpot reviewer
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
12 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe Panardie - PeerSpot reviewer
Philippe PanardieThere is not a single answer. In our company, we use only company devices for… more »
3 Answers

Email Security Articles

Alex Vakulov - PeerSpot reviewer
Alex Vakulov
Editor at a tech company with 11-50 employees
Oct 31 2022
Phishing is the starting point of most cyberattacks. When sending malicious messages or creating a clone site, attackers use psychological techniques and social engineering tools, so protecting against such campaigns is not an easy task for information security professionals. To protect agains...
Read More »
Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot
Aug 21 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote! If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brie...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jul 05 2022
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.  Check them out! Trending See what your peers are discussing a...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to ...
Read More »
Stuart Berman - PeerSpot reviewer
Stuart BermanI agree with many of these observations.  A trend I noticed as a security… more »
1 Comment
Hugh - PeerSpot reviewer
Hugh
Freelance Writer – B2B Technology Marketing
Journal of Cyber Policy
On Saturday, May 8, 2021, major media outlets reported that Colonial Pipeline, whose fuel pipeline network supplies gasoline, jet fuel, and other petroleum necessities to over 50 million Americans, had suffered a ransomware attack and shut down its pipeline as a precaution. The disruption in supp...
Read More »

Email Security Topics

What are the Different Types of Email Security?

Spam Filters - Marketing emails pour into most inboxes, at best clogging them with unneeded messages and at worst providing malicious links or phishing for sensitive information. Installing a spam filter can help by directing these spam emails into a separate email box so that your main inbox does not get clogged. You can also schedule them to be deleted automatically at fixed intervals.

Antivirus Protection - Even if spam emails are filtered into a separate mailbox, you might still open them and your computer and data might be compromised. Antivirus software scans your emails for malicious content and blocks them from entering or exiting your mailbox, as necessary. As opposed to a spam filter, which just redirects the messages, antivirus protection actually finds and eliminates malicious content.

Image and Content Control - Cyber attackers can include malicious software through files and links as well as images in their phishing emails.Therefore, all of these attachments must be scanned in order to protect your computer from hackers.

Data Encryption - Email data is generally transmitted in an open format and is therefore vulnerable while in transit. Your emails, including recipients’ details and message headers, should all be encrypted so that cyber attackers cannot see the contents or details of your emails. Data encryption is one of the best ways to avoid becoming a victim of phishing scams.

What are Email Attacks?

Email is the number one tool for business communication. As flexible, reliable, and convenient as it is, it is here to stay. But despite its benefits, email can be a vector for cyberattacks that can lead to data breaches and potentially billions of dollars in losses for businesses around the world. As digital technologies progress, cyber attackers continue to find new ways to exploit vulnerabilities in email accounts.

What are the Major Ways of Stealing Email Information?

Phishing is a kind of attack in which malicious emails designed to trick readers into falling for a scam are sent. Phishing campaigns generally try to get people to reveal credentials, financial information, or other sensitive data.

Spear Phishing is a targeted kind of phishing in which attackers send emails that appear to be from a trusted sender in order to obtain sensitive data. Spear phishing, which involves researching the victims and utilizing advanced intelligence strategies and social engineering techniques, is generally more successful than conventional phishing. Fewer messages are sent out, but they are more convincing.

Whaling is a form of phishing designed to target “whales” - high-profile executives - and manipulate them into authorizing high-value wire transfers to the cyber attacker. Instead of trying to get users to click on links in order to infect their computers with malware, whaling uses email and website spoofing and social engineering to trick users into disclosing sensitive information.

In a business email compromise (BEC) attack, a threat actor accesses a corporate email account and sends fraudulent emails from it in order to steal money from the company’s customers, employees, or partners.

Malware refers to malicious software designed to damage, disrupt, or gain unauthorized access to a computer system. Malware can encrypt or delete sensitive data, steal, hijack, or alter central computing functions, and monitor users’ activity without their knowledge or permission.

Ransomware is a kind of malware that blocks access to the computer system until a ransom is paid. It encrypts the victim’s files until the demanded payment has been made.

Unsolicited spam email - Aside from being annoying, spam may also contain malicious attachments or links and can also be a vector for other kinds of attacks, such as phishing and malware.

Computer viruses are a type of malware that replicate and spread by modifying other computer programs and inserting their own code. Computer viruses can harm hardware, destroy data, compromise sensitive information, and waste time, resources, and energy. Most computer viruses are email viruses, which are activated when a user interacts with the infected email by clicking on a link or downloading an attachment.

In zero-day attacks, a threat actor exploits a vulnerability before the developers have had a chance to release a fix for it. These attacks can result in data theft, lost productivity, system downtime, damaged company reputations, and regulatory actions.

What is Phishing?

Phishing is a cybercrime in which targets are contacted by email (or by telephone or text message) by a hacker who is posing as a legitimate institution in order to lure the victim into divulging sensitive data such as passwords or other credentials or banking or credit card details.

The information is then used to access accounts and steal identities and/or money.

Phishing is a cheap, easy, and effective means of cyber attack and is therefore the most prevalent type of cybercrime. 75% of organizations worldwide experienced a phishing attack in the year 2020.

“Phishing” can also be used as an umbrella term referring to any type of social engineering attack that takes place over email.

Common features of phishing emails include:

  • Attention-grabbing statements that seem too good to be true
  • A sense of urgency (e.g. limited-time offers or a threat that your account will be terminated unless you update your personal details immediately)
  • A hyperlink that is not what it appears to be or looks like a popular website but is slightly misspelled
  • An attachment that might contain viruses or ransomware
  • Something that seems off, out of character, or suspicious. Trust your instincts!
How Do You Stop Email Threats?

Here are some ways you can reduce the risk of email-based cyber attacks:

  • Protect your emails with end-to-end encryption to protect them against data leaks so that third parties can’t read them.
  • Use a spam filter, which will assess the origin of the message, the software used to send it, and the message’s appearance to determine if it is spam. Be aware that these filters are not 100% accurate and may sometimes block emails from legitimate sources.
  • Restrict administrator privileges.
  • Restrict the downloading of files from suspicious sources by changing your browser settings to block access to such sources.
  • Ensure that systems are secured with hard-to-guess passwords that are changed regularly. Never use the same password for more than one account.
  • If a website asks you for verification, check with the company personally before you enter any details online. The request may be legitimate but it may be a scam.
  • Before clicking on a link in an email, hover over the URL. A secure website with a valid Secure Socket Layer (SSL) certificate will begin with “https”.
  • Most banks and financial institutions will provide your account number or other personal details in their emails to let you know that they are being sent from a reliable source. Be wary of any emails that threaten to suspend your account if you do not update your personal details.
  • Educate your employees on how not to become prey to email threats.
What Percentage of Attacks Come Through Email?

90% of all cyber attacks come from email. Although 78% of people know not to click on a suspicious email, 4% of people who receive any given phishing email will click on it. This might not sound like a lot, but it means that for every 25 people you employ, one of them is likely to be scammed.

How to Tell if Your Email Account Has Been Hacked

Here are five signs that indicate your email account might have been compromised:

1. Your password has been changed - If you didn’t change your password but it is being rejected as incorrect, someone may have altered it.

2. Emails (either outgoing or incoming) that you don’t recognise - If you see emails in your sent mail folder that you don’t remember sending, a hacker may have access to your email account. You may also notice that you are receiving password reset emails from websites where hackers are trying to change your password.

3. Unexpected emails - If hackers have gained access to your email account, they may incorporate personal information they have found in your emails into messages they have penned from your bank or credit card company. If you receive a message like this and are unsure whether it is legitimate, call your bank to verify that they are really trying to get in touch with you.

4.Unfamiliar IP addresses show up on your log - If your email shows that you have logged in from an unfamiliar IP address, this is a sign that someone is accessing your account from another location.

5. Your contacts are receiving spam messages from you - If your friends are receiving spam from your email address, you may have been hacked and your personal data is at risk.

Buyer's Guide
Email Security
December 2022
Find out what your peers are saying about Microsoft, Proofpoint, TitanHQ and others in Email Security. Updated: December 2022.
656,862 professionals have used our research since 2012.