Best Cloud Email Security Solutions

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud email security solutions are secure email platforms used to prevent phishing scams that trick users into divulging privileged information. The platforms, hosted by the cloud email security vendor, also ensure emails containing links to malicious sites or trigger malware downloads are blocked before reaching the end user. Businesses use cloud email security solutions to prevent data loss and the release of privileges or credentials, and increase endpoint security by blocking malware and other web-based threats.

These tools emerged as portions of the secure email gateway market have adapted to the digital transformation and reduced the need for on-premise email security tools and appliances. There is some overlap between cloud email security tools and email anti-spam software and email encryption software, but those tools typically serve one single purpose and may be delivered in both cloud and on-premise forms.

To qualify for inclusion in the Cloud Email Security category, a product must:

Provide cloud-hosted email services
Filter fraudulent emails and phishing scams
Prevent and detect spam and other malicious email content

Best Cloud Email Security Solutions At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
83 Listings in Cloud Email Security Available
(548)4.6 out of 5
4th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Email Protection; available as an on-premise or cloud based solution; blocks unwanted, malicious, and impostor email, with granular search capabilities and visibility into all messages. Out

    Users
    • Information Security Analyst
    • IT Security Engineer
    Industries
    • Financial Services
    • Hospital & Health Care
    Market Segment
    • 66% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Email Security and Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    127
    Protection
    123
    Ease of Use
    107
    Customer Support
    85
    Security
    72
    Cons
    Email Issues
    36
    User Interface
    36
    False Positives
    34
    Outdated Interface
    34
    Complexity
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Email Security and Protection features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.1
    Anti-Phishing
    Average: 9.0
    9.3
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,855 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,697 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Email Protection; available as an on-premise or cloud based solution; blocks unwanted, malicious, and impostor email, with granular search capabilities and visibility into all messages. Out

Users
  • Information Security Analyst
  • IT Security Engineer
Industries
  • Financial Services
  • Hospital & Health Care
Market Segment
  • 66% Enterprise
  • 30% Mid-Market
Proofpoint Email Security and Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
127
Protection
123
Ease of Use
107
Customer Support
85
Security
72
Cons
Email Issues
36
User Interface
36
False Positives
34
Outdated Interface
34
Complexity
31
Proofpoint Email Security and Protection features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.1
Advanced Threat Protection (ATP)
Average: 8.8
9.1
Anti-Phishing
Average: 9.0
9.3
Quarantine
Average: 8.9
Seller Details
Company Website
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,855 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
(1,041)4.7 out of 5
2nd Easiest To Use in Cloud Email Security software
View top Consulting Services for Acronis Cyber Protect Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease f

    Users
    • Director
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 24% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Acronis Cyber Protect Cloud is a product that provides data backup and cybersecurity solutions.
    • Users like the product's user-friendly interface, seamless integration with existing systems, and its comprehensive security features including anti-ransomware and disaster recovery.
    • Users experienced issues with high pricing, especially for small businesses, occasional lags and downtime, and found the setup process and certain features to be complicated.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acronis Cyber Protect Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    250
    Backup Solutions
    191
    Security
    133
    Backup Ease
    132
    Protection
    128
    Cons
    Expensive
    52
    Slow Performance
    51
    Poor Customer Support
    50
    Backup Issues
    44
    Poor Support Services
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.0
    Anti-Phishing
    Average: 9.0
    9.0
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Company Website
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    96,424 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease f

Users
  • Director
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 24% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Acronis Cyber Protect Cloud is a product that provides data backup and cybersecurity solutions.
  • Users like the product's user-friendly interface, seamless integration with existing systems, and its comprehensive security features including anti-ransomware and disaster recovery.
  • Users experienced issues with high pricing, especially for small businesses, occasional lags and downtime, and found the setup process and certain features to be complicated.
Acronis Cyber Protect Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
250
Backup Solutions
191
Security
133
Backup Ease
132
Protection
128
Cons
Expensive
52
Slow Performance
51
Poor Customer Support
50
Backup Issues
44
Poor Support Services
40
Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.9
Advanced Threat Protection (ATP)
Average: 8.8
9.0
Anti-Phishing
Average: 9.0
9.0
Quarantine
Average: 8.9
Seller Details
Seller
Acronis
Company Website
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
96,424 Twitter followers
LinkedIn® Page
www.linkedin.com
1,982 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(289)4.5 out of 5
6th Easiest To Use in Cloud Email Security software
Save to My Lists
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.

    Users
    • Software Engineer
    • Associate Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Office 365 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    111
    Email Security
    70
    Office 365 Integration
    68
    Phishing Protection
    61
    Ease of Use
    58
    Cons
    False Positives
    38
    Expensive
    33
    Complexity
    23
    Steep Learning Curve
    21
    Configuration Difficulties
    19
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Office 365 features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.0
    Anti-Phishing
    Average: 9.0
    8.8
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,039,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.

Users
  • Software Engineer
  • Associate Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 35% Mid-Market
Microsoft Defender for Office 365 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
111
Email Security
70
Office 365 Integration
68
Phishing Protection
61
Ease of Use
58
Cons
False Positives
38
Expensive
33
Complexity
23
Steep Learning Curve
21
Configuration Difficulties
19
Microsoft Defender for Office 365 features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
9.1
Advanced Threat Protection (ATP)
Average: 8.8
9.0
Anti-Phishing
Average: 9.0
8.8
Quarantine
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,039,026 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(205)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Email Security software
Save to My Lists
Entry Level Price:Starting at $3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
    • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
    • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Security
    43
    Customer Support
    41
    Easy Setup
    31
    Protection
    30
    Cons
    Performance Issues
    19
    Improvements Needed
    11
    False Positives
    10
    Missing Features
    10
    Limited Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.3
    Anti-Phishing
    Average: 9.0
    9.1
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,941 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    407 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
  • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
  • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Security
43
Customer Support
41
Easy Setup
31
Protection
30
Cons
Performance Issues
19
Improvements Needed
11
False Positives
10
Missing Features
10
Limited Features
9
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.1
Advanced Threat Protection (ATP)
Average: 8.8
9.3
Anti-Phishing
Average: 9.0
9.1
Quarantine
Average: 8.9
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,941 Twitter followers
LinkedIn® Page
www.linkedin.com
407 employees on LinkedIn®
(296)4.4 out of 5
Optimized for quick response
15th Easiest To Use in Cloud Email Security software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 68% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    71
    Ease of Use
    63
    Security
    49
    Features
    42
    Spam Blocking
    35
    Cons
    Poor User Interface
    21
    Complexity
    19
    Configuration Difficulties
    17
    Email Issues
    16
    Navigation Difficulty
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Advanced Threat Protection (ATP)
    Average: 8.8
    8.7
    Anti-Phishing
    Average: 9.0
    9.0
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,494 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,607 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 68% Mid-Market
  • 17% Enterprise
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
71
Ease of Use
63
Security
49
Features
42
Spam Blocking
35
Cons
Poor User Interface
21
Complexity
19
Configuration Difficulties
17
Email Issues
16
Navigation Difficulty
16
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.7
Advanced Threat Protection (ATP)
Average: 8.8
8.7
Anti-Phishing
Average: 9.0
9.0
Quarantine
Average: 8.9
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,494 Twitter followers
LinkedIn® Page
www.linkedin.com
2,607 employees on LinkedIn®
(87)4.5 out of 5
10th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Of

    Users
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 66% Mid-Market
    • 17% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Impersonation Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    26
    Ease of Use
    25
    Phishing Protection
    24
    Security
    19
    Detection Efficiency
    15
    Cons
    False Positives
    18
    Limited Features
    9
    Poor Detection
    9
    Email Issues
    8
    Poor User Interface
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Impersonation Protection features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.3
    Anti-Phishing
    Average: 9.0
    9.2
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Company Website
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Of

Users
  • Systems Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 66% Mid-Market
  • 17% Small-Business
Barracuda Impersonation Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
26
Ease of Use
25
Phishing Protection
24
Security
19
Detection Efficiency
15
Cons
False Positives
18
Limited Features
9
Poor Detection
9
Email Issues
8
Poor User Interface
8
Barracuda Impersonation Protection features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
9.3
Advanced Threat Protection (ATP)
Average: 8.8
9.3
Anti-Phishing
Average: 9.0
9.2
Quarantine
Average: 8.9
Seller Details
Seller
Barracuda
Company Website
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,721 Twitter followers
LinkedIn® Page
www.linkedin.com
2,153 employees on LinkedIn®
(23)5.0 out of 5
3rd Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

    Users
    • CEO
    Industries
    • Computer & Network Security
    Market Segment
    • 87% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rotate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Security
    15
    Helpful
    9
    Protection
    7
    Deployment Ease
    6
    Cons
    Compatibility Issues
    3
    Limited Compatibility
    3
    Missing Features
    3
    Insufficient Information
    2
    Integration Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rotate features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    7.8
    Advanced Threat Protection (ATP)
    Average: 8.8
    10.0
    Anti-Phishing
    Average: 9.0
    9.5
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rotate
    Company Website
    Year Founded
    2023
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

Users
  • CEO
Industries
  • Computer & Network Security
Market Segment
  • 87% Small-Business
  • 13% Mid-Market
Rotate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Security
15
Helpful
9
Protection
7
Deployment Ease
6
Cons
Compatibility Issues
3
Limited Compatibility
3
Missing Features
3
Insufficient Information
2
Integration Issues
2
Rotate features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
7.8
Advanced Threat Protection (ATP)
Average: 8.8
10.0
Anti-Phishing
Average: 9.0
9.5
Quarantine
Average: 8.9
Seller Details
Seller
Rotate
Company Website
Year Founded
2023
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
(44)4.7 out of 5
11th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IRONSCALES is the leader in AI-powered email security protecting over 15,000 global organizations from advanced phishing threats. As the pioneer of adaptive AI, we detect and remediate attacks like bu

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 61% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IRONSCALES Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Email Security
    7
    Easy Setup
    5
    Phishing Protection
    5
    Implementation Ease
    4
    Cons
    Expensive
    2
    Inadequate Protection
    2
    Ineffective Notifications
    2
    Integration Issues
    2
    Limited Customization
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IRONSCALES features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.6
    Anti-Phishing
    Average: 9.0
    8.8
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Atlanta, Georgia
    Twitter
    @IRONSCALES
    3,575 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IRONSCALES is the leader in AI-powered email security protecting over 15,000 global organizations from advanced phishing threats. As the pioneer of adaptive AI, we detect and remediate attacks like bu

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 61% Mid-Market
  • 20% Small-Business
IRONSCALES Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Email Security
7
Easy Setup
5
Phishing Protection
5
Implementation Ease
4
Cons
Expensive
2
Inadequate Protection
2
Ineffective Notifications
2
Integration Issues
2
Limited Customization
2
IRONSCALES features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.3
Advanced Threat Protection (ATP)
Average: 8.8
9.6
Anti-Phishing
Average: 9.0
8.8
Quarantine
Average: 8.9
Seller Details
Company Website
Year Founded
2014
HQ Location
Atlanta, Georgia
Twitter
@IRONSCALES
3,575 Twitter followers
LinkedIn® Page
www.linkedin.com
142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Avanan, a Check Point Company, catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration so

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 61% Mid-Market
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avanan Cloud Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    29
    Security
    28
    Protection
    24
    Ease of Use
    18
    Phishing Protection
    18
    Cons
    Complexity
    16
    Complex Setup
    11
    Configuration Difficulties
    9
    Difficult Setup
    9
    Complex Processes
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avanan Cloud Email Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.4
    Anti-Phishing
    Average: 9.0
    9.3
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Avanan, a Check Point Company, catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration so

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 61% Mid-Market
  • 23% Enterprise
Avanan Cloud Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
29
Security
28
Protection
24
Ease of Use
18
Phishing Protection
18
Cons
Complexity
16
Complex Setup
11
Configuration Difficulties
9
Difficult Setup
9
Complex Processes
7
Avanan Cloud Email Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Advanced Threat Protection (ATP)
Average: 8.8
9.4
Anti-Phishing
Average: 9.0
9.3
Quarantine
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(28)4.3 out of 5
View top Consulting Services for Cisco Secure Email Threat Defense
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Email Security protects against ransomware, business email compromise, spoofing, and phishing.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 32% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Email Threat Defense features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.0
    Anti-Phishing
    Average: 9.0
    8.3
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Email Security protects against ransomware, business email compromise, spoofing, and phishing.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 32% Enterprise
Cisco Secure Email Threat Defense features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.7
Advanced Threat Protection (ATP)
Average: 8.8
9.0
Anti-Phishing
Average: 9.0
8.3
Quarantine
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,769 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(92)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    11
    Performance Speed
    9
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.5
    Anti-Phishing
    Average: 9.0
    9.2
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    213,181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,964 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
11
Performance Speed
9
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.3
Advanced Threat Protection (ATP)
Average: 8.8
9.5
Anti-Phishing
Average: 9.0
9.2
Quarantine
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
213,181 Twitter followers
LinkedIn® Page
www.linkedin.com
4,964 employees on LinkedIn®
Ownership
NYSE: NET
(15)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    365 Total Protection is the only solution on the market to cover all aspects of security, compliance and backup for Microsoft 365. Choose from various bundles to suit your business needs, and enjo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hornetsecurity 365 Total Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Office 365 Integration
    4
    Cloud Services
    3
    Email Security
    3
    Protection
    3
    Cybersecurity
    2
    Cons
    Backup Issues
    1
    Billing Issues
    1
    Complexity
    1
    Complex Processes
    1
    Configuration Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hornetsecurity 365 Total Protection features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Advanced Threat Protection (ATP)
    Average: 8.8
    10.0
    Anti-Phishing
    Average: 9.0
    9.3
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Hannover, DE
    Twitter
    @Hornetsecurity
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    398 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

365 Total Protection is the only solution on the market to cover all aspects of security, compliance and backup for Microsoft 365. Choose from various bundles to suit your business needs, and enjo

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 47% Mid-Market
Hornetsecurity 365 Total Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Office 365 Integration
4
Cloud Services
3
Email Security
3
Protection
3
Cybersecurity
2
Cons
Backup Issues
1
Billing Issues
1
Complexity
1
Complex Processes
1
Configuration Difficulties
1
Hornetsecurity 365 Total Protection features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.6
Advanced Threat Protection (ATP)
Average: 8.8
10.0
Anti-Phishing
Average: 9.0
9.3
Quarantine
Average: 8.9
Seller Details
Company Website
Year Founded
2007
HQ Location
Hannover, DE
Twitter
@Hornetsecurity
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
398 employees on LinkedIn®
(64)4.4 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    If managing your company's Microsoft 365 or Google Workspace email security is just one of your many responsibilities, then let Graphus help with its patented AI technologies that automate security wo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Graphus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    21
    Ease of Use
    18
    Easy Setup
    14
    Phishing Protection
    14
    Security
    11
    Cons
    Email Filtering Issues
    5
    False Positives
    5
    Needs Improvement
    5
    Slow Performance
    4
    Expensive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Graphus features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Advanced Threat Protection (ATP)
    Average: 8.8
    8.9
    Anti-Phishing
    Average: 9.0
    8.7
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,684 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,835 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

If managing your company's Microsoft 365 or Google Workspace email security is just one of your many responsibilities, then let Graphus help with its patented AI technologies that automate security wo

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 34% Mid-Market
Graphus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
21
Ease of Use
18
Easy Setup
14
Phishing Protection
14
Security
11
Cons
Email Filtering Issues
5
False Positives
5
Needs Improvement
5
Slow Performance
4
Expensive
3
Graphus features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Advanced Threat Protection (ATP)
Average: 8.8
8.9
Anti-Phishing
Average: 9.0
8.7
Quarantine
Average: 8.9
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,684 Twitter followers
LinkedIn® Page
www.linkedin.com
4,835 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Email Security.Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    13
    Email Security
    12
    Ease of Use
    8
    Protection
    8
    Phishing Protection
    7
    Cons
    Complexity
    4
    Expensive
    4
    Poor Customer Support
    4
    Difficult Setup
    3
    Email Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Email Security.Cloud features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.3
    Anti-Phishing
    Average: 9.0
    8.6
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,338 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Symantec Email Security.Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
13
Email Security
12
Ease of Use
8
Protection
8
Phishing Protection
7
Cons
Complexity
4
Expensive
4
Poor Customer Support
4
Difficult Setup
3
Email Issues
3
Symantec Email Security.Cloud features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.8
Advanced Threat Protection (ATP)
Average: 8.8
9.3
Anti-Phishing
Average: 9.0
8.6
Quarantine
Average: 8.9
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,338 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
(32)4.9 out of 5
Optimized for quick response
8th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SlashNext Integrated Cloud Email Security Slashnext Integrated Cloud Email Security enables organizations to stop 65% more targeted spear phishing, social engineering, business email compromise (B

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SlashNext Integrated Cloud Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Reliability
    1
    Simple
    1
    Time-saving
    1
    Cons
    Limited Reporting
    1
    Outdated Interface
    1
    Poor Interface Design
    1
    User Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SlashNext Integrated Cloud Email Security features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Advanced Threat Protection (ATP)
    Average: 8.8
    9.9
    Anti-Phishing
    Average: 9.0
    9.6
    Quarantine
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SlashNext
    Company Website
    Year Founded
    2017
    HQ Location
    Pleasanton, US
    Twitter
    @slashnextinc
    9,827 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    163 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SlashNext Integrated Cloud Email Security Slashnext Integrated Cloud Email Security enables organizations to stop 65% more targeted spear phishing, social engineering, business email compromise (B

Users
No information available
Industries
No information available
Market Segment
  • 44% Mid-Market
  • 38% Small-Business
SlashNext Integrated Cloud Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Reliability
1
Simple
1
Time-saving
1
Cons
Limited Reporting
1
Outdated Interface
1
Poor Interface Design
1
User Interface
1
SlashNext Integrated Cloud Email Security features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.8
Advanced Threat Protection (ATP)
Average: 8.8
9.9
Anti-Phishing
Average: 9.0
9.6
Quarantine
Average: 8.9
Seller Details
Seller
SlashNext
Company Website
Year Founded
2017
HQ Location
Pleasanton, US
Twitter
@slashnextinc
9,827 Twitter followers
LinkedIn® Page
www.linkedin.com
163 employees on LinkedIn®

Learn More About Cloud Email Security Solutions

What is Cloud Email Security Software?

Using cloud email security software, companies can protect their systems from unwanted emails or malicious email threats. Cloud email security software tools detect and quarantine unwanted emails including those containing spam and bulk emails; malware, ransomware, spyware, and other viruses in malicious links or attachments; phishing and spear-phishing attempts; C-level executive impersonation attacks; advanced targeted attacks; and more. Cloud email security software may also provide other features such as email archiving, email encryption, and data loss prevention functions for outgoing email.

Cloud email security software shares similarities with secure email gateways, which are designed to protect on-premises email. Cloud email security software, alternatively, is designed to protect cloud-based email environments and does not require on-premises hardware installations.

Key Benefits of Cloud Email Security Software

  • Offer a cloud-based, rather than on-premises, email security solution
  • Include anti-spam, anti-malware, and anti-phishing capabilities
  • Detect and quarantine suspicious emails, including links and attachments

Why Use Cloud Email Security Software?

Cloud email security software helps companies protect their cloud-based email communications. Email is one of the most commonly used points of entry hackers use to gain access to corporate systems or to trick recipients into divulging sensitive information; often, these attacks lead to information or financial losses and reputational damage. Cloud email security software protects against email-focused attacks by blocking or quarantining suspicious emails. Given many companies have migrated from on-premises to cloud-based email solutions, the tools to secure their email need to evolve to face new threats emerging every day.

In particular, cloud email security software protects against spam, malware, and phishing attacks. Malware attacks, which often originate from emails with malicious links or attachments that unsuspecting users click or open. Malware can include ransomware, spyware, or other viruses. Ransomware encrypts company files and demands a random to decrypt them. Spyware usually sits silently on company systems stealing sensitive information such as intellectual property or trade secrets. Other viruses seek to embarrass companies and can damage a company’s brand and reputation. For example, a virus that sends an email to all of the user’s contacts, would fall in this category.

Cloud email security software also protects against social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks. Phishing attacks are emails sent in bulk aiming to get employees to divulge information, such as sensitive financial information. Spear-phishing is a type of phishing that is targeted to a specific individual; in spear-phishing attacks, hackers spend time getting to know the targeted employee’s habits and preferences in order to send a personalized malicious email. The newest kind of phishing attacks are known as “impersonation attacks," which are often emails sent to company employees impersonating C-level executives which ask employees to make large financial transactions or purchases.

Additionally, companies use cloud email security software to meet regulatory compliance regarding data protection. Most notably, data loss prevention functions in cloud email security solutions help prevent data leakage on outgoing emails. For example, hacked email accounts (known as account takeover) can email out sensitive information. A less sinister example would be when a legitimate employee mistakenly sends out sensitive information such as personally identifiable information (PII), Social Security numbers, credit card numbers, and other confidential data. Additionally, when a breach occurs, reporting functions in the cloud email security software can assist IT administrators in understanding which accounts were impacted in the incident.

Who Uses Cloud Email Security Software?

All companies that use email systems, whether on-premises or cloud-based, should have an email security tool in place. Cloud email security software is used to protect cloud-based email systems. Typically, a company's IT administrators manage the deployment and monitoring of these tools. Using cloud-based solutions instead of on-premises solutions, IT administrators can save time by not patching software or hardware.

Cloud Email Security Software Features

At minimum, cloud email security software offers advanced filtering functionality and rule-based actions to prevent email-based spam, malware, viruses, and phishing attempts. Many cloud email security software providers include additional functionality including advanced threat protection, encryption, and data loss prevention tools, among others.

Anti-spam — This functionality prevents unwanted emails (bulk, mass, or other junk emails) from reaching recipients mailboxes. Filtering out spam emails can improve employee productivity, because employees are not sifting through unwanted emails.

Anti-malware — This feature prevents emails with malicious links or attachments embedded with malware (ransomware, spyware, other viruses, etc.) from reaching email recipients.

Anti-phishing — This functionality helps prevent social engineering attacks such as phishing, spear-phishing, and C-level executive impersonation attacks.

Filtering functionality — With filters, IT administrators can allow and prevent the delivery of certain kinds of emails to end users. Filters can include: approved senders, approved lists, greylists such as bulk emails that may not be malicious, blocked senders, blocklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, redirects and malicious URLs, newsletter detection, attachment size, and invalid recipients.

Rule-based actions — Using rule-based actions, the cloud email security software can automatically block, delete, route to, tag a subject, copy an administrator, and redirect emails to another email address, among other actions.

Granular search functionality — Cloud email security solutions enable IT administrators to locate specific emails using granular search functionality. Users can narrow emails down from sender, recipient, content, and many other factors.

User groups settings — With user group settings, IT administrators can easily manage users by assigning them to groups and applying group settings.

Reporting — One of the major benefits of using cloud email security software is the ability to create reports to understand unique threats over time. Many cloud email security solutions provide incident logging with granular detail, which is required for regulatory compliance. Reports often come in PDF or CSV formats.

Dashboards (administrator and end-user) — Cloud email security solutions offer dashboards for administrators to manage their company’s email security, as well as quarantine dashboard for end users to review suspicious email activity related to their user account.

Additional Cloud Email Security Features

Advanced threat protection — As email-borne threats become more sophisticated, so must the security tools needed to thwart these attacks. Many cloud email security solutions include further security tools, providing an additional layer of protection on top of standard anti-spam, anti-malware, and anti-phishing functions. Advanced threat protections often include machine learning to conduct abnormal behavioral analysis, display name spoof detection (especially regarding C-level impersonation attacks), detecting lookalike email domains that are visually confusing (such as the letters “RN" looking like the letter “M" when in lowercase. Example, “name@ernail.com" visually looks like “name@email.com"), compromised email account detection, and other anomalies.

Embedded data loss protection — While cloud email security is mostly concerned with ensuring the safety of incoming mail, some tools monitor outgoing mail, as well. Monitoring can prevent employees from sending sensitive information externally via email. Monitoring can also include things such as ensuring employees do not use profanity or other non-approved language in their emails to prevent reputational damage.

Multi-language — Some cloud email security software providers support email analysis in multiple languages and allow custom dictionaries.

Embedded encryption — Some cloud email security solutions offer embedded encryption functions, which apply encryption to a company’s outgoing emails based on specific policies.

Archiving — Some cloud email security solutions also offer archiving solutions, which are helpful for companies in regulated industries to properly store, secure, and search emails as needed.

Other Features of Cloud Email Security Solutions: Account takeover prevention, Advanced threat protection (ATP)