# Best Intelligent Email Protection Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Intelligent email protection, sometimes called human-layer security, is a class of software solutions designed to prevent a company’s employees from sophisticated email-focused cyberattacks. These tools use machine learning to analyze historical records of email content, user behavior, and email-based threats, identifying risks and developing a baseline for user behavior. Intelligent email protection products filter incoming emails to detect and block potential phishing attacks, attachments containing malware, and links to potentially dangerous websites. They also filter outbound emails to detect accidental data leakage, data exfiltration, and the misuse of privileged data.

Companies use these solutions because all employees are susceptible to traditional phishing attacks, targeted spear-phishing attacks, malware, and other email-based threats. Employees can also pose a risk if they unknowingly share sensitive information in noncompliant ways. Additionally, every business is at risk for insider threats, and these products will detect abnormal activity involving sensitive data.

Some intelligent email protection tools fall into the same category as [secure email gateway](https://www.g2.com/categories/secure-email-gateway) and [cloud email security](https://www.g2.com/categories/cloud-email-security), which are also used to prevent phishing attacks and malicious emails from reaching employees. Those solutions, though, do not provide the scope of intelligent automation capabilities needed to identify anomalies and detect risky behaviors. Some overlap also exists with [email anti-spam](https://www.g2.com/categories/email-anti-spam) solutions, which have an even smaller scope of capabilities limited to blocking spam and phishing attacks.

To qualify for inclusion in the Intelligent Email Protection category, a product must:

- Filter incoming and outgoing emails
- Utilize machine learning to develop employee baseline behaviors
- Detect and block unauthorized outbound emails and incoming emails containing advanced persistent threats





## Category Overview

**Total Products under this Category:** 50


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 3,300+ Authentic Reviews
- 50+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Intelligent Email Protection Software At A Glance

- **Leader:** [Proofpoint Core Email Protection](https://www.g2.com/products/proofpoint-core-email-protection/reviews)
- **Highest Performer:** [Libraesva Email Security](https://www.g2.com/products/libraesva-email-security/reviews)
- **Easiest to Use:** [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
- **Top Trending:** [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
- **Best Free Software:** [Proofpoint Core Email Protection](https://www.g2.com/products/proofpoint-core-email-protection/reviews)


---

**Sponsored**

### Sublime Email Security Platform

Sublime’s agentic platform stops more email attacks with less work. Our AI agents work like a digital SOC team in your environment, triaging and blocking advanced threats while adapting protections at adversary speed. It provides full transparency and automation by default, with control on demand for advanced teams, eliminating vendor bottlenecks or one-size-fits-all limits. Core Outcomes (The What): - Stop More Attacks with Fewer False Positives - block sophisticated threats (BEC, novel phishing, QR-based phishing) and reduce the false positives that waste time and disrupt workflows. Our tailored protections deliver a demonstrably higher catch rate, validated by the world&#39;s most demanding security teams. - Automate the Abuse Mailbox - Our Autonomous Security Analyst (ASA) automates triage, investigation, and remediation of user-reported email, cutting MTTR from hours to seconds and freeing your SOC team to focus on the threats that matter most. - Adapt Defenses Automatically. - When a missed attack is identified, we can create new coverage in hours. Our Autonomous Detection Engineer (ADÉ) generates, backtests, and deploys org-specific coverage, eliminating vendor ticket limbo. Differentiators (The How): - A Team of Agents using AI, Not Just a Black Box - Sublime deploys a team of specialized agents - like an analyst and a detection engineer - that use AI to protect, triage, and adapt your defenses. Unlike an opaque, monolithic AI, our agentic approach provides full transparency into every action, with visible decision history, message lineage, and backtests. - Org-Specific Protection, Not One-Size-Fits-All - Our Distributed Detection Model (DDM) is the foundation of our platform. It runs per-environment coverage that adapts to the unique attacks you face, allowing us to safely deploy protections that would be noisy in global models - something centralized systems simply can’t support. This means higher day-one efficacy and fewer false positives. - Autonomous by Default, Control on Demand - By stopping more attacks and reducing false positives, Sublime delivers a superior autonomous experience that requires less work. For advanced teams, the platform is fully extensible, allowing you to author your own detections and hunt for threats with a level of precision that one-size-fits-all solutions can&#39;t. Innovative organizations including Spotify, Snowflake, Brex, Elastic, Compass, Anduril, SentinelOne, and others rely on Sublime to secure the business and keep teams focused on strategic defense. 🔗 Learn how Sublime helps security teams stop more attacks with less work at sublime.security



[Visit company website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=paid_promo&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2341&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1417082&amp;secure%5Bresource_id%5D=2341&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fintelligent-email-protection&amp;secure%5Btoken%5D=50e7ea92d9946c0a3ccbb25726bab088ac1db4fc4f009fc85643229d05dcbb95&amp;secure%5Burl%5D=https%3A%2F%2Fsublime.security%2Fproduct%2Fdefend%2F&amp;secure%5Burl_type%5D=paid_promos)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Proofpoint Core Email Protection](https://www.g2.com/products/proofpoint-core-email-protection/reviews)
  Proofpoint’s Core Email Protection (CEP) stops 99.99% of all email threats before they become compromises. It stops the broadest range of email cyberattacks, spam and graymail. For security analysts, it provides integrated search and alert-based workflows, automatically remediates user reported emails, and coaches users in-the-moment. Core Email Protection leverages Nexus language models, relationship graphs, machine learning and computer vision to stop advanced email threats. It’s powered by unparallelled email threat data from over 3 trillion emails scanned per year, to automatically stop threats like BEC, account takeovers, QR code phishing, impersonations, and lateral phishing. Customers choose how to deploy Core Email Protection, with SEG and API options available. SEG provides the highest security via defense in depth, with pre-delivery, post-delivery, and click time protection. API is a faster deployment, and augments M365 with the same detection engine to block threats, spam, and graymail.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 571

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.7/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Company Website:** https://www.proofpoint.com/us
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,141 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Information Security Analyst, IT Security Engineer
  - **Top Industries:** Financial Services, Hospital &amp; Health Care
  - **Company Size:** 66% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Protection (88 reviews)
- Email Security (81 reviews)
- Ease of Use (66 reviews)
- Effective (52 reviews)
- Security (49 reviews)

**Cons:**

- Outdated Interface (28 reviews)
- User Interface (24 reviews)
- Email Issues (23 reviews)
- Complexity (20 reviews)
- False Positives (19 reviews)

  ### 2. [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
  Check Point Harmony Email &amp; Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 465

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.3/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.1/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Email Security (94 reviews)
- Security (83 reviews)
- Protection (74 reviews)
- Ease of Use (50 reviews)
- Phishing Protection (45 reviews)

**Cons:**

- False Positives (29 reviews)
- Complexity (23 reviews)
- Complex Setup (22 reviews)
- Limited Features (18 reviews)
- Configuration Difficulties (17 reviews)

  ### 3. [Mimecast Advanced Email Security](https://www.g2.com/products/mimecast-advanced-email-security/reviews)
  Email Security, Cloud Integrated (CI) protects organizations against all forms of email-based attacks, from phishing and credential theft to ransomware and zero-day threats. This solution deploys behind M365 to collect emails after they have passed through Microsoft security, reinspect them, and take action as needed. With a setup time of just four minutes and out-of-the-box settings designed to optimize security immediately, Email Security CI delivers best-in-class efficacy in the simplest way possible. Customers get the full power of Mimecast’s AI-powered detection and threat intelligence in a solution built for the reality of navigating today’s hostile threat landscape with limited time and resources. Email Security CI also offers a fully integrated Awareness Training solution to help organizations easily and effectively reduce the risk of human error.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 313

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.5/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Mimecast](https://www.g2.com/sellers/mimecast)
- **Company Website:** https://www.mimecast.com/
- **Year Founded:** 2003
- **HQ Location:** London
- **Twitter:** @Mimecast (18,056 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/55895/ (2,467 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Legal Services, Information Technology and Services
  - **Company Size:** 68% Mid-Market, 17% Enterprise


#### Pros & Cons

**Pros:**

- Email Security (49 reviews)
- Ease of Use (44 reviews)
- Security (34 reviews)
- Features (26 reviews)
- Spam Blocking (25 reviews)

**Cons:**

- Complexity (21 reviews)
- Email Filtering Issues (17 reviews)
- Email Issues (16 reviews)
- Configuration Difficulties (15 reviews)
- False Positives (15 reviews)

  ### 4. [Abnormal AI](https://www.g2.com/products/abnormal-ai/reviews)
  Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event--detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection is available for Slack, Workday, ServiceNow, Zoom, and multiple other cloud applications. Abnormal is currently trusted by more than 3,200 organizations, including over 25% of the Fortune 500, as it continues to redefine how cybersecurity works in the age of AI. For more information, please visit abnormal.ai


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 65

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.7/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.1/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Abnormal AI](https://www.g2.com/sellers/abnormal-ai)
- **Company Website:** https://abnormal.ai
- **Year Founded:** 2018
- **HQ Location:** Las Vegas, USA
- **LinkedIn® Page:** https://www.linkedin.com/company/abnormalsecurity/ (1,465 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Manufacturing
  - **Company Size:** 51% Enterprise, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Customer Support (12 reviews)
- Easy Setup (12 reviews)
- Detection Efficiency (11 reviews)
- Email Security (11 reviews)

**Cons:**

- Email Filtering Issues (3 reviews)
- Email Issues (3 reviews)
- False Positives (3 reviews)
- Limited Reporting (3 reviews)
- Email Security (2 reviews)

  ### 5. [Hornetsecurity 365 Total Protection](https://www.g2.com/products/hornetsecurity-365-total-protection/reviews)
  365 Total Protection is the only solution on the market to cover all aspects of security, compliance and backup for Microsoft 365. Choose from various bundles to suit your business needs, and enjoy state-of-the-art email security that protects against spam, viruses, phishing and ransomware; plus email signatures and disclaimers. You can also benefit from Advanced Threat Protection (ATP) to defend your users against the most sophisticated email attacks, automated email continuity to prevent unexpected downtime and legally compliant email archiving to keep all emails safe and searchable. You can even opt for backup and recovery for endpoints and Microsoft 365 data in mailboxes, Teams, OneDrive and SharePoint. 365 Total Protection‘s tailored integration with Microsoft 365 simplifies your entire experience: from signup, to setup, to feature and user management. Its central console is a perfect blend of data privacy and ease of use, enabling you to do more and worry less.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.1/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Hornetsecurity](https://www.g2.com/sellers/hornetsecurity)
- **Company Website:** https://www.hornetsecurity.com
- **Year Founded:** 2007
- **HQ Location:** Hannover, DE
- **Twitter:** @Hornetsecurity (1,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/hornetsecurity/ (508 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 48% Small-Business, 46% Mid-Market


#### Pros & Cons

**Pros:**

- Email Security (7 reviews)
- Protection (6 reviews)
- Ease of Use (5 reviews)
- Malware Protection (5 reviews)
- Office 365 Integration (5 reviews)

**Cons:**

- User Interface (3 reviews)
- UX Improvement (3 reviews)
- Complexity (2 reviews)
- Configuration Difficulties (2 reviews)
- Difficult Setup (2 reviews)

  ### 6. [Libraesva Email Security](https://www.g2.com/products/libraesva-email-security/reviews)
  Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine that uses AI to learn the usual patterns of behavior for organizations and individuals, continuously assessing the strength of business-to-business trust and proactively holding anomalous traffic. Libraesva Email Security scans and filters all inbound and outbound emails for advanced malware, phishing, business email compromise, spam and more. Proprietary sandboxing technology removes dangerous payloads and active content from attachments, and you can protect users from visiting unsafe sites with active URL analysis that checks every link. Use Libraesva Email Security to understand the threat landscape and attacks launched against your organization, deal with security incidents faster, and see how you compare against others around the world. Easy to follow workflows make it painless to change configuration settings, and full reporting and dashboards give you full visibility of email traffic and trends so you can understand the risks and use insights to plan intelligent mitigation strategies.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 97

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Libraesva](https://www.g2.com/sellers/libraesva)
- **Company Website:** https://www.libraesva.com
- **Year Founded:** 2013
- **HQ Location:** Italy
- **Twitter:** @Libraesva (325 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/libraesva/ (44 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 47% Mid-Market, 34% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (37 reviews)
- Customer Support (32 reviews)
- Email Security (26 reviews)
- Effective (24 reviews)
- Setup Ease (17 reviews)

**Cons:**

- Complexity (8 reviews)
- Email Issues (5 reviews)
- User Interface (5 reviews)
- Access Issues (4 reviews)
- Difficult Setup (4 reviews)

  ### 7. [Microsoft Defender for Office 365](https://www.g2.com/products/microsoft-microsoft-defender-for-office-365/reviews)
  Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations from advanced threats targeting email and collaboration tools within the Microsoft 365 environment. It offers robust protection against phishing, malware, and business email compromise, ensuring secure communication and collaboration across platforms like Exchange Online, Microsoft Teams, SharePoint, and OneDrive. Key Features and Functionality: - Safe Attachments: Scans email attachments in a secure environment to detect and block malicious content before it reaches users. - Safe Links: Provides real-time protection by analyzing URLs at the time of click, safeguarding users from malicious links. - Anti-Phishing Policies: Utilizes advanced algorithms and machine learning to identify and mitigate phishing attempts, including those involving domain impersonation. - Protection for Collaboration Tools: Extends security measures to Microsoft Teams, SharePoint, and OneDrive, ensuring safe file sharing and collaboration. - Automated Investigation and Response (AIR): Automates threat investigation processes, enabling swift identification and remediation of security incidents. - Attack Simulation Training: Offers tools to simulate phishing attacks, helping organizations educate employees and strengthen their security posture. Primary Value and Problem Solved: Microsoft Defender for Office 365 addresses the critical need for advanced threat protection in today&#39;s digital workplace. By integrating seamlessly with Microsoft 365 applications, it provides a unified defense against sophisticated cyber threats, reducing the risk of data breaches and ensuring business continuity. Its comprehensive approach not only safeguards email communications but also secures collaborative platforms, enabling organizations to operate confidently in a secure environment.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 276

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 7.9/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Associate Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (9 reviews)
- Email Security (8 reviews)
- Office 365 Integration (8 reviews)
- Integrations (7 reviews)

**Cons:**

- Complexity (8 reviews)
- False Positives (6 reviews)
- Configuration Difficulties (4 reviews)
- Limited Reporting (4 reviews)
- Poor Detection (3 reviews)

  ### 8. [IRONSCALES](https://www.g2.com/products/ironscales/reviews)
  IRONSCALES is a cloud-native email security platform that helps enterprises and MSPs close gaps with mailbox-level detection, autonomous remediation, and built-in user training. It combines AI and human insights that continuously learn from user behavior, message context, and analyst feedback to identify advanced threats like BEC, account takeovers, impersonation, and other advanced phishing attacks. IRONSCALES is headquartered in Atlanta, Georgia and is proud to serve more than 17,000 customers globally. IRONSCALES leverages adaptive AI and its Agentic AI engine, Themis, to drive autonomous, mailbox-level remediation with customizable automation. Smart clustering, context-driven decisioning, and user-reported inputs enable Themis to remediate threats in real time while preserving analyst oversight and control. Designed for rapid deployment via API, IRONSCALES integrates with existing security stacks without requiring MX record changes. To reduce risk, improve SOC efficiency, and support a proactive security culture, its comprehensive capabilities also include: - Phishing Simulations - Security Awareness Training - DMARC management - Deepfake Live Protection - Generative AI tools


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 53

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.4/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [IRONSCALES](https://www.g2.com/sellers/ironscales)
- **Company Website:** https://ironscales.com
- **Year Founded:** 2014
- **HQ Location:** Atlanta, Georgia
- **Twitter:** @IRONSCALES (3,527 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5287647/ (176 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Non-Profit Organization Management
  - **Company Size:** 59% Mid-Market, 20% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Email Security (15 reviews)
- Phishing Protection (15 reviews)
- Easy Setup (13 reviews)
- Customer Support (11 reviews)

**Cons:**

- False Positives (6 reviews)
- Poor Detection (4 reviews)
- Expensive (3 reviews)
- Limited Features (3 reviews)
- Difficult Training (2 reviews)

  ### 9. [Sublime Email Security Platform](https://www.g2.com/products/sublime-email-security-platform/reviews)
  Sublime’s agentic platform stops more email attacks with less work. Our AI agents work like a digital SOC team in your environment, triaging and blocking advanced threats while adapting protections at adversary speed. It provides full transparency and automation by default, with control on demand for advanced teams, eliminating vendor bottlenecks or one-size-fits-all limits. Core Outcomes (The What): - Stop More Attacks with Fewer False Positives - block sophisticated threats (BEC, novel phishing, QR-based phishing) and reduce the false positives that waste time and disrupt workflows. Our tailored protections deliver a demonstrably higher catch rate, validated by the world&#39;s most demanding security teams. - Automate the Abuse Mailbox - Our Autonomous Security Analyst (ASA) automates triage, investigation, and remediation of user-reported email, cutting MTTR from hours to seconds and freeing your SOC team to focus on the threats that matter most. - Adapt Defenses Automatically. - When a missed attack is identified, we can create new coverage in hours. Our Autonomous Detection Engineer (ADÉ) generates, backtests, and deploys org-specific coverage, eliminating vendor ticket limbo. Differentiators (The How): - A Team of Agents using AI, Not Just a Black Box - Sublime deploys a team of specialized agents - like an analyst and a detection engineer - that use AI to protect, triage, and adapt your defenses. Unlike an opaque, monolithic AI, our agentic approach provides full transparency into every action, with visible decision history, message lineage, and backtests. - Org-Specific Protection, Not One-Size-Fits-All - Our Distributed Detection Model (DDM) is the foundation of our platform. It runs per-environment coverage that adapts to the unique attacks you face, allowing us to safely deploy protections that would be noisy in global models - something centralized systems simply can’t support. This means higher day-one efficacy and fewer false positives. - Autonomous by Default, Control on Demand - By stopping more attacks and reducing false positives, Sublime delivers a superior autonomous experience that requires less work. For advanced teams, the platform is fully extensible, allowing you to author your own detections and hunt for threats with a level of precision that one-size-fits-all solutions can&#39;t. Innovative organizations including Spotify, Snowflake, Brex, Elastic, Compass, Anduril, SentinelOne, and others rely on Sublime to secure the business and keep teams focused on strategic defense. 🔗 Learn how Sublime helps security teams stop more attacks with less work at sublime.security


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 10.0/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Sublime Security](https://www.g2.com/sellers/sublime-security)
- **Company Website:** https://sublime.security/
- **Year Founded:** 2019
- **HQ Location:** Washington, District of Columbia, United States
- **Twitter:** @sublime_sec (2,454 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sublime-security (284 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 56% Enterprise, 19% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Detection Efficiency (13 reviews)
- Easy Setup (10 reviews)
- Setup Ease (10 reviews)
- Customization (9 reviews)

**Cons:**

- Missing Features (5 reviews)
- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Limited Features (4 reviews)
- Learning Difficulty (3 reviews)

  ### 10. [Barracuda Impersonation Protection](https://www.g2.com/products/barracuda-impersonation-protection/reviews)
  Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Office 365 into a comprehensive cloud-based solution. Impersonation Protection’s unique API-based architecture lets the AI engine study historical email and learn users’ unique communication patterns. It blocks phishing attacks that harvest credentials and lead to account takeover and enables real-time remediation.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 87

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.2/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,235 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Who Uses This:** Systems Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 67% Mid-Market, 17% Small-Business


#### Pros & Cons

**Pros:**

- Phishing Protection (8 reviews)
- Ease of Use (7 reviews)
- Security (6 reviews)
- Setup Ease (6 reviews)
- Customer Support (5 reviews)

**Cons:**

- False Positives (8 reviews)
- Complexity (3 reviews)
- Inadequate Protection (3 reviews)
- UX Improvement (3 reviews)
- Configuration Difficulties (2 reviews)

  ### 11. [SlashNext Integrated Cloud Email Security](https://www.g2.com/products/slashnext-integrated-cloud-email-security/reviews)
  SlashNext Integrated Cloud Email Security Slashnext Integrated Cloud Email Security enables organizations to stop 65% more targeted spear phishing, social engineering, business email compromise (BEC), and other malicious digital user attacks launched from legitimate, trusted sites. With power and 99.99% accuracy, SlashNext continuously detects and remediates threats missed by Microsoft Defender, ATPs, and relationship graph technologies. Powerful, Simple, Secure, Fast ROI Now organizations can leverage SlashNext’s award-winning AI threat detection to securely detect and remove targeted spear-phishing and other human threats that easily evade email security defenses. As targeted, well-crafted spear-phishing continues to rise dramatically in an environment where cyber criminals use automation and AI to increase the likelihood of compromising a target. The once-reliable relationship graphs, URL rewriting, and sandbox technologies of Secure Email Gateways (SEGs) cannot safeguard against rapidly evolving phishing tactics. Spear-phishing delivered through legitimate cloud services can bypass these cybersecurity solutions. Since these attacks focus on a person, the success rates are higher, providing the attacker with a lower-cost entry point into an organization.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 32

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.9/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.6/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Varonis](https://www.g2.com/sellers/varonis)
- **Year Founded:** 2005
- **HQ Location:** New York, US
- **Twitter:** @varonis (6,395 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/varonis (2,729 employees on LinkedIn®)
- **Ownership:** NASDAQ: VRNS

**Reviewer Demographics:**
  - **Company Size:** 44% Mid-Market, 38% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Reliability (1 reviews)
- Simple (1 reviews)
- Time-saving (1 reviews)

**Cons:**

- Limited Reporting (1 reviews)
- Outdated Interface (1 reviews)
- Poor Interface Design (1 reviews)
- User Interface (1 reviews)

  ### 12. [KnowBe4 Cloud Email Security (Formerly Egress)](https://www.g2.com/products/knowbe4-cloud-email-security-formerly-egress/reviews)
  KnowBe4 Cloud Email Security is a comprehensive AI-powered email protection platform that defends against sophisticated inbound and outbound email threats, transforming email from organizations&#39; largest attack surface into a strengthened defense layer. Designed for businesses of all sizes—particularly those in regulated industries handling sensitive information—this platform addresses the critical challenge of insider risk and human error, which account for 68% of data breaches. The platform delivers three integrated solutions: Defend™ provides AI-powered adaptive anti-phishing that detects business email compromise, spear phishing, and zero-day attacks while educating users with real-time contextual warning banners. Prevent™ offers AI-native outbound email security preventing data breaches by detecting misdirected emails, data exfiltration attempts, and unauthorized sharing. Protect™ delivers end-to-end email encryption seamlessly integrated into Outlook with automated policy enforcement. Key Capabilities: - Minutes-to-deploy with native Microsoft 365 integration - Patented contextual machine learning adapting to organizational communication patterns - Comprehensive analytics revealing organizations typically miss 90% of outbound security incidents - API integrations with existing security infrastructure Part of the KnowBe4 platform, Cloud Email Security transforms employees from vulnerabilities into informed cybersecurity assets through proactive threat management.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 70

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.0/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.7/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [KnowBe4, Inc.](https://www.g2.com/sellers/knowbe4-inc)
- **Company Website:** https://www.knowbe4.com
- **Year Founded:** 2010
- **HQ Location:** Clearwater, FL
- **Twitter:** @KnowBe4 (16,185 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2225282/ (2,445 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care, Information Technology and Services
  - **Company Size:** 53% Mid-Market, 30% Small-Business


#### Pros & Cons

**Pros:**

- Email Security (7 reviews)
- Protection (6 reviews)
- Customer Support (5 reviews)
- Ease of Use (5 reviews)
- Detection Efficiency (4 reviews)

**Cons:**

- Dashboard Issues (2 reviews)
- Email Filtering Issues (2 reviews)
- Email Issues (2 reviews)
- Email Security (2 reviews)
- False Positives (2 reviews)

  ### 13. [Darktrace / EMAIL](https://www.g2.com/products/darktrace-email/reviews)
  Darktrace / EMAIL is an email security platform powered by Self-Learning AI that protects organizations against the most advanced threats across email and collaboration tools that other solutions miss. Recognized as a Leader in Gartner’s Magic Quadrant and Leaders in the 2025 Voice of the Customer award for Email Security Platforms, it is designed to address the growing sophistication of communication-based attacks. Traditional secure email gateways often rely on static rules or signatures, which struggle against modern threats such as business email compromise and supply chain attacks. Darktrace / EMAIL takes a different approach by using Self-Learning AI to understand the unique communication patterns of each organization and user. This allows it to detect subtle anomalies across inbound, outbound, and lateral messages, and respond with precise, autonomous actions. Key capabilities include: - Behavioral threat detection: Identifies phishing, ransomware, account takeovers, and insider risks by learning “normal” communication behavior of internal and external users. - Protection beyond the inbox: Extends security to collaboration platforms like Microsoft Teams and SaaS applications, addressing the shift of phishing into new channels. - Adaptive response: Suspicious emails are automatically quarantined, links are rewritten, or attachments are removed, all without interrupting legitimate business communication. This approach enforces regular communication and ensures that as much safe, non-malicious content as possible is retained. - Data protection: Provides behavioral data loss prevention and assists with your DMARC configuration and monitoring to safeguard sensitive information and brand reputation. For security teams, Darktrace / EMAIL reduces operational overhead by automating triage and response. Its Cyber AI Analyst provides contextual insights, while end-users benefit from clear, in-app narratives that explain why a message is suspicious—helping to reduce false phishing reports and improve awareness. Benefits for organizations include: - Comprehensive coverage across email, collaboration, and SaaS platforms. - Reduced workload for security teams through automation and AI-driven analysis. - Seamless integration with Microsoft 365, Exchange, and Google Workspace without disrupting mail flow. In summary, Darktrace / EMAIL delivers adaptive, AI-driven protection across the full communication ecosystem. Its dual recognition as a Gartner Leader in both the Voice of the Customer award and the Magic Quadrant for Email Security Platforms in 2025 highlights its effectiveness in helping organizations defend against today’s most complex and fast-evolving threats.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 13

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.3/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Darktrace](https://www.g2.com/sellers/darktrace)
- **Company Website:** https://www.darktrace.com
- **Year Founded:** 2013
- **HQ Location:** Cambridgeshire, England
- **Twitter:** @Darktrace (18,180 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5013440/ (2,548 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 71% Mid-Market, 14% Small-Business


#### Pros & Cons

**Pros:**

- AI Technology (2 reviews)
- Customer Support (2 reviews)
- Detection Efficiency (2 reviews)
- Product Quality (2 reviews)
- Reliability (2 reviews)

**Cons:**

- Expensive (4 reviews)
- Poor Integration (2 reviews)
- Complexity (1 reviews)
- False Positives (1 reviews)
- Update Issues (1 reviews)

  ### 14. [Yandex Mail](https://www.g2.com/products/yandex-mail/reviews)
  Yandex Mail is a comprehensive email service developed by Yandex, offering a secure and efficient platform for both personal and professional communication. Launched in June 2000, it has grown to become one of the leading email services in Russia, providing users with a range of features designed to enhance the email experience. Key Features and Functionality: - Multiple Account Support: Manage various email accounts, including Mail, Outlook, Yahoo, Rambler, and iCloud, within a single interface. - Built-in Translator: Translate incoming and outgoing messages directly within the app, facilitating seamless communication across different languages. - Offline Access: Read and compose emails without an internet connection; messages are sent automatically once connectivity is restored. - Integrated Scanner: Scan documents or photos using the built-in scanner and attach them to emails without leaving the app. - Security Measures: Benefit from robust spam filtering, virus protection, and optional PIN code login to safeguard your communications. - Cloud Storage Integration: Access 5 GB of free cloud storage on Yandex Disk, with premium plans offering up to 2 TB. - Ad-Free Experience: Enjoy an uninterrupted, ad-free interface across Yandex 360 services. Primary Value and User Solutions: Yandex Mail addresses the need for a reliable and secure email service by offering a suite of features that streamline communication and enhance productivity. Its support for multiple accounts allows users to consolidate their email management, while the built-in translator and offline access ensure seamless communication regardless of language barriers or internet availability. The integration with Yandex Disk provides convenient cloud storage for attachments, and robust security measures protect users from spam and viruses. Overall, Yandex Mail delivers a user-friendly and efficient email solution tailored to meet the diverse needs of its users.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.8/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Yandex Ads](https://www.g2.com/sellers/yandex-ads-e441ccd6-b61b-4c05-9dbd-dcd292fbc45d)
- **Year Founded:** 2004
- **HQ Location:** Dubai
- **LinkedIn® Page:** https://www.linkedin.com/company/yndxforapps (22 employees on LinkedIn®)
- **Ownership:** AppMetrica
- **Total Revenue (USD mm):** $218,344

**Reviewer Demographics:**
  - **Company Size:** 65% Small-Business, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Cost Efficiency (1 reviews)
- Easy Integrations (1 reviews)
- Spam Filtering (1 reviews)
- User Interface (1 reviews)

**Cons:**

- Email Issues (1 reviews)
- Poor Detection (1 reviews)
- Poor Integration (1 reviews)

  ### 15. [Sendmarc](https://www.g2.com/products/sendmarc/reviews)
  Sendmarc is a DMARC implementation and management platform designed to help organizations authenticate their email domains and gain full visibility of their email-sending ecosystem. The platform consolidates and analyzes data from multiple email service providers, enabling teams to assess configuration issues, monitor authentication activity, and identify unauthorized senders. Our implementation process supports organizations in safely moving toward a DMARC enforcement policy, reducing email impersonation and spoofing risks while ensuring that legitimate email continues to flow as expected. The platform is built to minimize configuration errors and provide clear, actionable reporting so teams can make informed decisions. Sendmarc focuses exclusively on DMARC, SPF, DKIM, and related email authentication standards. Customers work with engineers experienced in these protocols, and many organizations reach full domain protection within a 90-day period. This approach helps organizations strengthen their email security posture, meet industry compliance requirements, improve visibility, and support more reliable email delivery.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.6/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.6/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Sendmarc](https://www.g2.com/sellers/sendmarc)
- **Company Website:** https://sendmarc.com/
- **Year Founded:** 2018
- **HQ Location:** Wilmington, US
- **Twitter:** @sendmarc (70 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sendmarc (92 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Small-Business, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Implementation Ease (4 reviews)
- Customer Support (3 reviews)
- Ease of Use (3 reviews)
- Guidance (3 reviews)
- Simple (3 reviews)

**Cons:**

- Inadequate Reporting (1 reviews)
- Limited Features (1 reviews)
- Limited Options (1 reviews)

  ### 16. [SpamTitan Email Security](https://www.g2.com/products/spamtitan-email-security/reviews)
  SpamTitan Email Security identifies and prevents email spam, viruses via email, malware, malicious links, phishing attacks, spoofing and other email borne malicious threats. We provide advanced email security for your business or msp without making it complicated. Inbound and outbound scanning with AI driven real time threat intelligence. SpamTitan Email Security is built for the SMB and SME markets, businesses using Office 365, managed service providers and the education sector. Email Security, Web Security and Compliance do not need to cost an arm and a leg for those looking to save costs in their IT security spend and productivity. Security is a feature that Microsoft has added to 0365 and for most organizations this does not meet their security benchmarks. Some important features include: Phishing Protection. Real-time Blacklists: Protect your business by blocking spam, malware and malicious emails in real-time. Office365 Friendly: Strengthen your Office 365 security against Spam and Malware Cloud-based: Protect your business on-the-go with our cloud-based system. No hardware. Virus &amp; Malware Detection: Block malware, ransomware and viruses from destroying your business. Free Tech Support: We offer excellent free technical support from a live technician. Outbound Mail Scanning: Ensure that malicious emails are not sent from your corporate emails. Affordable Monthly Billing: It is a very affordable, effective and easy to use solution simply set and forget. Industry Leading Support Team: Renowned for our focus on supporting customers with 98% satisfied customer rate in 2018 Whitelisting, Blacklisting &amp; Greylisting: Allows whitelisting and blacklisting, advanced reporting, recipient verification and outbound scanning of email. Protection from Zero Day Attacks: A secure solution for email needs the ability to anticipate new attacks using predictive technology Data Leak Prevention: SpamTitan adds powerful data leak prevention rules to prevent internal data loss Dedicated RBLs: SpamTitan includes 6 specialist Real Time Blacklists (RBLs). Email Content Filtering: It includes comprehensive content filtering rules Security Against Infected Attachments: Allows the blocking of specified attachments by type (per domain) i.e. ZIP files Advanced Threat Protection: Inbuilt Bayesian auto learning and heuristics Spam Quarantine Reports: Extensive and detailed quarantine reports allowing end users control their account Customizable Policies: Each user, domain, domain group and overall system has its own block list SpamTitan&#39;s sandboxing feature protects against breaches and sophisticated email attacks by providing a powerful environment to run in-depth, sophisticated analysis of unknown or suspicious programs and files. SpamTitan Cloud is also a vital additonal email security layer in protecting Office 365 from malware and zero day attacks. Since 1999 SpamTitan Email Security has been building up threat intelligence that will dramatically reduce the risk of a successful email attack on your organization. Cloud security is all we do.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 175

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.1/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [CyberSentriq](https://www.g2.com/sellers/cybersentriq-d38aeb75-bc88-459b-a2d2-16ccbed4d6c5)
- **Year Founded:** 2025
- **HQ Location:** Galway ,Galway
- **Twitter:** @Redstor (1,958 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cybersentriq/ (194 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, CEO
  - **Top Industries:** Information Technology and Services, Construction
  - **Company Size:** 53% Small-Business, 44% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Customer Support (1 reviews)
- Easy Integrations (1 reviews)
- Integrations (1 reviews)
- Office 365 Integration (1 reviews)


  ### 17. [INKY Email Security Platform](https://www.g2.com/products/inky-email-security-platform/reviews)
  INKY is the behavioral email security platform that blocks threats, prevents data leaks, and coaches users to make smart decisions. Like a security coach, it signals suspicious behaviors with interactive banners that guide users to take safe action on any device or email client. IT teams don’t face the burden of filtering every email themselves or maintaining multiple systems. Through powerful technology and intuitive user engagement, INKY keeps bad actors out for good.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.4/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Company Website:** https://www.kaseya.com/
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,431 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Small-Business, 44% Mid-Market


#### Pros & Cons

**Pros:**

- Cross-Platform Compatibility (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)
- Integrations (1 reviews)
- Office 365 Integration (1 reviews)

**Cons:**

- Configuration Difficulties (1 reviews)
- Difficult Setup (1 reviews)

  ### 18. [N-able Mail Assure](https://www.g2.com/products/n-able-mail-assure/reviews)
  N-able™ Mail Assure is cloud-based email security helps you and your customers stay in control and protect inbound and outbound email using collective threat intelligence, 24/7 email continuity, and long-term email archiving. Proprietary filtering technology, combined with real-time pattern threat recognition and machine learning technology, helps protect users against advanced phishing attacks, ransomware, malware, spam, and other email-borne threats. N-able™ Mail Assure offers: • Advanced threat protection for inbound and outbound email • Built-in 24/7 email continuity to maintain business productivity • Encrypted, long-term email archiving • A Private Portal for specifically business-critical emails • 99.99% malware catch rate, as certified by Virus Bulletin: https://www.virusbulletin.com/virusbulletin/2022/06/vbspam-comparative-review/ • A multitenant web interface designed for your technicians and end-users • Seamless integration with Microsoft 365™ • Quarantine reports to give users visibility over email flow


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.8/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.6/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [N-able](https://www.g2.com/sellers/n-able)
- **HQ Location:** Morrisville, North Carolina
- **Twitter:** @Nable (15,885 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/n-able (2,224 employees on LinkedIn®)
- **Ownership:** NYSE: NABL

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 69% Small-Business, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Email Security (3 reviews)
- Security (2 reviews)
- Customization (1 reviews)
- Dashboard Features (1 reviews)
- Dashboard Updates (1 reviews)

**Cons:**

- Poor Customer Support (2 reviews)
- Slow Performance (2 reviews)
- Email Issues (1 reviews)
- Limited Customization (1 reviews)
- Limited Features (1 reviews)

  ### 19. [Cisco Secure Email Threat Defense](https://www.g2.com/products/cisco-secure-email-threat-defense/reviews)
  Cisco Email Security protects against ransomware, business email compromise, spoofing, and phishing.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 26

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 9.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.6/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Mid-Market, 32% Enterprise


  ### 20. [Symantec Email Security.Cloud](https://www.g2.com/products/symantec-email-security-cloud/reviews)
  Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 60

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.1/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 38% Mid-Market


  ### 21. [FileWall for Microsoft 365](https://www.g2.com/products/filewall-for-microsoft-365/reviews)
  FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s patented Deep File Analysis (DFA) technology containing proprietary Content Disarm and Reconstruction (TrueCDR™) algorithms. The DFA process considers a file like an iceberg, often unassuming on the surface but looking deep down into what lies beneath the surface eliminating embedded malware in files where traditional legacy solutions fail to detect. FileWall complements Microsoft’s security products such as Exchange Online Protection (EOP) and Defender (formerly Advanced Threat Protection - ATP), providing effective, real-time protection against any unknown threat hidden in innocent-looking files from both external, and internal sources.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 10.0/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [odix](https://www.g2.com/sellers/odix)
- **Year Founded:** 2012
- **HQ Location:** Rosh Haain, Israel
- **Twitter:** @odix (6 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/odixcdr/about (18 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 90% Small-Business, 10% Mid-Market


  ### 22. [Zivver Email Encryption](https://www.g2.com/products/zivver-email-encryption/reviews)
  Zivver provides secure email communications for effortless compliance. Founded in the Netherlands in 2015, Zivver is trusted by over 10,000 organizations globally to prevent data leaks caused by human error and ensure compliance. Zivver’s platform offers key features such as AES-256 encryption, keyless encryption, and multi-factor authentication, making it a robust tool for protecting sensitive data. Its integration with popular email clients like Microsoft 365 and Gmail, along with capabilities like secure file transfer up to 5TB and e-signatures directly within email, makes Zivver both user-friendly and highly secure. By offering smart prevention rules, secure communication options, and seamless integration with existing workflows, Zivver not only enhances security but also improves efficiency and productivity, helping organizations remain compliant with global data protection regulations.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 50

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.3/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.1/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.7/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Zivver](https://www.g2.com/sellers/zivver)
- **Year Founded:** 2015
- **HQ Location:** Amsterdam, Noord-Holland
- **Twitter:** @zivver_en (279 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/zivver (84 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care, Mental Health Care
  - **Company Size:** 52% Small-Business, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (30 reviews)
- Email Security (24 reviews)
- Security (22 reviews)
- Email Encryption (17 reviews)
- Encryption (17 reviews)

**Cons:**

- Email Issues (17 reviews)
- Difficult Setup (10 reviews)
- Access Issues (9 reviews)
- Technical Issues (8 reviews)
- Access Control (5 reviews)

  ### 23. [Virtru Email Encryption](https://www.g2.com/products/virtru-email-encryption/reviews)
  Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), intellectual property, and other regulated information. Seamlessly integrating with platforms like Gmail and Microsoft Outlook, Virtru empowers organizations to meet compliance requirements for HIPAA, GDPR, CJIS, CMMC 2.0, ITAR and other data privacy regulations, without disrupting existing workflows. Virtru provides full control over email content even after it’s been sent. Users can set expiration dates, revoke access, and track where emails are shared, ensuring total visibility and control over sensitive information. With granular access control and audit trails, Virtru simplifies data protection for enterprises and small businesses alike. Ideal for industries such as healthcare, financial services, government, and education, Virtru empowers your teams to confidently share sensitive information without sacrificing security.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 402

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.2/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Virtru](https://www.g2.com/sellers/virtru)
- **Company Website:** https://virtru.com
- **Year Founded:** 2012
- **HQ Location:** Washington, DC
- **Twitter:** @virtruprivacy (1,795 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/virtru/ (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Administrative Assistant, IT Manager
  - **Top Industries:** Hospital &amp; Health Care, Health, Wellness and Fitness
  - **Company Size:** 45% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (80 reviews)
- Security (78 reviews)
- Encryption (66 reviews)
- Email Encryption (56 reviews)
- Secure Communication (45 reviews)

**Cons:**

- Email Issues (55 reviews)
- Email Encryption Issues (44 reviews)
- Access Issues (29 reviews)
- Encryption Issues (26 reviews)
- Access Limitations (20 reviews)

  ### 24. [Proofpoint Adaptive Email Security](https://www.g2.com/products/proofpoint-adaptive-email-security/reviews)
  The Tessian Cloud Email Security Platform intelligently protects against advanced threats and data loss on email, while reducing security teams&#39; workloads, and coaching people about security threats in the moment. Using Behavioral Intelligence Modeling and machine learning, Tessian automatically detects and prevents threats that legacy Secure Email Gateways fail to stop, including advanced phishing attacks, email impersonation, accidental data loss and insider threats. We ensure security teams can work smarter, not harder. Tessian automates the investigation and remediation of email threats, freeing up the security team&#39;s time and in-the-moment security coaching educates users in real-time to help them make more informed security decisions. As a cloud-native solution, Tessian Security Platform integrates seamlessly with Microsoft 365, Microsoft Exchange, and Google Workspace environments. Tessian is a fully automated platform that requires zero configuration, is deployed in minutes, and learns people’s email behaviors within hours, closing critical security gaps in the enterprise security stack. Email is the number one threat vector in the enterprise, and security teams can no longer rely on traditional email security solutions to keep their organization safe. Tessian’s intelligent technology stops advanced threats and prevents data loss, strengthening email security and building a stronger security culture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 45

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 8.8/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,141 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)
- **Ownership:** NASDAQ: PFPT

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Legal Services
  - **Company Size:** 58% Mid-Market, 42% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Features (1 reviews)
- Product Quality (1 reviews)
- Protection (1 reviews)

**Cons:**

- Expensive (1 reviews)

  ### 25. [Email Security For Office 365](https://www.g2.com/products/email-security-for-office-365/reviews)
  Constant Edge&#39;s Email Security for Office 365 is a comprehensive solution designed to protect organizations using Microsoft&#39;s cloud email platform from advanced email threats. By integrating seamlessly with Office 365, it offers multi-layered security measures to safeguard users against phishing, malware, and other malicious activities. Key Features and Functionality: - Multi-layered Email Security: Employs enterprise-grade protection at both the email gateway and inbox levels, utilizing machine learning algorithms to detect and block threats. - Secure Email Encryption: Automatically encrypts sensitive email data to prevent unauthorized access during transmission. - Advanced Threat Protection: Provides targeted defense against malicious URLs and attachments through industry-leading sandboxing technologies. - Email Archiving: Securely stores all internal and external communications for up to 10 years, facilitating quick and easy searches to meet legal compliance requirements. - Automated Incident Response: Enables automatic responses to employee-reported emails, with single-click rapid remediation capabilities for administrators. - Advanced Threat Assessment: Detects and removes email threats up to 90 days after delivery, protecting against dormant threats in user inboxes. Primary Value and User Solutions: This solution addresses the critical need for robust email security within Office 365 environments by providing: - Enhanced Protection: Safeguards users from sophisticated email threats, reducing the risk of data breaches and financial loss. - Regulatory Compliance: Ensures organizations meet legal and industry standards through secure email archiving and encryption. - Operational Continuity: Maintains uninterrupted email access and functionality, even during potential outages or attacks. - Simplified Management: Offers easy deployment and management, allowing IT teams to efficiently oversee email security without extensive training. By implementing Constant Edge&#39;s Email Security for Office 365, organizations can significantly enhance their email security posture, ensuring the safety and integrity of their communications.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.3/10)
- **Activity Monitoring:** 9.3/10 (Category avg: 8.9/10)
- **Intelligence Reporting:** 8.2/10 (Category avg: 8.8/10)
- **Policy Enforcement:** 9.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Constant Edge](https://www.g2.com/sellers/constant-edge)
- **Year Founded:** 2016
- **HQ Location:** Edinburgh
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 52% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Alerts (1 reviews)
- Cost Efficiency (1 reviews)
- Ease of Use (1 reviews)
- Phishing Protection (1 reviews)

**Cons:**

- Difficult Training (1 reviews)
- Email Issues (1 reviews)
- Poor Detection (1 reviews)



## Parent Category

[Email Security Software](https://www.g2.com/categories/email-security)



## Related Categories

- [Secure Email Gateway Software](https://www.g2.com/categories/secure-email-gateway)
- [Email Anti-spam Software](https://www.g2.com/categories/email-anti-spam)
- [Cloud Email Security Solutions](https://www.g2.com/categories/cloud-email-security)




