Introducing G2.ai, the future of software buying.Try now

Best Cloud Email Security Solutions

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud email security solutions are secure email platforms used to prevent phishing scams that trick users into divulging privileged information. The platforms, hosted by the cloud email security vendor, also ensure emails containing links to malicious sites or trigger malware downloads are blocked before reaching the end user. Businesses use cloud email security solutions to prevent data loss and the release of privileges or credentials, and increase endpoint security by blocking malware and other web-based threats.

These tools emerged as portions of the secure email gateway market have adapted to the digital transformation and reduced the need for on-premise email security tools and appliances. There is some overlap between cloud email security tools and email anti-spam software and email encryption software, but those tools typically serve one single purpose and may be delivered in both cloud and on-premise forms.

To qualify for inclusion in the Cloud Email Security category, a product must:

Provide cloud-hosted email services
Filter fraudulent emails and phishing scams
Prevent and detect spam and other malicious email content
Show More
Show Less

Featured Cloud Email Security Solutions At A Glance

Free Plan Available:
Sublime Email Security Platform
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud Email Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
84 Listings in Cloud Email Security Available
(582)4.6 out of 5
6th Easiest To Use in Cloud Email Security software
View top Consulting Services for Proofpoint Core Email Protection
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint’s Core Email Protection (CEP) stops 99.99% of all email threats before they become compromises. It stops the broadest range of email cyberattacks, spam and graymail. For security analysts,

    Users
    • Information Security Analyst
    • IT Security Engineer
    Industries
    • Financial Services
    • Hospital & Health Care
    Market Segment
    • 66% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Core Email Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    120
    Protection
    120
    Ease of Use
    106
    Effective
    77
    Customer Support
    70
    Cons
    Email Issues
    34
    User Interface
    34
    Outdated Interface
    33
    False Positives
    30
    Limited Features
    28
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Core Email Protection features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    9.1
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.1
    Anti-Phishing
    Average: 9.2
    9.4
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,076 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint’s Core Email Protection (CEP) stops 99.99% of all email threats before they become compromises. It stops the broadest range of email cyberattacks, spam and graymail. For security analysts,

Users
  • Information Security Analyst
  • IT Security Engineer
Industries
  • Financial Services
  • Hospital & Health Care
Market Segment
  • 66% Enterprise
  • 30% Mid-Market
Proofpoint Core Email Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
120
Protection
120
Ease of Use
106
Effective
77
Customer Support
70
Cons
Email Issues
34
User Interface
34
Outdated Interface
33
False Positives
30
Limited Features
28
Proofpoint Core Email Protection features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
9.1
Advanced Threat Protection (ATP)
Average: 9.0
9.1
Anti-Phishing
Average: 9.2
9.4
Quarantine
Average: 9.0
Seller Details
Company Website
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,076 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
(1,254)4.7 out of 5
4th Easiest To Use in Cloud Email Security software
View top Consulting Services for Acronis Cyber Protect Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acronis delivers the world’s most complete cyber resilience platform, combining backup, disaster recovery, cybersecurity, RMM, and business operations tools into a single, natively integrated solution

    Users
    • Director
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 69% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Acronis Cyber Protect Cloud is a software that provides email notifications when computers encounter an attack or if backups are not executed due to changes in the setup.
    • Users frequently mention the software's ability to prevent cyber attacks and ensure data restoration through reliable backups, and its seamless integration with tools like SharePoint and OneDrive enhances workflow efficiency.
    • Users mentioned that the pricing could be more accessible, especially for smaller businesses, and the setup process was a little tricky at first.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acronis Cyber Protect Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    195
    Backup Solutions
    190
    Backup Ease
    151
    Protection
    140
    Reliability
    139
    Cons
    Slow Performance
    69
    Expensive
    54
    Poor Customer Support
    50
    Complexity
    46
    Learning Curve
    37
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.1
    Anti-Phishing
    Average: 9.2
    9.1
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Company Website
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    95,146 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,916 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acronis delivers the world’s most complete cyber resilience platform, combining backup, disaster recovery, cybersecurity, RMM, and business operations tools into a single, natively integrated solution

Users
  • Director
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 69% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Acronis Cyber Protect Cloud is a software that provides email notifications when computers encounter an attack or if backups are not executed due to changes in the setup.
  • Users frequently mention the software's ability to prevent cyber attacks and ensure data restoration through reliable backups, and its seamless integration with tools like SharePoint and OneDrive enhances workflow efficiency.
  • Users mentioned that the pricing could be more accessible, especially for smaller businesses, and the setup process was a little tricky at first.
Acronis Cyber Protect Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
195
Backup Solutions
190
Backup Ease
151
Protection
140
Reliability
139
Cons
Slow Performance
69
Expensive
54
Poor Customer Support
50
Complexity
46
Learning Curve
37
Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
9.2
Advanced Threat Protection (ATP)
Average: 9.0
9.1
Anti-Phishing
Average: 9.2
9.1
Quarantine
Average: 9.0
Seller Details
Seller
Acronis
Company Website
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
95,146 Twitter followers
LinkedIn® Page
www.linkedin.com
1,916 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(90)4.4 out of 5
5th Easiest To Use in Cloud Email Security software
View top Consulting Services for Barracuda Email Protection
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda Email Protection helps organizations of all sizes and industries defend against increasingly sophisticated, frequent, and targeted attacks, including phishing, ransomware, business email com

    Users
    • IT Manager
    • IT Director
    Industries
    • Hospital & Health Care
    • Manufacturing
    Market Segment
    • 60% Mid-Market
    • 12% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Email Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    46
    Email Security
    27
    Customer Support
    21
    Easy Setup
    21
    Security
    17
    Cons
    Email Filtering Issues
    17
    False Positives
    15
    Poor Interface Design
    11
    Configuration Difficulties
    7
    Needs Improvement
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Email Protection features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Advanced Threat Protection (ATP)
    Average: 9.0
    8.6
    Anti-Phishing
    Average: 9.2
    8.8
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Company Website
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,265 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,133 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda Email Protection helps organizations of all sizes and industries defend against increasingly sophisticated, frequent, and targeted attacks, including phishing, ransomware, business email com

Users
  • IT Manager
  • IT Director
Industries
  • Hospital & Health Care
  • Manufacturing
Market Segment
  • 60% Mid-Market
  • 12% Small-Business
Barracuda Email Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
46
Email Security
27
Customer Support
21
Easy Setup
21
Security
17
Cons
Email Filtering Issues
17
False Positives
15
Poor Interface Design
11
Configuration Difficulties
7
Needs Improvement
6
Barracuda Email Protection features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.6
Advanced Threat Protection (ATP)
Average: 9.0
8.6
Anti-Phishing
Average: 9.2
8.8
Quarantine
Average: 9.0
Seller Details
Seller
Barracuda
Company Website
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,265 Twitter followers
LinkedIn® Page
www.linkedin.com
2,133 employees on LinkedIn®
(457)4.9 out of 5
1st Easiest To Use in Cloud Email Security software
Save to My Lists
Entry Level Price:Starting at $29.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Paubox is a HIPAA compliant email security platform designed for healthcare organizations. It provides outbound email encryption and AI-powered inbound email protection, helping organizations safeguar

    Users
    • Owner
    • CEO
    Industries
    • Mental Health Care
    • Hospital & Health Care
    Market Segment
    • 81% Small-Business
    • 16% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Paubox is an email encryption service that ensures HIPAA compliance in communications with clients and other professionals.
    • Users like the automatic email encryption, seamless integration with Google Workspace, user-friendly interface, and the excellent customer support provided by Paubox.
    • Reviewers experienced some initial setup complexities, lack of support for Microsoft email encryption, and some users found the price to be high.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Paubox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    176
    Security
    150
    Customer Support
    121
    Setup Ease
    114
    Email Security
    105
    Cons
    Expensive
    44
    Email Issues
    26
    Difficult Setup
    23
    Email Encryption Issues
    15
    Limited Features
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Paubox features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.5
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.5
    Anti-Phishing
    Average: 9.2
    9.6
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Paubox
    Year Founded
    2015
    HQ Location
    San Francisco, CA
    Twitter
    @PauboxHQ
    16,643 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Paubox is a HIPAA compliant email security platform designed for healthcare organizations. It provides outbound email encryption and AI-powered inbound email protection, helping organizations safeguar

Users
  • Owner
  • CEO
Industries
  • Mental Health Care
  • Hospital & Health Care
Market Segment
  • 81% Small-Business
  • 16% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Paubox is an email encryption service that ensures HIPAA compliance in communications with clients and other professionals.
  • Users like the automatic email encryption, seamless integration with Google Workspace, user-friendly interface, and the excellent customer support provided by Paubox.
  • Reviewers experienced some initial setup complexities, lack of support for Microsoft email encryption, and some users found the price to be high.
Paubox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
176
Security
150
Customer Support
121
Setup Ease
114
Email Security
105
Cons
Expensive
44
Email Issues
26
Difficult Setup
23
Email Encryption Issues
15
Limited Features
13
Paubox features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.5
Advanced Threat Protection (ATP)
Average: 9.0
9.5
Anti-Phishing
Average: 9.2
9.6
Quarantine
Average: 9.0
Seller Details
Seller
Paubox
Year Founded
2015
HQ Location
San Francisco, CA
Twitter
@PauboxHQ
16,643 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
(217)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Email Security software
Save to My Lists
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
    • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
    • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    88
    Customer Support
    63
    Security
    62
    Protection
    50
    Easy Setup
    45
    Cons
    Performance Issues
    31
    Improvements Needed
    19
    False Positives
    15
    Inaccuracy
    15
    Missing Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.1
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.3
    Anti-Phishing
    Average: 9.2
    9.1
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
  • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
  • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
88
Customer Support
63
Security
62
Protection
50
Easy Setup
45
Cons
Performance Issues
31
Improvements Needed
19
False Positives
15
Inaccuracy
15
Missing Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
9.1
Advanced Threat Protection (ATP)
Average: 9.0
9.3
Anti-Phishing
Average: 9.2
9.1
Quarantine
Average: 9.0
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,914 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
(315)4.4 out of 5
Optimized for quick response
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 68% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    61
    Email Security
    60
    Security
    40
    Features
    37
    Customer Support
    31
    Cons
    Complexity
    25
    Email Filtering Issues
    19
    UX Improvement
    19
    Configuration Difficulties
    18
    Email Issues
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Advanced Threat Protection (ATP)
    Average: 9.0
    8.8
    Anti-Phishing
    Average: 9.2
    9.0
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,475 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 68% Mid-Market
  • 17% Enterprise
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
61
Email Security
60
Security
40
Features
37
Customer Support
31
Cons
Complexity
25
Email Filtering Issues
19
UX Improvement
19
Configuration Difficulties
18
Email Issues
17
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.3
8.8
Advanced Threat Protection (ATP)
Average: 9.0
8.8
Anti-Phishing
Average: 9.2
9.0
Quarantine
Average: 9.0
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,144 Twitter followers
LinkedIn® Page
www.linkedin.com
2,475 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony Email & Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Threat Detection
    21
    Email Security
    20
    Protection
    20
    Easy Integrations
    14
    Cons
    False Positives
    12
    Inefficient Alert System
    6
    Complexity
    5
    Difficult Learning
    5
    Integration Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.4
    Anti-Phishing
    Average: 9.2
    9.3
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 24% Enterprise
Check Point Harmony Email & Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Threat Detection
21
Email Security
20
Protection
20
Easy Integrations
14
Cons
False Positives
12
Inefficient Alert System
6
Complexity
5
Difficult Learning
5
Integration Issues
5
Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
9.2
Advanced Threat Protection (ATP)
Average: 9.0
9.4
Anti-Phishing
Average: 9.2
9.3
Quarantine
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,914 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.

    Users
    • Software Engineer
    • Associate Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Office 365 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    94
    Email Security
    64
    Office 365 Integration
    61
    Phishing Protection
    60
    Ease of Use
    48
    Cons
    False Positives
    38
    Expensive
    32
    Complexity
    23
    Steep Learning Curve
    18
    Configuration Difficulties
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Office 365 features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.0
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.0
    Anti-Phishing
    Average: 9.2
    8.8
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,105,074 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.

Users
  • Software Engineer
  • Associate Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 37% Mid-Market
Microsoft Defender for Office 365 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
94
Email Security
64
Office 365 Integration
61
Phishing Protection
60
Ease of Use
48
Cons
False Positives
38
Expensive
32
Complexity
23
Steep Learning Curve
18
Configuration Difficulties
16
Microsoft Defender for Office 365 features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
9.0
Advanced Threat Protection (ATP)
Average: 9.0
9.0
Anti-Phishing
Average: 9.2
8.8
Quarantine
Average: 9.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,105,074 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
(62)4.8 out of 5
Optimized for quick response
10th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected appl

    Users
    No information available
    Industries
    • Financial Services
    • Manufacturing
    Market Segment
    • 55% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Abnormal AI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Customer Support
    11
    Detection Efficiency
    11
    Easy Setup
    10
    Email Security
    10
    Cons
    Email Filtering Issues
    3
    Email Issues
    3
    False Positives
    3
    Limited Reporting
    3
    Email Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Abnormal AI features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.3
    Anti-Phishing
    Average: 9.2
    8.8
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Las Vegas, USA
    LinkedIn® Page
    www.linkedin.com
    1,394 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected appl

Users
No information available
Industries
  • Financial Services
  • Manufacturing
Market Segment
  • 55% Enterprise
  • 39% Mid-Market
Abnormal AI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Customer Support
11
Detection Efficiency
11
Easy Setup
10
Email Security
10
Cons
Email Filtering Issues
3
Email Issues
3
False Positives
3
Limited Reporting
3
Email Security
2
Abnormal AI features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
9.2
Advanced Threat Protection (ATP)
Average: 9.0
9.3
Anti-Phishing
Average: 9.2
8.8
Quarantine
Average: 9.0
Seller Details
Company Website
Year Founded
2018
HQ Location
Las Vegas, USA
LinkedIn® Page
www.linkedin.com
1,394 employees on LinkedIn®
(91)4.7 out of 5
11th Easiest To Use in Cloud Email Security software
View top Consulting Services for Guardz
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

    Users
    • Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Guardz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Security
    44
    Features
    33
    Threat Detection
    28
    Easy Setup
    24
    Cons
    Limited Features
    10
    Insufficient Information
    7
    Integration Issues
    7
    Needs Improvement
    7
    Missing Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Advanced Threat Protection (ATP)
    Average: 9.0
    8.9
    Anti-Phishing
    Average: 9.2
    8.7
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

Users
  • Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 23% Mid-Market
Guardz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Security
44
Features
33
Threat Detection
28
Easy Setup
24
Cons
Limited Features
10
Insufficient Information
7
Integration Issues
7
Needs Improvement
7
Missing Features
6
Guardz features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.6
Advanced Threat Protection (ATP)
Average: 9.0
8.9
Anti-Phishing
Average: 9.2
8.7
Quarantine
Average: 9.0
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
94 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Of

    Users
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 67% Mid-Market
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Impersonation Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Phishing Protection
    10
    Detection Efficiency
    8
    Customer Support
    7
    Easy Integrations
    7
    Cons
    False Positives
    10
    Complexity
    3
    Email Issues
    3
    Inadequate Protection
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Impersonation Protection features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.3
    Anti-Phishing
    Average: 9.2
    9.2
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,265 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,133 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Of

Users
  • Systems Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 67% Mid-Market
  • 18% Small-Business
Barracuda Impersonation Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Phishing Protection
10
Detection Efficiency
8
Customer Support
7
Easy Integrations
7
Cons
False Positives
10
Complexity
3
Email Issues
3
Inadequate Protection
3
UX Improvement
3
Barracuda Impersonation Protection features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
9.3
Advanced Threat Protection (ATP)
Average: 9.0
9.3
Anti-Phishing
Average: 9.2
9.2
Quarantine
Average: 9.0
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,265 Twitter followers
LinkedIn® Page
www.linkedin.com
2,133 employees on LinkedIn®
Ownership
Private
(53)4.7 out of 5
9th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IRONSCALES is a cloud-native email security platform that helps enterprises and MSPs close gaps with mailbox-level detection, autonomous remediation, and built-in user training. It combines AI and hum

    Users
    No information available
    Industries
    • Information Technology and Services
    • Non-Profit Organization Management
    Market Segment
    • 58% Mid-Market
    • 21% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IRONSCALES Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Email Security
    16
    Phishing Protection
    15
    Easy Setup
    13
    Customer Support
    12
    Cons
    False Positives
    6
    Poor Detection
    4
    Expensive
    3
    Limited Customization
    3
    Limited Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IRONSCALES features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.6
    Anti-Phishing
    Average: 9.2
    8.9
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Atlanta, Georgia
    Twitter
    @IRONSCALES
    3,571 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    165 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IRONSCALES is a cloud-native email security platform that helps enterprises and MSPs close gaps with mailbox-level detection, autonomous remediation, and built-in user training. It combines AI and hum

Users
No information available
Industries
  • Information Technology and Services
  • Non-Profit Organization Management
Market Segment
  • 58% Mid-Market
  • 21% Enterprise
IRONSCALES Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Email Security
16
Phishing Protection
15
Easy Setup
13
Customer Support
12
Cons
False Positives
6
Poor Detection
4
Expensive
3
Limited Customization
3
Limited Features
3
IRONSCALES features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
9.4
Advanced Threat Protection (ATP)
Average: 9.0
9.6
Anti-Phishing
Average: 9.2
8.9
Quarantine
Average: 9.0
Seller Details
Company Website
Year Founded
2014
HQ Location
Atlanta, Georgia
Twitter
@IRONSCALES
3,571 Twitter followers
LinkedIn® Page
www.linkedin.com
165 employees on LinkedIn®
(84)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legiti

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Libraesva Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    32
    Customer Support
    30
    Email Security
    26
    Effective
    20
    Setup Ease
    17
    Cons
    Complexity
    6
    Email Issues
    6
    Access Issues
    4
    Difficult Setup
    4
    Missing Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Libraesva Email Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Advanced Threat Protection (ATP)
    Average: 9.0
    9.7
    Anti-Phishing
    Average: 9.2
    9.6
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Libraesva
    Company Website
    Year Founded
    2013
    HQ Location
    Italy
    Twitter
    @Libraesva
    327 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legiti

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
Libraesva Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
32
Customer Support
30
Email Security
26
Effective
20
Setup Ease
17
Cons
Complexity
6
Email Issues
6
Access Issues
4
Difficult Setup
4
Missing Features
4
Libraesva Email Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
9.3
Advanced Threat Protection (ATP)
Average: 9.0
9.7
Anti-Phishing
Average: 9.2
9.6
Quarantine
Average: 9.0
Seller Details
Seller
Libraesva
Company Website
Year Founded
2013
HQ Location
Italy
Twitter
@Libraesva
327 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
(424)4.6 out of 5
Optimized for quick response
15th Easiest To Use in Cloud Email Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Valimail: The Leader in Email Authentication & Brand Protection Valimail is the trusted leader in automated email authentication, helping organizations achieve and maintain DMARC enforcement up

    Users
    • IT Manager
    • CTO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Valimail Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    109
    DMARC Management
    90
    Easy Setup
    79
    Email Security
    55
    Reporting
    53
    Cons
    Expensive
    28
    Insufficient Data
    20
    Lack of Detail
    20
    Limited Reporting
    20
    DMARC Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Valimail features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    6.9
    Advanced Threat Protection (ATP)
    Average: 9.0
    7.9
    Anti-Phishing
    Average: 9.2
    7.8
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Valimail
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    Twitter
    @ValiMail
    1,110 Twitter followers
    LinkedIn® Page
    linkedin.com
    104 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Valimail: The Leader in Email Authentication & Brand Protection Valimail is the trusted leader in automated email authentication, helping organizations achieve and maintain DMARC enforcement up

Users
  • IT Manager
  • CTO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
Valimail Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
109
DMARC Management
90
Easy Setup
79
Email Security
55
Reporting
53
Cons
Expensive
28
Insufficient Data
20
Lack of Detail
20
Limited Reporting
20
DMARC Issues
18
Valimail features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
6.9
Advanced Threat Protection (ATP)
Average: 9.0
7.9
Anti-Phishing
Average: 9.2
7.8
Quarantine
Average: 9.0
Seller Details
Seller
Valimail
Company Website
Year Founded
2015
HQ Location
Denver, CO
Twitter
@ValiMail
1,110 Twitter followers
LinkedIn® Page
linkedin.com
104 employees on LinkedIn®
(23)5.0 out of 5
8th Easiest To Use in Cloud Email Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

    Users
    • CEO
    Industries
    • Computer & Network Security
    Market Segment
    • 87% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rotate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Security
    15
    Helpful
    9
    Protection
    7
    Deployment Ease
    6
    Cons
    Compatibility Issues
    3
    Limited Compatibility
    3
    Missing Features
    3
    Insufficient Information
    2
    Integration Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rotate features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    7.8
    Advanced Threat Protection (ATP)
    Average: 9.0
    10.0
    Anti-Phishing
    Average: 9.2
    9.5
    Quarantine
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rotate
    Year Founded
    2023
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

Users
  • CEO
Industries
  • Computer & Network Security
Market Segment
  • 87% Small-Business
  • 13% Mid-Market
Rotate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Security
15
Helpful
9
Protection
7
Deployment Ease
6
Cons
Compatibility Issues
3
Limited Compatibility
3
Missing Features
3
Insufficient Information
2
Integration Issues
2
Rotate features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
7.8
Advanced Threat Protection (ATP)
Average: 9.0
10.0
Anti-Phishing
Average: 9.2
9.5
Quarantine
Average: 9.0
Seller Details
Seller
Rotate
Year Founded
2023
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®

Learn More About Cloud Email Security Solutions

What is Cloud Email Security Software?

Using cloud email security software, companies can protect their systems from unwanted emails or malicious email threats. Cloud email security software tools detect and quarantine unwanted emails including those containing spam and bulk emails; malware, ransomware, spyware, and other viruses in malicious links or attachments; phishing and spear-phishing attempts; C-level executive impersonation attacks; advanced targeted attacks; and more. Cloud email security software may also provide other features such as email archiving, email encryption, and data loss prevention functions for outgoing email.

Cloud email security software shares similarities with secure email gateways, which are designed to protect on-premises email. Cloud email security software, alternatively, is designed to protect cloud-based email environments and does not require on-premises hardware installations.

Key Benefits of Cloud Email Security Software

  • Offer a cloud-based, rather than on-premises, email security solution
  • Include anti-spam, anti-malware, and anti-phishing capabilities
  • Detect and quarantine suspicious emails, including links and attachments

Why Use Cloud Email Security Software?

Cloud email security software helps companies protect their cloud-based email communications. Email is one of the most commonly used points of entry hackers use to gain access to corporate systems or to trick recipients into divulging sensitive information; often, these attacks lead to information or financial losses and reputational damage. Cloud email security software protects against email-focused attacks by blocking or quarantining suspicious emails. Given many companies have migrated from on-premises to cloud-based email solutions, the tools to secure their email need to evolve to face new threats emerging every day.

In particular, cloud email security software protects against spam, malware, and phishing attacks. Malware attacks, which often originate from emails with malicious links or attachments that unsuspecting users click or open. Malware can include ransomware, spyware, or other viruses. Ransomware encrypts company files and demands a random to decrypt them. Spyware usually sits silently on company systems stealing sensitive information such as intellectual property or trade secrets. Other viruses seek to embarrass companies and can damage a company’s brand and reputation. For example, a virus that sends an email to all of the user’s contacts, would fall in this category.

Cloud email security software also protects against social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks. Phishing attacks are emails sent in bulk aiming to get employees to divulge information, such as sensitive financial information. Spear-phishing is a type of phishing that is targeted to a specific individual; in spear-phishing attacks, hackers spend time getting to know the targeted employee’s habits and preferences in order to send a personalized malicious email. The newest kind of phishing attacks are known as “impersonation attacks," which are often emails sent to company employees impersonating C-level executives which ask employees to make large financial transactions or purchases.

Additionally, companies use cloud email security software to meet regulatory compliance regarding data protection. Most notably, data loss prevention functions in cloud email security solutions help prevent data leakage on outgoing emails. For example, hacked email accounts (known as account takeover) can email out sensitive information. A less sinister example would be when a legitimate employee mistakenly sends out sensitive information such as personally identifiable information (PII), Social Security numbers, credit card numbers, and other confidential data. Additionally, when a breach occurs, reporting functions in the cloud email security software can assist IT administrators in understanding which accounts were impacted in the incident.

Who Uses Cloud Email Security Software?

All companies that use email systems, whether on-premises or cloud-based, should have an email security tool in place. Cloud email security software is used to protect cloud-based email systems. Typically, a company's IT administrators manage the deployment and monitoring of these tools. Using cloud-based solutions instead of on-premises solutions, IT administrators can save time by not patching software or hardware.

Cloud Email Security Software Features

At minimum, cloud email security software offers advanced filtering functionality and rule-based actions to prevent email-based spam, malware, viruses, and phishing attempts. Many cloud email security software providers include additional functionality including advanced threat protection, encryption, and data loss prevention tools, among others.

Anti-spam — This functionality prevents unwanted emails (bulk, mass, or other junk emails) from reaching recipients mailboxes. Filtering out spam emails can improve employee productivity, because employees are not sifting through unwanted emails.

Anti-malware — This feature prevents emails with malicious links or attachments embedded with malware (ransomware, spyware, other viruses, etc.) from reaching email recipients.

Anti-phishing — This functionality helps prevent social engineering attacks such as phishing, spear-phishing, and C-level executive impersonation attacks.

Filtering functionality — With filters, IT administrators can allow and prevent the delivery of certain kinds of emails to end users. Filters can include: approved senders, approved lists, greylists such as bulk emails that may not be malicious, blocked senders, blocklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, redirects and malicious URLs, newsletter detection, attachment size, and invalid recipients.

Rule-based actions — Using rule-based actions, the cloud email security software can automatically block, delete, route to, tag a subject, copy an administrator, and redirect emails to another email address, among other actions.

Granular search functionality — Cloud email security solutions enable IT administrators to locate specific emails using granular search functionality. Users can narrow emails down from sender, recipient, content, and many other factors.

User groups settings — With user group settings, IT administrators can easily manage users by assigning them to groups and applying group settings.

Reporting — One of the major benefits of using cloud email security software is the ability to create reports to understand unique threats over time. Many cloud email security solutions provide incident logging with granular detail, which is required for regulatory compliance. Reports often come in PDF or CSV formats.

Dashboards (administrator and end-user) — Cloud email security solutions offer dashboards for administrators to manage their company’s email security, as well as quarantine dashboard for end users to review suspicious email activity related to their user account.

Additional Cloud Email Security Features

Advanced threat protection — As email-borne threats become more sophisticated, so must the security tools needed to thwart these attacks. Many cloud email security solutions include further security tools, providing an additional layer of protection on top of standard anti-spam, anti-malware, and anti-phishing functions. Advanced threat protections often include machine learning to conduct abnormal behavioral analysis, display name spoof detection (especially regarding C-level impersonation attacks), detecting lookalike email domains that are visually confusing (such as the letters “RN" looking like the letter “M" when in lowercase. Example, “name@ernail.com" visually looks like “name@email.com"), compromised email account detection, and other anomalies.

Embedded data loss protection — While cloud email security is mostly concerned with ensuring the safety of incoming mail, some tools monitor outgoing mail, as well. Monitoring can prevent employees from sending sensitive information externally via email. Monitoring can also include things such as ensuring employees do not use profanity or other non-approved language in their emails to prevent reputational damage.

Multi-language — Some cloud email security software providers support email analysis in multiple languages and allow custom dictionaries.

Embedded encryption — Some cloud email security solutions offer embedded encryption functions, which apply encryption to a company’s outgoing emails based on specific policies.

Archiving — Some cloud email security solutions also offer archiving solutions, which are helpful for companies in regulated industries to properly store, secure, and search emails as needed.

Other Features of Cloud Email Security Solutions: Account takeover prevention, Advanced threat protection (ATP)