Advanced Email Protection
94% of malware is delivered via email
80% of security incidents come from Phishing attacks
Strengthen your existing cybersecurity measures with an additional layer of protection that specifically prevents email-borne threats. By applying best-in-class signature-based detection in combination with a range of innovative technologies, email-borne attacks are blocked in seconds.
Our Advanced Email Protection service, powered by Acronis Cyber Protect Cloud, includes the following:

Phishing Attack Protection
Blocks phishing attacks and impersonation techniques based on content analysis using multiple phishing filters including URL reputation engines from 4 market-leading sources. Utilises a unique image recognition technology that catches unknown malicious URLs based on the images and logos used on the web page. Unpacks deeply embedded, hidden phishing attempts, leveraging threat intelligence from 6 market-leading sources.
Internal Phishing Protection
Prevents lateral phishing with a zero-trust approach, scanning 100% of email traffic in seconds.
Anti-Spam Protection
Reviews all emails and applies anti-spam and reputation-based filters, including IP reputation checks, to block malicious or unwanted communication, stopping unwanted spam emails once and for all.
Zero-day and Advanced Persistent Threat (APT) Protection
Catches advanced threats that evade conventional defences with a unique CPU-level technology that detects and blocks attacks at the exploit stage, prior to malware release.
Account Takeover Protection
Stops account takeover attempts with multiple security layers, including phishing and anti-malware engines, threat intelligence, and anti-evasion technology.
Business Email Compromise (BEC) Protection
Prevents payload-less attacks and impersonation attempts including look-alike domains and display-name deception. These email attacks contain no malicious links, content or malware and are caught through machine learning algorithms and IP reputation record checks.
Our Advanced Email Protection service is charged on a per email mailbox basis and can be applied to generic mailboxes such as office@ as well as named email mailboxes. Contact us at sales@theictservice.org.uk for a quote.
Questions to ask when choosing an Email Security Solution
- Is it easily deployed, scalable and customisable?
- Can it protect from range of evolving threats? (spear phishing, insider threats, whaling)
- Does it provide a multi-layered approach?
- Why should I use it for Microsoft 365 when I have email security from them?
- Does it have strong filtering Accuracy (few false positives)?
- Does it analyse email quickly enough, avoiding lengthy delays before releasing emails?
- Is it backed up by a proactive support team, ready to help and advice?
Advantages of Advanced Email Protection
- Detection speed – seconds on average (up to 30 sec) vs 7-20 minutes for legacy sandboxing solutions.
- Scans 100% of traffic at any scale – proactive protection vs reactive for legacy solutions
- Prevent APTs and zero-day attacks – unique CPU-level analysis to detect anomalous behaviour pre-malware release (acts earlier in the attack chain than any other solution)
- Incident response services – additional forensic analysis on threats and ongoing support via Perception Point
- Best rating in independent evaluations – SELabs
Glossary
Phishing – a type of social engineering where an attacker sends a fraudulent email to users with the goal to trick them into revealing sensitive information or providing attackers with access to it
Spoofing – the creation of email messages with a forged sender address
BEC – type of social engineering attack that is usually precisely targeted, and leverages spoofing rather than malicious payloads (URLs, files)
Evasive techniques – Various techniques to mask attacks so that they are not detected by security solutions, e.g. embedding malicious content within clean one, or not releasing malware in sandbox environments but only when facing users
APTs – advanced persistent threats (APTs) are attacks that use continuous, sophisticated and highly evasive hacking techniques to gain unauthorized access to system and stay undetected for a prolonged period of time, with potentially destructive consequences
Spear phishing – an email scam targeted towards a specific individual
Whaling – a targeted phishing attack aimed at senior executives
Zero-day attacks – a cyber-attack targeting a software vulnerability which is unknown to the software provider or to antivirus systems. The attacker spots the software vulnerability before any parties interested in mitigating it and quickly uses it for an attack. Such attacks are highly likely to succeed because defences are not in place. This makes zero-day attacks a severe security threat.
