Email remains a primary vector for cyber threats such as phishing, BEC, and ransomware—making email security crucial for any organization. Today, email security approaches are categorized into “pre-delivery” analysis using Secure Email Gateways (SEGs) and “post-delivery” analysis via Integrated Cloud Email Security (ICES) solutions.
However, framing it as a choice between “pre- vs post-delivery” is misleading. The real difference lies between single point-in-time inspection and continuous real-time protection. Let’s explore these concepts to understand their roles in robust email security.
SEGs act as a barrier between external email sources and internal email servers. They sit “upstream” kind of like an old-school firewall. They inspect and filter emails before they reach the recipient's inbox. This pre-delivery approach uses various techniques to block threats:
SEGs block known threats immediately, often using rules and policies that require regular manual updates. They can also generate false positives, blocking legitimate emails and requiring manual “search and restore” intervention. Once an email passes through the SEG, it’s no longer monitored for new threats.
ICES solutions harness AI and machine learning. They focus on monitoring and analyzing emails at the inbox level. Rather than a one-time check, they provide continuous real-time protection:
ICES solutions excel in detecting sophisticated threats that evolve over time, such as delayed-action ransomware or malware and dynamic phishing links. They reduce false positives by leveraging more context and behavioral data, seamlessly integrate with cloud-based email services, and offer easier deployment and management.
Let’s expand on a couple of those points.
Dynamic phishing links pose a significant challenge to traditional email security measures (SEGs). These links make use of dynamic DNS to change their destination based on the type of client accessing them. Here’s how they work:
By continuously monitoring email inboxes, ICES solutions can effectively detect these deceptive tactics by continuously analyzing user behavior and identifying anomalies indicative of dynamic phishing attempts.
One of the key strengths of ICES solutions is their ability to use artificial intelligence to capture context and behavioral data to enhance threat detection. This involves:
Understanding that the distinction between pre-delivery and post-delivery is less relevant than the distinction between single point-in-time inspection and continuous real-time protection.
Pre-delivery inspection with SEGs provides immediate blocking of known threats, but it’s limited to a single point-in-time analysis. In contrast, continuous real-time protection with ICES solutions offers ongoing, adaptive defense against evolving threats. By adopting a continuous inbox-level protection strategy, organizations can ensure comprehensive