
Secure Email Gateway (SEG)
Protect all email environments with Cellopoint Secure Email Gateway (SEG) against email-borne threats before they reach your mailboxes
Gateway-based Inbound Email Security

AI-powered Detection
Leverages AI and machine learning model to effectively stop phishing, ransomware, and BEC scams
License with Maintenance Model
Customers pay an upfront fee for first-year license access, with maintenance (renewal) fees afterward

Flexible Deployments
Deployable on on-premises hardware or VMs and public clouds like AWS, GCP, and Azure
Block email threats with
Cellopoint’s SEG
Cellopoint Secure Email Gateway (SEG) is an inline email gateway positioned between the Internet and your email server. It provides pre-delivery protection by scanning and blocking all email threats—spam, viruses, phishing, malware, and BEC scams—before they reach your mail server. Leveraging Cellopoint's threat intelligence and AI, Cellopoint SEG ensures robust protection, whether you use cloud email services like Microsoft 365 and Google Workspace, or on-premises email platforms such as Exchange and Zimbra.

SEG modules at a glance
SEG offers four modules: Anti-Spam & Anti-Virus, Anti-APT-URL, Anti-APT-File, and Anti-BEC, which can be flexibly selected based on your requirements and budget. Suitable for organizations preferring to manage their own on-premises infrastructure or deploy in a public cloud.
Anti-Spam & Anti-Virus
It utilizes updated spam rules and virus patterns to effectively block spam, DoS attacks, and viruses in real-time.
Anti-Spam & Anti-Virus
It utilizes updated spam rules and virus patterns to effectively block spam, DoS attacks, and viruses in real-time.
It provides three-phased protection: pre-click, Time-of-Click (ToC), and post-click, effectively blocking malicious URLs that may trigger credential phishing, malware downloads, and the latest QR code phishing attempts. Initially, Cellopoint scans all URLs using its 125 URL threat intelligence, rewrites suspicious URLs and provides real-time ToC detection upon user interaction to prevent delayed attacks. Ultimately, URLs undergo retrospective scanning to ensure post-click security.
It utilizes static code analysis, dynamic sandbox analysis to detect malicious attachments, which may contain evasive malware. Following sandboxing, it conducts correlation analysis and threat scoring to decide whether to quarantine or release the email. Cellopoint also offers a summary forensic report for admins to gain visibility into attachment-based risks.
It offers SPF/DKIM/DMARC authentication checks and analyzes cousin domains and lookalike display names to detect suspicious senders. Additionally, it leverages AI and machine learning to analyze senders' identities, intention, and behaviors, effectively stopping Business Email Compromise (BEC) scams.
000