top of page

Products / Email Data Protection / DLP Audit

Audit for Outbound Emails –
Image OCR Engine

The Image OCR Engine is an additional feature for Cellopoint's Outbound Email DLP solution. It is a separately purchasable OCR (Optical Character Recognition) engine designed for recognizing text within image files attached to emails.


This engine extracts and recognizes text from images, sending the extracted text back to the SEG (Security Gateway) Policy Engine for processing. It dynamically controls and enforces policies defined in DLP (Data Loss Prevention) or prevention of personal data leakage, including undergoing an audit in the audit zone, encrypting emails (ENC), or automatically adding digital signatures (SIG).



The OCR engine, available for purchase and deployment, supports image recognition for email attachments or embedded graphics in email content, including the following formats and languages:

  • Document files containing images: pdf, rtf, Microsoft Office (doc, docx, xls, xlsx, ppt, pptx).

  • Image file formats: jpg, jpeg, jpc, jpe, gif, png, bmp, tif, tiff.

  • OCR recognition languages: English and digits, traditional Chinese, simplified Chinese.

  • Compressed files (containing image files): Support for encrypted compressed files such as rar, tar, tgz, gz, gzip, bzip2, 7z, xz, zip.

OCR engine deployment: Supports hardware-based appliances, allowing parallel expansion of multiple OCR engines for parallel computation, enhancing processing efficiency and response time.

*The OCR recognition rate cannot reach 100%. It depends on various factors, including the image file resolution, contrast and brightness between text and background, language, text within tables, underlining and line breaks, vertical or horizontal writing, clarity of scanned image files, handwritten vs. printed text, font styles, and other factors.


  • Regulatory Compliance

  • Strengthened Information Security Management and Governance

  • Implementation of ISO 27001 / ISMS

  • Advancement of Outbound Email DLP

  • Prevention of Image Files Containing Sensitive Data

  • Control of Personally Identifiable Information (PII) in Images

  • Compliance with Personal Data Protection Laws

  • Evolution of Email Security

  • Flexible Deployment and Scalability

  • Safeguarding Existing Investments

Request a demo with an email security expert

bottom of page