Cellopoint today announced that it has been recognized as a Sample Vendor, the only Asia-Pacific email security solution vendor, in the December 2022 Gartner Hype Cycle for Endpoint Security under the Business Email Compromise Protection category. Cellopoint takes it as a milestone and believes that it is yet another testament to the global recognition of Cellopoint's email security offerings. We are also proud that Cellopoint has been highly rated on Gartner Peer Insights for three consecutive years since 2020.
In the Hype Cycle for Endpoint Security report, Gartner highlights technology's life cycle (i.e., hype cycle) and the innovations for CIOs and CISOs to adopt and put in place to protect their organizations from attacks. According to Gartner, “Endpoint security innovators have focused on better and more automated prevention, detection and remediation of threats, moving toward extended detection and response (XDR) to correlate data points and telemetry from solutions such as endpoint, network, web, email and identity.”
With evolving techniques and remote work remaining mainstream, Gartner identified a couple of trends in the cybersecurity landscape:
Ransomware remains top of mind, while fileless and phishing attacks emerge as favorite attack vectors.
Business email compromise (BEC) continues to be a significant threat, and BEC protection capabilities are continuing to innovate to detect compromised accounts this year to counter phishing attacks.
Adoption of BEC protection technology is in the early mainstream but it is important as losses from BEC attacks can be significant.
Cellopoint has been dedicated to providing and innovating email security offerings, from spam and virus detection to protection against targeted, modern email threats, including Advanced Persistent Threats (APT) and BEC scams that typically do not contain any attachment and URL. By using proprietary AI algorithm, machine learning techniques and Cellopoint global real-time sender reputation threat intelligence, Cellopoint is able to identify and block sophisticated BEC attacks that are launched by skillful cybercriminals.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.