ICES represents a fundamental architectural shift from legacy Secure Email Gateways (SEGs). Instead of redirecting MX records and inspecting mail at the perimeter, ICES solutions connect via native APIs to scan messages after the cloud provider accepts them but before inbox delivery.
Key advantages over SEG
- No MX record changes or DNS complexity.
- Preserves native email authentication (SPF, DKIM, DMARC) without workarounds.
- Full visibility into internal email traffic, not just inbound.
- Minutes to deploy via OAuth rather than weeks of infrastructure planning.
- Native protection for collaboration apps like Drive and Teams.
How ICES works
- Integrates through cloud provider APIs (Google Admin SDK, Microsoft Graph).
- Uses routing rules to intercept messages inline before delivery.
- Applies AI-based detection that leverages communication patterns and context.
- Can retract malicious messages post-delivery across all affected inboxes.
When to consider ICES
- Cloud-native email environments (Google Workspace, Microsoft 365).
- Organizations wanting to preserve built-in cloud email security.
- Need for internal email monitoring and BEC protection.
- Rapid deployment requirements without infrastructure changes.
Related Tools
Related Articles
View all articlesMDR Vendor Performance Benchmarks: The Metrics That Matter
Only a handful of MDR providers publish detection and response time benchmarks. We compiled every publicly citable metric from CrowdStrike, Expel, Huntress, eSentire, Arctic Wolf, Red Canary, and Microsoft to help you compare vendors on data, not marketing.
Read article →CrowdStrike vs Expel: MDR Detection Speed Comparison
CrowdStrike and Expel are two of the only MDR providers that publish both detection and response time benchmarks. Expel is faster on MTTR (13 min vs 37 min). CrowdStrike has MITRE validation.
Read article →CrowdStrike vs SentinelOne: Endpoint Security and MITRE ATT&CK Compared
Both CrowdStrike and SentinelOne deliver strong MITRE ATT&CK detection results. The key difference: CrowdStrike is the only vendor with MITRE Managed Services evaluation.
Read article →Classical Ciphers Explained: From Caesar to Enigma
Explore the evolution of classical cryptography from ancient Caesar ciphers to the legendary Enigma machine. Learn how each cipher works, their historical significance, and why understanding them matters for modern security.
Read article →Explore More Email Security
View all termsDKIM (DomainKeys Identified Mail)
Email authentication method that uses cryptographic signatures to verify that email content has not been tampered with in transit.
Read more →DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Email validation system that builds on SPF and DKIM to prevent email spoofing and provide reporting on email authentication failures.
Read more →Email Authentication
A set of protocols (SPF, DKIM, DMARC) that verify the sender of an email is who they claim to be, preventing spoofing and phishing.
Read more →Email Headers
Metadata attached to emails that shows routing information, authentication results, and delivery path.
Read more →Secure Email Gateway (SEG)
A security solution that filters incoming and outgoing email traffic to protect against spam, phishing, malware, and data loss.
Read more →SPF (Sender Policy Framework)
Email authentication method that specifies which mail servers are authorized to send email on behalf of your domain.
Read more →