ICES represents a fundamental architectural shift from legacy Secure Email Gateways (SEGs). Instead of redirecting MX records and inspecting mail at the perimeter, ICES solutions connect via native APIs to scan messages after the cloud provider accepts them but before inbox delivery.
Key advantages over SEG
- No MX record changes or DNS complexity.
- Preserves native email authentication (SPF, DKIM, DMARC) without workarounds.
- Full visibility into internal email traffic, not just inbound.
- Minutes to deploy via OAuth rather than weeks of infrastructure planning.
- Native protection for collaboration apps like Drive and Teams.
How ICES works
- Integrates through cloud provider APIs (Google Admin SDK, Microsoft Graph).
- Uses routing rules to intercept messages inline before delivery.
- Applies AI-based detection that leverages communication patterns and context.
- Can retract malicious messages post-delivery across all affected inboxes.
When to consider ICES
- Cloud-native email environments (Google Workspace, Microsoft 365).
- Organizations wanting to preserve built-in cloud email security.
- Need for internal email monitoring and BEC protection.
- Rapid deployment requirements without infrastructure changes.
Related Tools
Related Articles
View all articlesFormal Security Models Explained: Bell-LaPadula, Biba, Clark-Wilson, and Beyond
Master the formal security models that underpin all access control systems. This comprehensive guide covers Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash, lattice-based access control, and how to choose the right model for your organization.
Read article →Biometric Authentication: Understanding FAR, FRR, and CER for Security Professionals
Master the critical metrics behind biometric authentication systems including False Acceptance Rate (FAR), False Rejection Rate (FRR), and Crossover Error Rate (CER). Learn how to evaluate, tune, and deploy biometric systems across enterprise, consumer, and high-security environments.
Read article →NIST 800-88 Media Sanitization Complete Guide: Clear, Purge, and Destroy Methods Explained
Master NIST SP 800-88 Rev. 1 media sanitization methods including Clear, Purge, and Destroy. Covers SSD vs HDD sanitization, crypto erase, degaussing, regulatory compliance, and building a media sanitization program.
Read article →Physical Security & CPTED: The Complete Guide to Protecting Facilities, Data Centers, and Critical Assets
A comprehensive guide to physical security covering CPTED principles, security zones, access control, fire suppression, and environmental controls for protecting facilities and data centers.
Read article →Explore More Email Security
View all termsDKIM (DomainKeys Identified Mail)
Email authentication method that uses cryptographic signatures to verify that email content has not been tampered with in transit.
Read more →DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Email validation system that builds on SPF and DKIM to prevent email spoofing and provide reporting on email authentication failures.
Read more →Email Authentication
A set of protocols (SPF, DKIM, DMARC) that verify the sender of an email is who they claim to be, preventing spoofing and phishing.
Read more →Email Headers
Metadata attached to emails that shows routing information, authentication results, and delivery path.
Read more →Secure Email Gateway (SEG)
A security solution that filters incoming and outgoing email traffic to protect against spam, phishing, malware, and data loss.
Read more →SPF (Sender Policy Framework)
Email authentication method that specifies which mail servers are authorized to send email on behalf of your domain.
Read more →