top of page
Cellopoint_bg_phishing.png

Cellopoint Online Protection (COP)

Safeguard all email environments with Cellopoint Online Protection (COP) against email-borne threats before they reach your mailboxes

Stop all email threats with SaaS Inbound Email Security

Cellopoint Online Protection (COP) is a SaaS inbound email security solution that requires minimal maintenance. Utilizing Cellopoint’s threat intelligence and artificial intelligence (AI) technology, it provides pre-delivery protection. COP effectively blocks known and unknown threats, such as spam, viruses, phishing, ransomware, malicious programs, targeted attacks, and advanced persistent threats (APT). It ensures robust protection, whether you use cloud services such as Microsoft 365, Exchange Online and Google Workspace, or on-premises platforms like Microsoft Exchange and Zimbra. 

COP_web_en.png

Top 1 attack vector

Phishing emails initiate over 90% of all cyberattacks

Frequent

Ransomware attacks soared 18% in 2023, with 2,825+ complaints

Costly

$2.9 billion in global losses were attributed to BEC scams in 2023

SaaS Inbound Email Security

AI-powered Detection

Leverages AI and machine learning model to effectively stop phishing, ransomware, and BEC scams.

Subscription-based Model

Predictable monthly pricing for budget control, with the flexibility to add features as needed. 

Cost Savings on Equipment

No hardware needed, saving on management and costs. Perfect for companies with limited IT resources.

COP features at a glance

Anti-Spam

  • Connection Control: Inspects initial SMTP connections to block 50% to 80% threats before they reach the email gateway, preserving network resources, optimizing performance, and conserving storage capacity.

  • DoS (Denial of Service) Defense: Protects against attacks aiming to overwhelm and disrupt the email system, ensuring continuous and reliable email service.

  • SRL (Sender Reputation List): Monitors global sender IP addresses 24/7/365 through the CGAC (Cellopoint Global Anti-Spam Center), assigning reputation scores to instantly block abnormal sender sources.

  • Anti-Relay: Prevents unauthorized use of an email server to relay large volumes of spam or unsolicited emails, thus avoiding IP blacklisting by RBLs.

  • Greylisting: Temporarily rejects emails from unknown senders to identify legitimate mail servers and block automated spam-sending programs.

  • SPF (Sender Policy Framework): Verifies sender identity to prevent sender email address spoofing.

  • Multi-Layer Spam Filtering: Uses the CelloCloud™ database to collect and analyze spam characteristics to maintain a spam defense rate of over 99.9%.

Anti-Virus

Multi-Layer Virus Scan: Uses advanced antivirus engines to provide virus scanning and online virus pattern updates, effectively eliminating various known email viruses, worms, spyware, trojans, ransomware, and other malware.

It provides three-phased defense: pre-click, time-of-click (ToC), and post-click, effectively detecting and blocking phishing URLs and malicious URLs that may trigger phishing, malware downloads, and the latest QR code phishing attacks. 

  • Pre-click Protection: Utilizes Cellopoint's 125 types of URL threat intelligence to scan all URLs, swiftly comparing them against the latest URL blacklists and whitelists, and quarantining phishing and malicious links. 

  • Time-of-Click (ToC) Protection: Rewrites suspicious URLs and offers real-time Time-of-Click (ToC) detection upon user interaction to prevent delayed attacks. 

  • Post-click Protection: Performs retrospective scanning on URLs to ensure security after they have been clicked.

Anti-APT-File module provides the following mechanisms to intercept attachments containing the latest, unknown advanced malware:

  • Dynamic Sandbox Scanning: Suspicious attachments are securely encrypted and sent to the sandbox for software execution and monitoring.

  • Full-System Emulation: Within the sandbox, simulates and executes entire computer systems, including Windows, Android, Office documents, and PDF files, swiftly detecting and capturing latent malicious programs.

  • Correlation and Threat Scoring: Conducts threat level analysis and provides feedback to the SEG for quarantine or release decisions.

  • Professional Forensic Summary Report: Includes threat scoring, the software's names and actions, network activities, process histories, and registry changes.

Business Email Compromise (BEC) refers to attackers impersonating trusted recipients and using social engineering tactics to deceive recipients into transferring funds or providing confidential information. Cellopoint's Anti-BEC detects BEC scams that traditional security gateways may miss through the following technologies:

  • Sender Authentication: SPF, DKIM, and DMARC identity verification.

  • BEC Verification Database: Uses intelligent detection to identify anomalies and allows users to verify the authenticity of suspicious emails through alerts.

  • Display Name Anomaly Detection: Detects anomalies like "Masom Wang <mason.wang@cellopoint.com>” which impersonates "Mason Wang <mason.wang@cellopoint.com>”

  • Sender Account Anomaly Detection: Detects anomalies like "Mason Wang <mason_wang@cellopoint.com>” which impersonates "Mason Wang <mason.wang@cellopoint.com>”

  • Cousin Domain Detection: Detects cousin domains (look-alike domains) like "Mason Wang <mason.wang@cellop0int.com>” which impersonates "Mason Wang <mason.wang@cellopint.com>”

  • User Behavior Analytics (UBA): Uses artificial intelligence (AI) algorithms and Human-Computer Interaction (HCI) technology to analyze user email behavior patterns, detecting and responding to anomalies.

  • AI Modeling: Utilizes AI algorithms to model individual email communication behaviors, identifying normal patterns and legitimate senders to recognize anomalous or spoofed senders.

  • Alerting or Quarantine: Abnormal emails are quarantined directly, while suspicious emails are quarantined with alerts sent to recipients for verification. Fraud confirmations help refine the detection engine through machine learning.

Enhanced email security plans tailored to your needs

COP provides three plans: Standard, Advanced, and Complete, flexible to your needs and budget. Ideal for organizations moving to the cloud or lacking the IT resources for on-premises deployments and management.

Standard

Standard

Ideal for organizations with budget constraints seeking essential protection against spam and viruses.  

Anti-Spam

Anti-Virus

Anti-APT-URL

Anti-APT-File

Anti-BEC 

Advanced

Advanced

Ideal for organizations with Anti-Spam and Anti-Virus but challenged by phishing, ransomware, and BEC scams.

Anti-Spam

Anti-Virus

Anti-APT-URL

Anti-APT-File

Anti-BEC 

Complete

Complete

Ideal for organizations without inbound email security, seeking a complete solution to block all threats.

Anti-Spam

Anti-Virus 

Anti-APT-URL

Anti-APT-File

Anti-BEC 

How to Get Started

  1. Contact Us: Reach out to our COP specialist at sales@cellopoint.com to evaluate the best plan and subscription fees. 

  2. Update DNS MX Record: Point your inbound email DNS MX records to COP. Our team can assist with this change. 

  3. Notify Users: Inform users about COP services and help them familiarize themselves with the features. 

Request a demo with an email security expert

bottom of page