Gartner on Email Security

Prepare for the Worst. Learn From the Best.

The fight against phishing, business email compromise and malware attacks is heating up. Email security is becoming more of a priority as perfidious actors create new threats that are becoming more numerous and more formidable by the day. Fortunately for you, we’ll be posting complimentary Gartner analysts’ reports every month. Making sure you’re at the top of your game and giving you everything you need to stop advanced email attacks dead in its tracks.

Close the gaps in your
Office 365 email security

Upcoming Webcast (10/21)
Email Security 101:

Introducing VMRay
Email Threat Defender

Free Download – “How to determine if the Email security in Office 365 meets your organization’s needs”?”

Founded in 1979, Gartner is the leading research and advisory company. Gartner provides senior leaders across the enterprise with the indispensable business insights, advice and tools they need to achieve their mission-critical priorities and build the organizations of tomorrow (

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Previous Articles

“Is Your Organization Mature Enough for SOAR?”

Security orchestration, automation and response tools enable organizations that have an appropriate level of preparation in their email security and other  operations increase efficiency and consistency. Security and risk management leaders must prepare adequately to ensure value from such tools.

Key Findings
  • Security teams that do not have well-developed security operations processes and internal development skills waste valuable security budgets trying to deploy and integrate a SOAR tool.
  • Despite out-of-the-box capabilities, SOAR playbooks, scenarios and integrations cannot be used effectively without customization.
  • Compatibility with existing investments is essential for an organization to take full advantage of the suite of capabilities that a SOAR tool can provide.
  • Unlike a robotized production line, SOAR is not a replacement for core roles. Rather, it augments established processes to make them more efficient.

Security and risk management leaders considering a purchase of SOAR solutions for their security operations should:

  • Target inefficient but effective internal processes within current security operations to assess whether automating these processes will provide a defined benefit from a SOAR tool.
  • Involve teams outside of security such as infrastructure and network operations in the decision to acquire and implement a SOAR tool, by reviewing all potentially eligible processes and compatibility with existing technology investments to identify the right candidates for automation.
  • Engage internal development teams or identify the required programming skill sets within the organization to ensure that the SOAR product can be fully leveraged.

Try VMRay Analyzer 

Try Email Threat Defender

VMRay Platform 4.3 Feature Highlights

Enter VMRay and our newly re-launched Email Threat Defender (ETD). ETD leverages the VMRay Platform, which features our best-of-breed hypervisor-based Dynamic Analysis sandbox technology.


Email phishing continues to be the most prevalent infection vector confronting enterprise security teams today. And with no end in sight to email-driven cybercrime, VMRay has been enhancing its email integration options, most recently with the introduction of IR Mailbox, an add-on feature to VMRay Analyzer and VMRay Detector.