HomePricingEmail Security
ICES · Anti-Phishing · BEC Defense · DLP · Encryption · SAT · M365 ITDR

Email Security
Pricing & Programs

Email security is seat-based and environment-specific. We deploy, configure, and manage Check Point Harmony Email & Collaboration (ICES) and Petra Security (M365 ITDR) as partner-authorized resellers. Every quote starts with a scoping call — no assumptions, no generic estimates.

Pricing is per seat per month. Quoted after a scoping call.

Looking for email deliverability monitoring plans?

Program 1 of 2 · Powered by Check Point Harmony Email & Collaboration

Integrated Cloud Email Security (ICES)

API-native cloud email security for Microsoft 365 and Google Workspace. Connects directly to your tenant — no MX record changes, no mail-flow risk, 30–60 minute deployment. Blocks phishing, BEC, malicious attachments, and data exfiltration before they reach the inbox.

Pricing is per seat per month. Minimum seat counts apply. Contact for a quote tailored to your environment and user count.

Anti-Phishing & BEC Defense

AI behavioral analysis detects business email compromise, display-name spoofing, lookalike domains, and vendor email compromise — threats that bypass standard filters.

  • BEC & impersonation detection
  • URL time-of-click scanning
  • Attachment sandboxing & detonation
  • Account takeover prevention

Data Loss Prevention (DLP)

Policy-driven controls that detect and block PII, PHI, PCI, and intellectual property from leaving your organization — with compliance reporting for HIPAA, GDPR, CCPA, and FINRA.

  • Sensitive data pattern library
  • Block, quarantine & alert rules
  • False positive tuning
  • Incident response workflow

Email Encryption

End-to-end protection for sensitive communications: S/MIME certificates, TLS enforcement, and gateway-level encryption with full certificate lifecycle management.

  • S/MIME certificate deployment
  • TLS enforcement (inbound & outbound)
  • Gateway encryption (Purview, Virtru, Zix)
  • Certificate lifecycle management

Archiving, Journaling & eDiscovery

Transport-level capture of every message before delivery — tamper-proof, searchable, and export-ready for SEC, FINRA, HIPAA, and litigation hold requirements.

  • M365 & Google Workspace journaling
  • Third-party archiving platforms
  • Legal hold & eDiscovery workflows
  • WORM-compliant storage (SEC 17a-4)

Security Awareness Training

Simulated phishing campaigns with realistic lures, automated micro-training for employees who click, and risk scoring dashboards that give measurable, reportable results.

  • Monthly simulated phishing campaigns
  • Graymail & spam recognition exercises
  • Per-employee risk scoring
  • Executive & board-level reporting

Deployment

30–60 minutes. Zero MX changes. Zero mail-flow disruption.

Platform

Check Point Harmony Email & Collaboration — API-native, pre-delivery protection.

Pricing model

Per seat per month. Quoted after scoping call. No generic estimates.

Program 2 of 2 · Powered by Petra Security

M365 Identity Threat Detection & Response (ITDR)

Built from the ground up to detect and stop BEC and token theft in Microsoft 365. Petra monitors identity behavior continuously — detecting compromised accounts, reconstructing attack timelines, and remediating threats before damage spreads. API-native, 30-minute setup, no tuning required.

Pricing is per seat per month. Quoted after a scoping call. Built for organizations and MSPs running Microsoft 365.

BEC & Token Theft Detection

AI-speed detection of business email compromise and OAuth token theft in M365

Attack Timeline & Forensics

Step-by-step attack reconstruction — what the attacker did, what they touched, when

Full Remediation

Automated containment and remediation — not just alerts, actual resolution

Multi-Tenant MSP Console

Manage all client environments from a single pane, built for MSPs

Instant Forensics Report

Client-ready incident report generated automatically — clear, defensible, shareable

30-Minute Setup

API-native M365 connection — no agents, no MX changes, no tuning required

How it compares

Petra is consistently rated faster than Huntress ITDR, SaaS Alerts, and Blackpoint Cloud Response by MSPs who have run head-to-head comparisons. The differentiator is detection speed and remediation depth — not just alerting, but actually resolving the incident.

Program 3 of 3 · Powered by IntelliThreat AI

Autonomous M365 SOC

AI-driven threat triage and response for Microsoft 365 — continuously monitoring for phishing, account compromise, data exfiltration, and insider threats. Autonomous containment without a full in-house SOC team.

Autonomous Triage

AI classifies and prioritizes every alert automatically — no manual review queue

Account Compromise Containment

Detects and contains compromised M365 accounts in real time before damage spreads

Data Exfiltration Detection

Monitors for unusual data movement, forwarding rules, and bulk download activity

Insider Threat Monitoring

Behavioral baselines flag anomalous activity from internal users and service accounts

Compliance Violations

Detects policy violations across M365 workloads — email, Teams, SharePoint, OneDrive

Alert Fatigue Elimination

Reduces noise by correlating signals across the M365 environment into actionable incidents

Why IntelliThreat AI

Most organizations cannot afford a 24/7 SOC team. IntelliThreat AI delivers autonomous SOC-level coverage for M365 — triaging alerts, containing compromised accounts, and surfacing actionable incidents without requiring dedicated security analysts. It complements ICES and Petra by covering the full M365 workload, not just email.

Why run both?

ICES and Petra address different parts of the same threat. Together they give you the coverage that enterprise security teams build toward — delivered as a managed service.

01

ICES stops the phish before it lands.

Check Point Harmony Email & Collaboration connects via API to your M365 or Google Workspace tenant, scanning every message before it reaches the inbox — blocking phishing, BEC, malicious attachments, and data exfiltration attempts at the point of delivery.

02

Petra catches the account if one gets through.

Petra Security monitors M365 identity and behavior continuously. If a credential is compromised — through a successful phish, a password spray, or token theft — Petra detects the anomaly, reconstructs the attack timeline, and remediates before damage spreads.

03

Together: prevention + detection + response.

ICES reduces the attack surface. Petra closes the gap that remains. Most organizations have neither. Running both gives you the coverage that enterprise security teams build toward — delivered as a managed service.

Who this is for

These programs are most relevant for organizations in regulated industries running Microsoft 365, and MSPs managing multiple M365 tenants.

No email security layer yet

ICES is the right first deployment for M365 and Google Workspace

Post-BEC or post-phish recovery

Petra shows exactly what happened and closes the gap ICES leaves

SEG already in place

We assess whether to run ICES alongside, replace, or layer both

MSPs managing M365 tenants

Petra's multi-tenant console manages all client environments from a single pane

Regulated industries

HIPAA, FINRA, SEC, GDPR, CCPA, SOC 2 — DLP and journaling included

Compliance audit coming up

Security awareness training records and DLP incident logs, ready to export

What happens when you reach out

No sales pitch. No commitment required. A scoping call to understand your environment and give you an accurate quote.

01

Scoping call

We ask about your environment: M365 or Google Workspace, user count, current security stack, and compliance requirements.

02

Tailored quote

You receive a per-seat quote for ICES, Petra, or both — with a clear breakdown of what is included and what is not.

03

30–60 minute deployment

API-native connection to your tenant. No MX changes. No mail-flow disruption. You see results the same day.

Start with a scoping call

Get a quote for your environment.

Pricing is per seat per month and depends on your user count, platform, and compliance requirements. We scope it accurately — no generic estimates.

Also available: email deliverability monitoring plans starting at $47/month. View deliverability pricing →