Email Security Gateway: What It Is and How It Protects You
An email security gateway sits between the internet and your inbox, scanning every inbound and outbound message for phishing, malware, spam and data loss risks before they reach staff. It is one of the most impactful single controls a business can deploy.
Nathan Hill-Haimes
Technical Director
What is an email security gateway?
An email security gateway is a system — delivered as a cloud service, on-premise appliance, or integrated platform component — that processes every email entering or leaving your organisation before it reaches its destination. Think of it as a checkpoint at the boundary of your email infrastructure, applying multiple scanning techniques to identify threats and enforce policy.
In the cloud-first world most UK businesses now operate in, gateways are almost always cloud-based services that sit in the email delivery path: inbound email routes through the gateway before reaching Microsoft 365 or Google Workspace, and outbound email passes through the gateway on the way to the recipient. This architecture requires no on-premise hardware and scales automatically with email volume.
What an email security gateway does
Anti-spam and bulk mail filtering
The most basic function: identifying and filtering unsolicited bulk email so it does not reach the inbox. Modern spam filtering uses machine learning and reputation scoring of sending domains and IP addresses, achieving high catch rates. Most businesses have some form of spam filtering, but the quality varies significantly between a basic provider filter and a dedicated gateway.
Anti-malware and attachment scanning
Every inbound attachment is scanned against known malware signatures and analysed for suspicious characteristics. Macro-enabled Office documents, executable files, and archive formats (.zip, .7z) receive particular scrutiny. Advanced gateways use sandboxing — executing attachments in an isolated environment to observe their behaviour — to catch threats with no known signature.
Anti-phishing and impersonation detection
This is where modern gateways add significant value over basic filtering. Anti-phishing capabilities include:
- Detection of emails impersonating your own domain or commonly impersonated brands
- Analysis of email headers, sender reputation and message content for phishing indicators
- URL scanning at delivery time and, in more advanced implementations, at the time of click (safe links)
- Business email compromise (BEC) detection using machine learning trained on the patterns of CEO or CFO impersonation attacks
Outbound scanning and data loss prevention
Gateways scan outbound email as well as inbound. This serves two purposes: preventing your systems from sending malware to customers and partners if they are compromised, and enforcing data loss prevention policies that flag or block messages containing sensitive data such as payment card numbers, NHS numbers or confidential document keywords.
Gateway deployment options
Microsoft Defender for Office 365
Organisations using Microsoft 365 Business Premium or higher have Microsoft's gateway capabilities built in. Defender for Office 365 Plan 1 includes anti-phishing policies, safe links, safe attachments and anti-malware scanning. Plan 2, available in Microsoft 365 E3/E5 or as an add-on, adds advanced hunting, automated investigation and response. For many SMEs, Business Premium's included Defender capabilities are a sensible starting point.
Third-party gateway solutions
Products such as Mimecast, Proofpoint, Barracuda and Abnormal Security sit in front of Microsoft 365 or Google Workspace, providing an additional filtering layer with different detection logic. Third-party gateways typically offer more granular reporting, richer admin controls, and — in the case of Abnormal Security specifically — an AI-driven approach to detecting BEC and social engineering attacks that differs significantly from Microsoft's methodology.
Layering a third-party gateway with Microsoft's native protection is a common configuration for UK businesses in regulated sectors, financial services, legal, and healthcare, where a single detection failure carries high cost.
What a gateway does not cover
An email security gateway operates at the message level. It does not protect against:
- Compromised legitimate accounts sending phishing from real, authenticated inboxes (a gateway will deliver email from a genuine Microsoft 365 account that has been taken over)
- Social engineering attacks with no malicious links or attachments — a phone call or an email requesting bank account changes with no malicious payload passes gateway checks
- Post-delivery threats where a URL was clean at delivery but subsequently changed to host malicious content (mitigated by time-of-click URL scanning)
These gaps are why MFA, user training and account monitoring are necessary complements to gateway technology rather than optional additions.
AMVIA configures and manages email security gateways for UK businesses as part of its managed cybersecurity services, including ongoing policy tuning and threat response.
How to choose the right gateway for your business
For most UK SMEs, Microsoft 365 Business Premium's included Defender for Office 365 capabilities are a solid and cost-effective starting point. Businesses requiring additional depth — those in regulated sectors, those who have experienced previous email-based incidents, or those with complex outbound DLP requirements — should evaluate a third-party gateway. Pricing for third-party cloud gateways typically starts from £2–£4 per user per month. The total cost of a single successful phishing attack almost always exceeds months of gateway subscription fees.
Is Your Email Gateway Properly Configured?
Having a gateway is not the same as having it correctly configured. AMVIA can review your current email security setup and close the gaps that leave businesses exposed.
Frequently Asked Questions
Microsoft 365 Business Premium includes Defender for Office 365 Plan 1, which provides a solid baseline. Most SMEs without specific regulatory requirements will find this sufficient when properly configured. Businesses in high-risk sectors, those who have experienced previous incidents, or those requiring advanced BEC detection may benefit from an additional third-party gateway layer.
Safe links rewrites URLs in inbound emails so that when a user clicks a link, they are first routed through Microsoft's (or the gateway vendor's) threat intelligence service, which checks the destination in real time. If the URL has become malicious since the email was delivered — a common tactic known as time-of-click attacks — the user is blocked. Safe links is available in Microsoft Defender for Office 365.
All email security systems can be bypassed by sufficiently sophisticated attackers. Common bypass techniques include using newly registered domains with no negative reputation, sending attacks via compromised legitimate accounts, using links that are clean at delivery but malicious at click, and social engineering that contains no malicious payloads. Layered controls address these vectors.
Cloud-based gateways introduce minimal latency — typically under a second for message processing. Most users do not notice any difference in email delivery times. Complex sandboxing of attachments can introduce a brief hold on delivery whilst the attachment is analysed, but this is usually seconds rather than minutes.
Email quarantine holds messages that have been flagged as suspicious but not definitively identified as malicious, or that have exceeded confidence thresholds for policy-based actions. Users should receive regular quarantine digests and be able to release messages they are confident are legitimate. IT administrators should review quarantine regularly to tune policies and identify emerging attack patterns.
Email gateways with data loss prevention (DLP) capabilities can scan outbound email for patterns that match personal data — national insurance numbers, payment card numbers, health information — and block or flag messages that may breach UK GDPR obligations. This does not replace a full data protection programme but provides an important technical control against accidental or deliberate data exposure via email.
Related Reading
Email Protection: Layers of Defence Explained
How email gateways fit into a complete layered email protection strategy for business.
Email Security Risks
The biggest email security threats facing UK businesses and how to mitigate them.
Email Security Fundamentals
Understanding the four pillars of business email security from authentication to user training.