Cheddar IT
Book a call1300 757 632
Email Security

Secure your communication channel.

An email spam filtering engine that scans for malformed emails and secures your communication channel. Multilayered detection, smart search, and granular control.

Phishing & BEC protection
Phishing & BEC protection
Capabilities

What's included

Phishing, BEC & fraud protection
Stops phishing, business email compromise, payment redirect and supplier-invoicing fraud — including attacks from already-compromised supplier mailboxes.
Multilayered detection
Sender reputation, content analysis, computer-vision brand impersonation, and URL sandboxing layered together. No single signal gets to decide.
URL rewriting & sandboxing
Links rewritten at delivery and detonated in a sandbox on click — so a URL that goes malicious after delivery still gets blocked when the user clicks it.
Warning tags & in-client reporting
Suspicious messages tagged automatically; users report directly from the tag with one click — no forwarding to phishing@ that nobody monitors.
Encryption & DLP
Policy-based outbound encryption for sensitive content, DLP for credit cards, TFNs and bespoke patterns, and optional message-level encryption for regulated industries.
DMARC, SPF & DKIM
We set up and monitor your authentication records — including DMARC aggregate reports — so your domain can't be spoofed and your legitimate mail actually lands.
Graymail & bulk-mail filtering
Newsletters, marketing blasts and other low-priority bulk mail are identified separately from real spam — and each user gets per-mailbox control over how strict their own bulk filter is.
Every engagement includes
Phishing & BEC protection
Payment redirect fraud prevention
URL rewriting & click-time sandboxing
Attachment sandbox detonation
Brand impersonation detection
Multilayered reputation & content analysis
Automatic warning tags on suspicious email
In-client phish reporting button
DMARC, SPF & DKIM configuration & monitoring
Graymail / bulk-mail filtering with per-user control
Outbound encryption & DLP policies
Post-delivery remediation (auto-pull)
Service levels

The SLAs, on paper

No weasel-words. These are the response and resolution commitments we write into the contract.

Classification
Response
Resolution
Compromised mailbox response
15 min
1 hour
Phishing report triage
30 min
2 hours
Post-delivery remediation (pull)
15 min
30 min
Policy change
2 hours
Same day
Forensic trace request
4 hours
Business day
FAQ

What clients ask before signing

Phishing, BEC, payment redirect, and supplier invoicing fraud from compromised accounts.
Suspicious messages are automatically tagged and users can report directly from the warning tag in their mailbox.
Yes — pinpoint hard-to-find log data with dozens of search criteria, and trace where emails come from and go to.
Post-delivery remediation pulls the message from every mailbox that received it — including inboxes, subfolders and already-read copies. Typically complete within 30 minutes of detection.
Yes. We take your domain from monitor to quarantine to reject — carefully, with aggregate-report analysis so we don't accidentally block your own marketing system. Most clients reach p=reject in 8–12 weeks.
Usually complements it. Defender covers the basics well; a dedicated gateway adds better BEC detection, faster remediation, and consolidated reporting across non-Microsoft mail systems. We'll tell you if one alone is enough.
Next step

30 minutes.
One straight answer.

Book a discovery call with one of our principal engineers. We'll look at what's actually breaking, and tell you whether we're the right fit — straight up.