{"id":11587,"date":"2026-01-20T14:43:51","date_gmt":"2026-01-20T13:43:51","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/warum-echte-e-mail-security-mehr-braucht-als-einen-single-vendor-ansatz\/"},"modified":"2026-01-26T11:50:44","modified_gmt":"2026-01-26T10:50:44","slug":"why-true-email-security-requires-a-multi-vendor-approach","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/","title":{"rendered":"Why True Email Security Requires a Multi-Vendor Approach"},"content":{"rendered":"\n

Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers. This is where Retarus comes in.<\/p>\n\n\n\n

Multi-engine approach trumps single-powered solutions<\/h2>\n\n\n\n

At Retarus, we have decided to pursue a different path to many conventional, proprietary security providers. Rather than relying on a single vendor<\/em> when it comes to filtering and sourcing data, Retarus Email Security<\/a> makes use of multiple independent scan engines, components, mechanisms and data sources. Continuously monitoring and evaluating these tools in terms of quality, speed and efficiency allows them to be combined and optimized to achieve the most effective outcomes. As a consequence, new threats can be detected immediately, the respective sources can be assessed dynamically, and a final rating can be derived using proprietary rules. And most importantly, all of this happens under the hood without the customer having to get actively involved in the optimization process.<\/p>\n\n\n\n

Retarus\u2019 analyses confirm: More engines, more security<\/h2>\n\n\n\n

Research conducted at Retarus shows that in conventional anti-virus protection, at times just one<\/em><\/strong> of the independently operating scan engines sounds the alarm for 18.8 percent of<\/strong> threats<\/strong>. In other words, a single engine is often alone in detecting threats all others simply overlook. This underscores just how important a multi-vendor approach is \u2013 even when it comes to conventional antivirus protection. What\u2019s more, when an email is filtered out at an early stage, it no longer needs to be subjected to time and cost intensive AI phishing engines and sandbox checks later on. This allows Retarus not only to achieve extremely short processing times<\/a>, but also ensures cost-efficient protection at all times.<\/p>\n\n\n\n

Negligible false positive rates across all attack types<\/h2>\n\n\n\n

Of course, the quality has to meet expecations. One of the core quality indicators for any email security solution is the false positive rate, in other words the percentage of legitimate emails that are incorrectly blocked. For administrators, this remains one of the most consequential pain points \u2013 after all, each erroneously blocked email entails avoidable support tickets, user frustration and additional helpdesk workload.   <\/p>\n\n\n\n

Our data reveals false positive rates across all email attack types of between 0.0013 and 0.0056 percent<\/strong> depending on the customer profile. Employing a combination of various engines also plays a significant role in achieving these negligible values. Erroneous classification by a single data source is balanced out by other sources. With more than 30 years of experience in the email business, this is where Retarus truly stands out.<\/p>\n\n\n\n

Phishing detection with a dual net to prevent false negatives<\/h2>\n\n\n\n

Estimating false negatives, on the other hand, is considerably more complex. Research on the reporting behavior of users has shown that the reporting of emails is often inconsistent and generally provides low quality data. Users tend to report emails they perceive to be suspect or bothersome, irrespective of how dangerous they really are.<\/p>\n\n\n\n

That\u2019s why Retarus additionally compares its results with external benchmarks to ensure a realistic assessment of our filter quality. The analysis of suspected phishing cases proves just how sound our approach is. Fewer than 0.3 percent of all phishing emails reported by users <\/strong>could be traced back to a filter error. This is achieved by means of a dual net approach \u2013 two anti-phishing engines operate independently of each other, employing various AI techniques, to each reach their own verdict. However, the final decision is still based on the valuable experience of Retarus\u2019 developers.<\/p>\n\n\n\n

Ongoing adaptation and fine-tuning at no extra cost to our customers<\/h2>\n\n\n\n

To maintain this high level of protection and quality for our customers, our teams are constantly monitoring all scan engines and data sources. Success rates are evaluated, customer feedback is systematically analyzed, and the combination of algorithms and data sources is adjusted dynamically to optimize outcomes. If necessary, less effective sources are replaced and those performing well are given more prominent weighting. This all transpires without any disruption to our operations and is fully transparent for our users at all times.<\/p>\n","protected":false},"excerpt":{"rendered":"

Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.<\/p>\n","protected":false},"author":12,"featured_media":11588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[8],"tags":[102],"class_list":["post-11587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-email-security"],"acf":[],"yoast_head":"\nWhy True Email Security Requires a Multi-Vendor Approach - Retarus Corporate Blog - EN<\/title>\n<meta name=\"description\" content=\"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why True Email Security Requires a Multi-Vendor Approach\" \/>\n<meta property=\"og:description\" content=\"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T13:43:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T10:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"S\u00f6ren Schulte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S\u00f6ren Schulte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\"},\"author\":{\"name\":\"S\u00f6ren Schulte\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d\"},\"headline\":\"Why True Email Security Requires a Multi-Vendor Approach\",\"datePublished\":\"2026-01-20T13:43:51+00:00\",\"dateModified\":\"2026-01-26T10:50:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\"},\"wordCount\":695,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg\",\"keywords\":[\"Email Security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\",\"name\":\"Why True Email Security Requires a Multi-Vendor Approach - Retarus Corporate Blog - EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg\",\"datePublished\":\"2026-01-20T13:43:51+00:00\",\"dateModified\":\"2026-01-26T10:50:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d\"},\"description\":\"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg\",\"contentUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why True Email Security Requires a Multi-Vendor Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d\",\"name\":\"S\u00f6ren Schulte\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/author\/sschulte\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why True Email Security Requires a Multi-Vendor Approach - Retarus Corporate Blog - EN","description":"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/","og_locale":"en_US","og_type":"article","og_title":"Why True Email Security Requires a Multi-Vendor Approach","og_description":"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.","og_url":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2026-01-20T13:43:51+00:00","article_modified_time":"2026-01-26T10:50:44+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg","type":"image\/jpeg"}],"author":"S\u00f6ren Schulte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"S\u00f6ren Schulte","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#article","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/"},"author":{"name":"S\u00f6ren Schulte","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"headline":"Why True Email Security Requires a Multi-Vendor Approach","datePublished":"2026-01-20T13:43:51+00:00","dateModified":"2026-01-26T10:50:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/"},"wordCount":695,"commentCount":0,"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg","keywords":["Email Security"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/","url":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/","name":"Why True Email Security Requires a Multi-Vendor Approach - Retarus Corporate Blog - EN","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg","datePublished":"2026-01-20T13:43:51+00:00","dateModified":"2026-01-26T10:50:44+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"description":"Managers in charge of ensuring security at enterprises face constantly changing, ever evolving email-based attacks. Conventional safeguarding mechanisms and rigid data sources soon come up against their limits. Companies need solutions which continuously adapt to meet new threats without requiring enterprises to continually restructure their own infrastructures or change providers.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2026\/01\/AdobeStock_928017170.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/why-true-email-security-requires-a-multi-vendor-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Why True Email Security Requires a Multi-Vendor Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d","name":"S\u00f6ren Schulte","url":"https:\/\/www.retarus.com\/blog\/en\/author\/sschulte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=11587"}],"version-history":[{"count":1,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11587\/revisions"}],"predecessor-version":[{"id":11590,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11587\/revisions\/11590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/11588"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=11587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=11587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=11587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}