Stop Threats Right at the Email Gateway

Secure your network as soon as possible! Block viruses, spam, phishing and business email compromise (BEC) before they reach your inboxes.

Effective, Multi-Faceted Protection

Multiple anti-virus and anti-phishing engines, combined with AI and your own policies – powered by decades of experience and patented innovations.

Uncompromising Security, Minimal Effort

Benefit from continually expanding data sources, algorithms and AI/ML models – with no efforts on your part. Easy, dependable, future-proof.

MS 365 Connection Preferred?

Explore our ICES deployment model, with connectors for Microsoft 365 and more.

Read more

Monitoring and Control for Admins and Users

Get the whole picture with detailed reports and dashboards in the admin portal and via self-service in the online quarantine for your users.
myEAS Dashboard

Customer Ratings and Reviews

“Our mail users have no troubles with using the processes related to Retarus. Releasing spam, maintaining personal black- and whitelists and understanding the need of an antispam/antimalware protection.”

Read full review IT Services, Management / Business Consulting

“In Retarus we have found a dependable partner for our email communications. Thanks to their reliable and innovative solutions, we are very well protected against any threats, both now and in the future.”

Read customer story Stefan Hopf, Head of Messaging and Collaboration, Continental AG

“Retarus Email Security is highly reliable and provides excellent detection rates.”

Read customer story Kurt Walther, Director Global IT and Business Intelligence, Puma AG

“Retarus is now so established at medbo that we simply think of you first whenever it comes to email. We get the impression that you all know what you’re doing.”

Read customer story Jürgen Schmalzbauer, Data Center Manager, medbo

“In a few words : The service works fine. It's easy to maintain and nearly self explaining. Our users are very pleased with Retarus. ”

Read full review Consumer Goods, IT

Explore Our Security Portfolio

Retarus Is a Radicati “Top Player”

Discover why leading analysts consistently rank Retarus among the top email security providers.

Read more

News, Trends and Insights

Keep up to date on important product and sector developments with our corporate blog.

Read more

Product Info at a Glance

Find data sheets, manuals, and more in our Product Documentation Center.

Read more

Our Experience, Your Advantage

Discover how we help companies around the globe to secure their email communication effectively.

Read more

Frequently Asked Questions

How is the Retarus Secure Email Gateway implemented?

Implementing the Secure Email Gateway is incredibly simple: Just a quick MX record change is all it takes – no need to adapt your existing infrastructure. This is ideal for uniform, hybrid, or distributed IT environments. For pure Microsoft 365 setups, an ICES deployment model is also available.

Can I also integrate my existing SIEM tools or other security components?

Yes, absolutely. We transmit diverse event types to well-known SIEM systems via standardized interfaces. Our experts also have extensive project experience in seamlessly integrating other third-party security components our customers might use, like encryption or sandboxing solutions.

How is post-delivery protection achieved?

Our Europe-patented Retarus Patient Zero Detection identifies potentially dangerous emails even after delivery, triggering warnings and enabling an automated clawback function. Additionally, our Time-of-Click Protection analyzes all links in real-time using URL rewriting.

How can my users interact with the email security service?

Retarus provides a user-friendly online quarantine portal with daily email digests in 11 languages. Users can view and release quarantined emails, in addition to managing their personal block and allow lists. This significantly reduces the volume of helpdesk tickets and improves user awareness.

Is the solution GDPR compliant?

Absolutely. Retarus always processes all data exclusively in self-operated data centers, consciously opting against hyperscalers. Local processing is contractually guaranteed. We provide tamper-proof logs, compliance documentation and actively support customer-specific audits – especially crucial for regulated sectors. Headquartered in Germany and with no external investors, we offer our customers maximum data sovereignty – reliably, even in politically challenging times. Learn more on this topic here.