DefendDomain

The Gaps in Secure Email Gateways

Secure Email Gateways protect corporate inboxes — and they do it well. But attackers increasingly bypass email entirely, reaching employees and customers via SMS, social media, personal email, search ads, and QR codes. Your gateway can't filter what it never sees.

The Misconception

“Our email gateway catches phishing before it reaches anyone.”

85%
of organisations experienced callback phishing that bypasses email filtering (Proofpoint 2024)
$4.88M
Average cost of a data breach (IBM 2024)
1,265%
Increase in malicious phishing emails since ChatGPT (SlashNext)
82%
of phishing sites now target mobile devices (Zimperium 2024)

Anatomy of the Blind Spot

What Email Gateways Protect — and Where They Stop

SEGs scan and filter everything that flows through your corporate email infrastructure. That's a critical layer — but the attack surface extends far beyond the inbox.

What SEGs Do Well

  • Filter known malicious URLs and attachments
  • Block emails matching known phishing signatures
  • Quarantine suspicious inbound emails
  • Provide URL rewriting and sandboxing

Where SEGs Stop

  • No visibility into SMS/text message phishing (smishing)
  • Cannot monitor social media DMs or fake profiles
  • Blind to phishing via personal email accounts
  • No coverage for malicious QR codes
  • Cannot detect the source domains powering attacks

Email gateways are essential but scoped to one channel. Attackers know this — and they're systematically shifting to channels where gateway telemetry doesn't exist.

The Attacker's Playbook

How Attackers Bypass Email Gateways

Attackers don't need to defeat your gateway — they simply avoid it. By choosing a different delivery channel, the entire email security stack becomes irrelevant.

1

Register a Lookalike Domain

Set up infrastructure that mimics the target brand — cloned login pages, matching brand assets, legitimate SSL certificates. The email gateway has no awareness of this external setup.

2

Choose a Non-Email Channel

Instead of targeting corporate inboxes, the attacker sends phishing links via SMS, LinkedIn DMs, WhatsApp, or malicious Google Ads. None of these channels route through email security.

3

Target Personal Devices

Employees and customers access phishing on personal phones and laptops where no corporate gateway exists. Mobile browsers offer fewer visual cues and no URL reputation checks.

4

Harvest Credentials

Victims enter credentials on the fake site. The gateway never saw the link because it was never delivered via corporate email. There are no logs, no alerts, and no quarantine records.

5

Pivot Into Corporate Systems

Stolen personal or reused credentials grant access to corporate systems. The breach originated entirely outside the gateway’s scope — IR teams have no starting point in their usual telemetry.

Real-World Impact

What Happens When Attacks Bypass Your Gateway

Organisations with best-in-class email security still experience brand impersonation attacks — because the fastest-growing attack vectors never touch email infrastructure.

89%
of organisations experienced phishing via channels their email gateway doesn’t cover
3.5x
Smishing click-through rates vs email phishing
71%
of organisations experienced voice phishing in 2023 (Proofpoint 2024)
67%
of organisations targeted by SMS phishing campaigns in 2023 (Proofpoint 2024)

Customer-Targeted Attacks

Customers receive phishing via SMS or social media using your brand. Your email gateway has no visibility into these campaigns, and customers blame you regardless of where the attack originated.

BYOD & Personal Device Exposure

Employees access phishing on personal devices outside MDM and gateway controls. Credentials harvested on personal devices provide the same access as corporate ones — without any corporate telemetry.

Supply Chain Phishing

Partners and vendors targeted via non-email channels can compromise your supply chain without ever touching your email infrastructure. The lateral risk extends well beyond your own inbox.

Blind Incident Response

When attacks bypass the gateway, IR teams lack the telemetry they rely on. Investigation starts from scratch without header analysis or gateway logs — adding critical hours to response time.

The Missing Layer

How DefendDomain Covers What Gateways Miss

Email gateways filter what arrives in the inbox. DefendDomain monitors the attacker's infrastructure at the source — catching threats regardless of which channel they're delivered through.

Layer 1

Domain Monitoring

Discovers lookalike domains regardless of how they’ll be used — email, SMS, social, or web. Catches the infrastructure before any message is sent through any channel.

Layer 2

Security Embeds

Detects when your website or login pages are cloned, regardless of how victims are directed there. Works across every channel because it monitors the destination, not the delivery path.

Layer 4

Certificate Monitoring

Catches SSL certificates issued for impersonating domains in near real-time. Certificate setup is channel-agnostic — the same cert enables phishing via any vector.

Email Gateway vs DefendDomain

They solve different problems. Your gateway filters inbound email. DefendDomain monitors the attacker infrastructure that fuels every channel.

Capability
Email Gateway
DefendDomain
ScopeCorporate inbox onlyAll external infrastructure
Channel coverageEmailEmail, SMS, web, social, search, QR
Detection methodContent scanning & signaturesInfrastructure monitoring at source
Personal devicesNo coverageProtected (monitors source, not endpoint)
Customer protectionNot applicableFull lookalike domain monitoring
TimingReactive (blocks known threats)Proactive (catches infrastructure setup)
Attacker-owned domainsInvisibleContinuously monitored

Bottom line: Keep your email gateway — it's essential for inbox protection. Add DefendDomain to see everything happening outside that inbox — across every channel attackers are actually using.

Frequently Asked Questions

Common questions about email gateway limitations and multi-channel threat monitoring.

See What Your Gateway Can't Show You

Request a free threat assessment and we'll reveal how many lookalike domains target your brand across channels your gateway doesn't cover.

See attacks targeting your brand outside email
Understand multi-channel threat exposure
Get actionable intelligence across all vectors
No obligation — just clarity on your blind spots
DefendDomain team member

Speak with our team

We'll walk you through the platform and show you exactly what's happening beyond your email gateway's perimeter.

Request Your Free Assessment

Real threats targeting your domainExpert consultation, not a sales pitchNo obligation