Cloud Email Filtering

Cloud email filtering works prior to your internet gateway to block advanced phishing, spam, malware, viruses, zero-day threats, malicious attachments, graymail, denial-of-service, and inappropriate content before it reaches your networks or computers and passes only good email to your inbox.


  • Uptime SLA 99.97%
  • Reduces cost of IT
  • Dangerous email is prevented from entering networks
  • Highly configurable control panel
  • Improved employee productivity
  • Detection techniques developed and automatically implemented
  • Greatly reduces the misuse of connection and network bandwidth
  • Offers 100% guarantee against known email viruses
  • Over 120 module checks ensure minimal false positives
  • Highly scalable in seconds


  • Confidence that you will always have access to your emails
  • No ongoing maintenance, Vitanium provide & manage centrally
  • Saves time and cost of removing malicious / unwanted content
  • Configure email delivery to match your specific company needs
  • Staff aren’t wasting time sifting through unwanted emails
  • No loss of productivity due to delays in update implementation
  • Increases efficiency of work speed and employee productivity
  • Confidence that your systems and staff will not be disrupted
  • Confident that you will receive important business critical email
  • Growth of your business isn't restricted by any volume limitations


£0.99 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@vitanium.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 7 7 5 2 6 0 2 8 1 5 4 6 2 4


VSL Eleanor Poulter
Telephone: 0345 258 1500
Email: info@vitanium.com

Service scope

Service constraints
System requirements
  • Mail delivery host e.g. onsite IP(s), O365 MX record
  • Web browser to access portal

User support

Email or online ticketing support
Email or online ticketing
Support response times
Messages will be responded to within 4 hours. Messages are not monitored over the weekend, and will be dealt with on Monday.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users are able to allocate their query to either support or sales dept. this then alerts the appropriate dept. Messages can also be sent when business is 'offline' (outside working hours) these will then be saved and dealt with when office hours resume. Users are able to leave a detailed message, email, telephone details.
Web chat accessibility testing
Onsite support
Support levels
Vitanium provide support Monday to Friday 9am to 5pm via email, telephone, and web chat. All support is included within the price of the plan. Additional cost is only incurred if the customer requires Vitanium to remote onto their equipment. This will be charged at 30 minute increments at £75.00 per hour if: Vitanium have provided the appropriate email or telephone support but the customer wishes Vitanium to carry out the required remedial support.
Support available to third parties

Onboarding and offboarding

Getting started
Users have access to user documentation, unlimited telephone/email support for set up, and support knowledge base. Free trials are offered to allow customers to thoroughly test the product. We can also provide live video demos if necessary.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
End-of-contract process
We cease services at the end of the paid contract, if services are not renewed. There is no additional cost for ceasing services.

Using the service

Web browser interface
Using the web interface
The web portal allows users to view email, release messages in quarantine and adjust settings with regards to the filtering. Also can be adjusted is the delivery host (for example an on-premise IP or hostname).
Access can be granted at a company level, or individual user level.
The service cannot be initially setup through the interface as an end customer.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Users can log in to the web interface to view all quarantined email, and release to their inbox if required. Mail is logged and can be accessed at an administrator level (all mail) or a user level (specific aliases) per user. Administrative users can also adjust filtering settings and features (e.g. scanning level, spam actions, subject modifications). Whitelist/Blocklists can also be modified, down to a granular user level.
Web interface accessibility testing
Command line interface


Scaling available
Scaling type
Independence of resources
Adequate resources are provided in our data centres to cope with maximum demand, for example bandwidth. This is regularly monitored and increased if needs be.
Usage notifications


Infrastructure or application metrics
Metrics types
Other metrics
Message volume reports
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service availability is guaranteed at 99.97%. If the service is unavailable beyond this, 10% of the monthly fee is credited. 100% protection against all known viruses - if our Cloud Email Filtering service delivers a known virus to a subscriber, which then infects the subscribers system 100% monthly fee is credited. If the Cloud Email Filtering service quarantines in error more than 0.002% of legitimate emails in any given 30 days, users receive 25% credit on monthly fee. Failure to respond to users call within 1 hour for technical support, or 4 hours for email/ticket system, results in 10% credit against monthly fee.
Approach to resilience
The filtering service has been designed so that there are no single points of failure. To achieve this multiple diversely situated server clusters have been implemented. The server clusters are split between at least 2 physical sites, and have multiple power supplies, multiple network cards, and mirrored hard drives. All data is mirrored between at least 2 sites. There are multiple links between sites, taking different routes and with different presentation points to each building. Networks within sites are fully resilient, utilising multiple links between servers, switching and storage. Internet connectivity is provided via multiple Internet connections, supplied by different ISPs. The networks are protected with multiple firewalls.
Outage reporting
All service outages will be communicated first by email, and for any prolonged outage by notification on our website and support pages.

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is only granted to those users with valid credentials for the service.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All parts of service are covered.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • ISO9001 Certified
  • ISO27001 accredited data centres

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Please contact Vitanium for further information.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Please contact Vitanium for further information.
Vulnerability management type
Vulnerability management approach
Please contact Vitanium for further information.
Protective monitoring type
Protective monitoring approach
Please contact Vitanium for further information.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All incidents are recorded and tracked using ISO best practise for 'non conformance'. This prevents recurring incidents by prompting and tracking corrective actions.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
DC's are members of the EU Climate Neutral Data Centre Pact https://www.climateneutraldatacentre.net/ In particular, they run: Award Winning Fresh Air Cooling System feeds filtered outside air into the datacentre for 100% of the year. 2N resilient Evaporative Cooling System negates the need for mechanical cooling in the event outside temperatures climb. Annualised PUE of 1.2

Social Value

Fighting climate change

Fighting climate change

Please contact Vitanium for further information.
Covid-19 recovery

Covid-19 recovery

Please contact Vitanium for further information.
Tackling economic inequality

Tackling economic inequality

Please contact Vitanium for further information.
Equal opportunity

Equal opportunity

Please contact Vitanium for further information.


Please contact Vitanium for further information.


£0.99 a user a month
Discount for educational organisations
Free trial available
Description of free trial
Users can trial the service in full, for free for 30 days with full support.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@vitanium.com. Tell them what format you need. It will help if you say what assistive technology you use.