Expert Insights Verdict
IRONSCALES is a phishing protection platform, not a traditional spam filter. It sits on top of Microsoft 365 or Google Workspace and catches the targeted, socially engineered threats that native filtering misses: spear phishing, business email compromise, VIP impersonation, and account takeover. In that role, it is one of the most effective platforms we have tested. The combination of Themis, the platform's AI engine, and crowdsourced intelligence across 17,000+ organizations creates a detection model that strengthens with scale. The new agentic capabilities push IRONSCALES from reactive detection into proactive threat modeling, and the move into deepfake meeting protection shows the platform is thinking beyond the inbox. For organizations running M365 or Google Workspace, IRONSCALES remains one of the strongest phishing protection layers on the market.
Pros
-
Crowdsourced threat intelligence across 17,000+ organizations
-
Predictive red team agent proactively models likely attack scenarios
-
Deploys in under 10 minutes on M365 and GWS via Graph API with no MX record changes
-
Deepfake meeting protection for Teams
-
Highly customizable warning banners
Cons
-
The management interface could be easier to navigate now new features have been added
Bottom Line
IRONSCALES is an email security platform designed to catch advanced phishing and deepfake threats. It sits at the mailbox level inside Microsoft 365 and Google Workspace to identify and remediate advanced email threats that traditional gateways miss: spear phishing, business email compromise, VIP impersonation, and account takeover. It does this exceptionally well.
IRONSCALES has long been a leader in phishing protection. But recently, it has expanded beyond email into collaboration security, with deepfake meeting protection for Microsoft Teams that detects both face and voice impersonation and general deepfake masking.
Microsoft positions M365 and Defender as a strong native security baseline, but both Microsoft and industry analysts recognise that many organisations still deploy additional email security layers to address gaps.
The latest Microsoft benchmarking data shows that integrating ICES vendors with Microsoft Defender: improves filtering of promotional emails by an average of 13.7%, 0.29% for spam, and 0.24% for malicious content. In post-delivery filtering, Microsoft Defender on average removed 70.8% of malicious mail found in the inbox.
Since our last review, IRONSCALES has introduced three agentic AI capabilities that move the platform beyond reactive detection. A predictive red team agent scrapes employees’ public digital footprints and dark web phishing kits to generate likely attack scenarios, then tests them against the Themis blue team agent before real attacks land.
An agentic deep investigation engine (currently in beta) handles edge-case email decisions by combining web scraping and LLM analysis, surfacing its reasoning chain so administrators see what the platform concluded and why before they arrive at the console. A phishing simulation agent generates hyper-personalized test campaigns tailored to individual users’ roles and exposure. These are advances that put IRONSCALES at the leading edge of proactive threat modeling.
IRONSCALES has added spam filtering which continuously learns to distinguish between legitimate business emails and spam. The solution dynamically filters to remove spam from your inbox.
For organizations that need to secure against advanced email threats layered on top of Microsoft 365 or Google Workspace, IRONSCALES remains one of the strongest platforms in the market.
How We Reviewed IRONSCALES
This review is based on hands-on testing of the IRONSCALES email security and security awareness training platform across a Microsoft 365 environment. We looked at threat detection accuracy, crowdsourced intelligence workflows, alerting banner quality, phishing simulation capabilities, the report phishing button, Microsoft Teams protection, deployment process, and administrative workflows.
Detection & Threat Intelligence
IRONSCALES operates at the mailbox level, meaning every email it scans has already passed through Microsoft or Google’s native SPF, DKIM, and DMARC authentication checks plus any spam and malware scanning on those platforms. The platform’s job is to catch what gets through: the targeted, socially engineered attacks that traditional filtering misses.
Themis, the platform’s AI engine, uses contextual analysis to identify malicious or unusual behavior by evaluating domain reputation, send time, attachments, sender location, and content language. When an email is flagged as malicious, even if it comes from a legitimate domain, IRONSCALES blocks it as phishing without having to block all email from that sending domain.
Crowdsourced threat intelligence is the second pillar. When any IRONSCALES customer’s IT team reports an email as phishing and annotates why, that intelligence is pushed automatically to all 17,000+ customer organizations. This means a new phishing campaign reported in one organization is detected and remediated across the entire client base within minutes, before the same campaign reaches other targets. This is one of the platform’s strongest differentiators.
IRONSCALES has recently introduced two important new features. The predictive red team agent scrapes employees’ LinkedIn profiles, corporate blog content, and dark web phishing kits to generate realistic attack scenarios tailored to the organization. These scenarios are then tested against the Themis blue team agent, giving administrators visibility into which attack vectors would succeed before they are deployed by real threat actors.
The agentic SOC capabilities are a deep investigation engine (currently in beta) which handles ambiguous emails by combining web scraping, domain analysis, and LLM reasoning. Its decision chain is fully transparent so administrators see exactly what the platform analyzed and concluded, replacing the ad-hoc workflow of copying email headers into external AI tools for analysis.
IRONSCALES packages include URL and attachment scanning. Content is analyzed at delivery and re-evaluated post-delivery as new threat intelligence becomes available, which catches links and files that weaponize after the email arrives. IRONSCALES intentionally does not rewrite URLs because rewritten links can give end-users a false sense of security. Attackers can mimic rewrite syntax in phishing URLs to exploit that trust
Collaboration Security & User Protection
IRONSCALES has expanded beyond email into collaboration platform security. Microsoft Teams protection, included in the Complete Protect package, scans all links shared in Teams channels and chats, automatically blocking malicious content and replacing it with an alert explaining why the link was blocked. Administrators receive email notifications for all Teams security events and can access reporting through the management dashboard and mobile app.
Deepfake meeting protection in Microsoft Teams is a newer addition. The feature detects two distinct threat types: impersonation, where an attacker mimics a known participant’s face or voice, and general deepfake masking, where an individual uses synthetic media to disguise their identity during a video call. The system runs silently via API, with configurable end-user warnings and an admin trends dashboard. This addresses an emerging threat category — particularly relevant after high-profile cases of deepfake-enabled fraud — that most email security vendors have not yet moved to cover.
Warning banners injected into suspicious emails remain one of IRONSCALES strongest user-facing features. When an email is delivered to a user’s inbox per policy, the banner indicates risk level and explains why: first-time sender, language typical of compromise attempts, or a potentially spoofed address. Administrators can customize banners with company logos and escalation contact details. We found the banners clear, well-designed, and effective at giving users actionable context rather than generic warnings.
The report phishing button sits within each user’s email client across all devices. When a user reports a suspicious email, IRONSCALES either quarantines it or injects a warning banner for other recipients who received the same or similar message. The platform clusters similar email variants, so if several users receive subtly different versions of the same phishing campaign, IRONSCALES detects the pattern and remediates all variants together. For larger organizations, this clustering and bulk remediation capability saves significant time during active phishing campaigns.
Security Awareness Training
IRONSCALES combines phishing simulation campaigns with video-based training content from IRONSCALES, WIZER, and third-party providers including NINJIO, Habitu8, and Cyber Maniacs. The platform’s strength lies in its simulation capabilities rather than general awareness content delivery.
Phishing simulation templates are based on real-world examples analyzed daily and are fully customizable, supporting 26 languages for global deployments. Administrators can target simulations at individual users, user groups, or departments, and users report simulations via the same report phishing button used for real threats. This creates a unified workflow where the distinction between simulation and real threat is invisible to the end user, which is exactly how effective training should work.
The new phishing simulation agent, introduced as part of IRONSCALES agentic AI suite, generates hyper-personalized test campaigns tailored to individual users’ roles and exposure profiles. This represents a step-change from the template-based approach in previous versions and puts IRONSCALES closer to the leading edge of simulation sophistication, though we have not yet completed extended testing of this capability.
IRONSCALES have introduced major improvements to its security awareness training module across recent updates. IRONSCALES now offers quizzes as part of our SAT and with GPT-powered spear phishing. Training can be completely customized per employee. The simulation capabilities are strong — particularly when deployed alongside the email security platform, where simulation results and real threat data feed into the same analytics.
Deployment & Ease of Use
IRONSCALES integrates with Microsoft 365 via Graph API, with no MX record changes, mail flow rules, or connector configuration required. Deployment in a Microsoft 365 environment takes approximately 5 to 10 minutes. Because IRONSCALES integrates with Microsoft 365 and Google Workspace at the API level, phishing simulations are injected directly into mailboxes rather than routed through an external mail flow. This removes the need for administrators to maintain allowlists for simulation sending domains, a step that is otherwise required when using third-party simulation tools or self-created sending domains alongside Microsoft Defender for Office 365
The management interface is functional and offers deep capability, but it shows the weight of years of feature additions. Each new module has brought new tabs, menus, and dashboard options, and the result is an interface that takes time to learn. Experienced administrators will find everything they need, but the onboarding curve for new users is steeper than competitors with cleaner, more modern console designs. IRONSCALES is aware of this and has been working on interface improvements, but as of this review, navigation remains the platform’s weakest user experience element.
The platform is compatible with Microsoft 365 and Google Workspace. Its go-to-market strategy runs primarily through MSP and VAR channels, with the company serving 17,000+ customers from offices in the US (Atlanta headquarters), Israel (product and engineering), and the UK.
Commercials
IRONSCALES is available through a tiered packaging model. The Starter package includes phishing simulation testing at no cost. Email Protect adds the full email security suite including BEC protection, ransomware and malware scanning, credential theft prevention, and crowdsourced threat intelligence. Complete Protect adds account takeover detection and response, Microsoft Teams protection, and expanded training functionality.
IRONSCALES is in the process of restructuring its packaging. The new model will introduce Email Protect for inbound security, Email Protect 360 for inbound and outbound coverage, and standalone product lines for deepfake meeting protection and security awareness training. According to IRONSCALES, the new packaging is expected to ship in mid-2026. We will update this review once the new structure is live.
Volume discounts are available for larger organizations, and IRONSCALES offers special pricing for education and government institutions. Per-mailbox pricing is published on the IRONSCALES website and varies by package and organization size. The pricing is competitive within the ICES and phishing protection segments, and the Starter package’s free simulation testing provides a low-friction entry point for organizations evaluating the platform.
Our Verdict
IRONSCALES occupies a distinct position in the email security market. It is not trying to replace your spam filter or your secure email gateway. It is designed to sit on top of Microsoft 365 or Google Workspace and catch the advanced, socially engineered threats that traditional filtering misses. In that role, it is one of the most effective platforms we have tested.
The combination of AI-powered detection and crowdsourced human intelligence creates a detection model that improves with scale — every customer organization that reports a threat strengthens protection for the entire community. The new agentic capabilities, particularly the predictive red team agent, push the platform from reactive detection into proactive threat modeling territory that most competitors have not reached. The expansion into deepfake meeting protection shows IRONSCALES is thinking beyond the inbox about where communication-based threats are heading.
We recommend IRONSCALES for organizations of any size using Microsoft 365 or Google Workspace that want heightened protection against phishing, BEC, and account takeover layered on top of their existing email infrastructure. It is a particularly strong fit for organizations that already have a gateway or rely on Microsoft Defender and need a dedicated phishing protection layer to close the gap on advanced threats. The phishing simulation capabilities make it a compelling option for security teams that want detection and training under one roof, provided they accept that the training content side is functional rather than category-leading.