Keep the scanner inside your infrastructure, not someone else's.
Deploy a private IsThisSpam stack across your approved infrastructure, retain your own telemetry and rules, and shape detections around your finance flows, vendor graph, executives, and internal operating model.
Why teams buy this
Built for enterprise security, IT, and platform teams that need private inference, governance, and organization-specific detection.
Private architecture
Deploy the scanner where your security team is comfortable.
Mail sources
M365, shared inboxes, gateways, ticketing queues
Intelligence layer
Trusted vendors, exec graph, finance patterns, prior verdicts
Hosting choice
On-prem AI, zero-log cloud, or IsThisSpam Metal
Outputs
White-label portal, API, analyst workflows, internal escalations
IsThisSpam Metal
Private email intelligence appliance
Mail ingest
M365, Google, SMTP relay
Org intel
Vendor, finance, exec graph
Outputs
API, analyst queue, SIEM
Deployment options built for different trust boundaries
Some teams want a full on-prem install. Others want zero-log cloud in a provider they already govern. Others want an appliance they can rack, wire, and validate quickly.
On-prem AI
Zero-log cloud in your stack
IsThisSpam Metal
What the product actually unlocks
This is not generic spam filtering. It is a private scanning and intelligence layer your team can shape around how your organization receives, reviews, and escalates risky email.
Process company email safely
Build your own intelligence database
Detect custom attack scenarios
White-label and intelligence layer
Let your team own the verdicts and the learning loop.
You can expose the service under your own brand, keep detection logic close to your operational knowledge, and feed response outcomes back into future decisions.
Your brand, your portal, your policies
Expose the scanning experience under your own name with branded portals, API responses, analyst notes, and policy wording that fit your organization.
Private inference fabric
Keep the model layer close to your data with private networking, internal routing, and deployment patterns that satisfy regulated environments.
Connected intelligence flow
Move from raw email to verdict to response feedback, then feed those outcomes back into organization-specific detection logic.
Security controls first
Design around tenant isolation, access boundaries, encryption, and deployment choice instead of forcing every team into a single hosting model.
Custom scenario library
Tune for the attacks that actually hit your business.
The strongest value comes from combining model analysis with your own vendor graph, finance processes, executive relationships, and known-safe communication patterns.
Fake invoice and payment diversion
Train toward your vendor list, payment cadence, invoice language, and finance workflows so the model can see when a message almost looks right.
Executive and stakeholder impersonation
Use your own directory, internal terminology, and high-risk communication patterns to spot who is being imitated and how the lure is framed.
Shared services and support desk abuse
Customize for password-reset scams, HR document requests, supplier onboarding, and internal-service impersonation unique to your environment.
Browser Frontline Defense
Need a branded Chrome extension for employee browsers?
See our dedicated whitelabel extension page for company-wide rollout options, policy controls, and branded user experience.
See the white-label flow, the private deployment options, and IsThisSpam Metal in a live demo.
We can walk through the analyst experience, deployment patterns, private AI hosting, and how custom fake-invoice or vendor-fraud detections would be shaped around your environment.