Price
Search for the best package and the best price that suits you.
PRICING
SA 4.0
Per user per month- Deom Mail
- IMAP/POP Access in Email Clients
- Secure Communication Use SSL/TLS encryption for all communication channels, including SMTP, IMAP and POP3
SA 11.95
Per user per month- 30G (15G Mail storage / 15G Cloud storage) per user
- All the lite features and:
- Deom Drive
- Deom Chat
- Deom meeting
- Calendar
- AI assistant
- Domain Aliases
- Email Routing
- Multi-factor authentication (MFA)
- Attachment Previews
SA 21.95
Per user per month- 50G (25G Mail storage / 25G Cloud storage) per user
- All Enterprise feature And
- IMAP/POP Access in Email Clients
- AI/ML Based Anti-Phishing
- Known Malware Prevention (Antivirus)
- Uknown Threats Prevention (Assembly Instruction Analysis)
- Security Threats Detection (C&C Server, Malicious Code Respositories, Hacking Routes)
- Block Malicious Files and URLs in Emails (Attachment, Email Body)
- Inspect Password Protected Compressed Files
- Network Security such as intrusion detection and prevention systems (IDS/IPS), VPNs, and network segmentation .
SA 3.0
Per user per month- Deom Mail
- IMAP/POP Access in Email Clients
- Secure Communication Use SSL/TLS encryption for all communication channels, including SMTP, IMAP and POP3
SA 8.88
Per user per month- 30G (15G Mail storage / 15G Cloud storage) per user
- All the lite features and:
- Deom Drive
- Deom Chat
- Deom meeting
- Calendar
- AI assistant
- Domain Aliases
- Email Routing
- Multi-factor authentication (MFA)
- Attachment Previews
SA 18.88
Per user per month- 50G (25G Mail storage / 25G Cloud storage) per user
- All Enterprise feature And
- IMAP/POP Access in Email Clients
- AI/ML Based Anti-Phishing
- Known Malware Prevention (Antivirus)
- Uknown Threats Prevention (Assembly Instruction Analysis)
- Security Threats Detection (C&C Server, Malicious Code Respositories, Hacking Routes)
- Block Malicious Files and URLs in Emails (Attachment, Email Body)
- Inspect Password Protected Compressed Files
- Network Security such as intrusion detection and prevention systems (IDS/IPS), VPNs, and network segmentation .