Cisco Secure Email vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Microsoft Logo
12,736 views|10,031 comparisons
97% willing to recommend
Cisco Logo
9,331 views|6,017 comparisons
94% willing to recommend
Trellix Logo
2,223 views|1,864 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cisco Secure Email and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Cisco Secure Email vs. Trellix Collaboration Security Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself.""Microsoft Defender for Office 365's most valuable feature is its performance.""The most valuable feature of Microsoft Defender for Office 365 is the ease of use.""Microsoft Defender for Office 365's most valuable features are safe attachments and safe links.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The deployment capability is a great feature.""I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface.""The initial setup was easy."

More Microsoft Defender for Office 365 Pros →

"The most valuable features are Advanced Malware Protection, URL filtering, and of course Reputation Filtering.""Anti-Spam and Advanced Malware Protection are the most valuable features... and we also have the option to block Zero-day attacks.""The system provides our service desk with the means to troubleshoot email delivery issues with ease.""At one point, there was a zero-day attack. The Cisco appliance detected it and stopped it, helping us out. We avoided the attack and potential damage.""The strong point of the solution is that we hardly get any spam emails because of Cisco Secure Email.""I love the Advanced Malware Protection feature. It works very well... The appliance has more security such as SDF, DKIM, DMARC, and encryption.""The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load.""Initially, the most valuable feature for us was the SenderBase Reputation, because that reduced the number of emails that were even considered by the system by a huge number..."

More Cisco Secure Email Pros →

"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy.""FireEye Email Security is easy to use.""FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.""FireEye is good for malware depicting and security.""The auto-remediation feature is valuable.""One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.""We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration.""The solution's most valuable feature is its simplicity. It's very user-friendly."

More Trellix Collaboration Security Pros →

Cons
"The custom alerts have to improve a lot.""This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products.""We need a separate license and we don't know how to get the license that is required.""Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once.""We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice.""It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers.""We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email.""The pre-sales cost calculations could be more transparent."

More Microsoft Defender for Office 365 Cons →

"The solution needs to improve its advanced phishing filters. It is very good at filtering things which have bad reputations. However, when phishing or malicious emails are new or coming from a legitimate source, we don't feel that the solution is working.""The pricing needs to be reconsidered or enhanced.""Scalability has certain shortcomings and needs to be improved because there are service providers who provide better scalability.v""Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way.""It is not user-friendly, and it is quite complicated. So, it should be more user-friendly.""The Forged Email Detection feature needs improvement, particularly with domain. The sensors are not that good and the rules sets are unclear.""I am not satisfied with the solution's reporting and logging.""The configuration UI should be made more intuitive. Currently, it takes a while to understand how to do the basic configurations."

More Cisco Secure Email Cons →

"The reporting aspect of the solution needs improvement.""I would like to see this solution become more flexible.""In general, our company should make the tool more robust to protect our systems.""If they want to be the primary or best solution, they need to have better email management features.""The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier.""Sometimes especially zero-day spam emails can be passed to the user's inbox.""The solution needs better support.""I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • "Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "We do annual licensing for Cisco Secure Email Gatewayand SMA together, and possibly SmartNet support. Packaged together, the cost is just under $38,000."
  • "In addition to the standard licensing, there is a cost for SMARTnet as well."
  • "Pricing depends on your environment and which model you want to buy."
  • "Licensing costs depend on how many users there are. It could range between $5 and $7 per month, per user."
  • "The license was not per user, the license model was per feature. You could choose anti-virus, anti-spam, etc. It was feature-based and charged yearly."
  • "There were no other costs in addition to the standard licensing fees."
  • "We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
  • "It is not that costly. We pay for the solution through a contractor and pay an annual fee."
  • More Cisco Secure Email Pricing and Cost Advice →

  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • "I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various… more »
    Top Answer:The product must provide better malware detection. The detection algorithms don't perform the way I hope they would.
    Top Answer:Cisco Secure Email is a budget-friendly solution.
    Top Answer:The product's price falls on the higher side when compared to the other products on the market. Whether the product… more »
    Top Answer:I am not satisfied with the solution's reporting and logging.
    Top Answer:One of the valuable features of the product stems from the fact that it is easy to implement the tool in our… more »
    Top Answer:Technology is an area that is evolving every day. As changes are introduced on a day-to-day basis, I feel that my… more »
    Top Answer:Ideally, I don't manage the installation, but I do manage the security part. I am responsible for defining… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    Cisco Email Security, IronPort, Cisco Email Security, ESA, Email Security Appliances
    FireEye Email Security
    Learn More
    Trellix
    Video Not Available
    Overview

    Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.

    With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.

    This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.

    Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.

    Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.

    Cisco Secure Email is an email security solution that provides advanced protection to safeguard inboxes. The solution includes comprehensive defense from the most damaging threats so your employees and organization can remain secure at all times. In addition, it includes advanced threat defense capabilities that detect, block, and remediate threats in incoming email faster. Simultaneously, it protects an organization’s brand, prevents data loss, and secures important information in transit with end-to-end encryption.

    Cisco Secure Email Features

    Cisco Secure Email has many valuable key features. Some of the most useful ones include:

    • Advanced threat analysis: Easily identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack.
    • Robust, actionable threat data: The solution’s searchable threat analysis data provides critical contextual insight to the attack scope and breadth and expedites remediation.
    • Real-time URL analysis: With this feature, you can drop emails with risky links automatically or block access to newly infected sites with real-time URL analysis to protect against phishing.
    • Domain-based message authentication (DMARC): Users can prevent brand abuse from attackers using their organization’s domain to carry out phishing campaigns with automation of the domain-based message authentication (DMARC) process.
    • Data loss prevention (DLP): The solution enables users to protect sensitive content in outgoing emails.

    Cisco Secure Email Benefits

    There are many benefits to implementing Cisco Secure Email. Some of the biggest advantages the solution offers include:

    • Optimize your defenses: The solution is designed to protect your organization from threats that can come from multiple sources, including phishing, malware, and ransomware. It can defend against all of them with industry-leading threat intelligence that empowers you to act quickly.
    • More efficient processes: You can use the solution’s orchestration feature to simplify workflows, reduce the burden on your team, and focus on more strategic initiatives.
    • Easy-to-manage tools: The solution is built with tools that are user-friendly and help you spend less time managing alerts. They allow users to quickly detect emerging threats and quarantine suspected threats to prevent their spread.
    • Flexible license options: Cisco Secure Email provides three different license choices: Secure Email Essentials, Secure Email Advantage, and Secure Email Premier.
    • Increase spam catch rates: Cisco Secure Email blocks unwanted emails using a multilayered scanning architecture.

    Reviews from Real Users

    Cisco Secure Email is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has an intuitive interface, reputation filtering, few false positives, and great protection features.

    Enrique J., Owner at Jolly Security Inc., says, "It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. The most valuable feature is reputation filtering.”

    The solution has a “low rate of false positives, good support, and it integrates well with other Cisco security products,” explains Mark R., IT Admin / Manager at a retailer.

    PeerSpot user Charles N., Network Security Engineer at Galaxy Backbone Ltd., mentions, “It is doing its work. It is doing what it was actually designed to do. They have a lot of features such as Advanced Malware Protection, Email Protection, Advanced Phishing Protection, Antispam, Antivirus, and Outbreak Filters.”

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    SUNY Old Westbury, CoxHealth, City of Fullerton, Indra
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    REVIEWERS
    Manufacturing Company17%
    Computer Software Company17%
    Comms Service Provider13%
    Government7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm8%
    Manufacturing Company7%
    Government7%
    REVIEWERS
    Computer Software Company19%
    Energy/Utilities Company10%
    Retailer10%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Educational Organization17%
    Financial Services Firm7%
    Government6%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Government8%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business45%
    Midsize Enterprise15%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise51%
    REVIEWERS
    Small Business31%
    Midsize Enterprise32%
    Large Enterprise37%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise28%
    Large Enterprise48%
    REVIEWERS
    Small Business38%
    Midsize Enterprise23%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Cisco Secure Email vs. Trellix Collaboration Security
    May 2024
    Find out what your peers are saying about Cisco Secure Email vs. Trellix Collaboration Security and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Cisco Secure Email is ranked 2nd in Email Security with 56 reviews while Trellix Collaboration Security is ranked 15th in Email Security with 13 reviews. Cisco Secure Email is rated 8.4, while Trellix Collaboration Security is rated 8.6. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of Trellix Collaboration Security writes "Has an easy implementation phase to deal with for users". Cisco Secure Email is most compared with Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection, Trend Micro Email Security and Cisco Secure Email Threat Defense, whereas Trellix Collaboration Security is most compared with Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security, Fortinet FortiMail and Barracuda Email Security Gateway. See our Cisco Secure Email vs. Trellix Collaboration Security report.

    See our list of best Email Security vendors.

    We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.