We performed a comparison between Cisco Secure Email and Trellix Collaboration Security based on real PeerSpot user reviews.
Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"Microsoft Defender for Office 365's most valuable features are safe attachments and safe links."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"The deployment capability is a great feature."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"The initial setup was easy."
"The most valuable features are Advanced Malware Protection, URL filtering, and of course Reputation Filtering."
"Anti-Spam and Advanced Malware Protection are the most valuable features... and we also have the option to block Zero-day attacks."
"The system provides our service desk with the means to troubleshoot email delivery issues with ease."
"At one point, there was a zero-day attack. The Cisco appliance detected it and stopped it, helping us out. We avoided the attack and potential damage."
"The strong point of the solution is that we hardly get any spam emails because of Cisco Secure Email."
"I love the Advanced Malware Protection feature. It works very well... The appliance has more security such as SDF, DKIM, DMARC, and encryption."
"The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load."
"Initially, the most valuable feature for us was the SenderBase Reputation, because that reduced the number of emails that were even considered by the system by a huge number..."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy."
"FireEye Email Security is easy to use."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"FireEye is good for malware depicting and security."
"The auto-remediation feature is valuable."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"The custom alerts have to improve a lot."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"We need a separate license and we don't know how to get the license that is required."
"Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"The pre-sales cost calculations could be more transparent."
"The solution needs to improve its advanced phishing filters. It is very good at filtering things which have bad reputations. However, when phishing or malicious emails are new or coming from a legitimate source, we don't feel that the solution is working."
"The pricing needs to be reconsidered or enhanced."
"Scalability has certain shortcomings and needs to be improved because there are service providers who provide better scalability.v"
"Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way."
"It is not user-friendly, and it is quite complicated. So, it should be more user-friendly."
"The Forged Email Detection feature needs improvement, particularly with domain. The sensors are not that good and the rules sets are unclear."
"I am not satisfied with the solution's reporting and logging."
"The configuration UI should be made more intuitive. Currently, it takes a while to understand how to do the basic configurations."
"The reporting aspect of the solution needs improvement."
"I would like to see this solution become more flexible."
"In general, our company should make the tool more robust to protect our systems."
"If they want to be the primary or best solution, they need to have better email management features."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"The solution needs better support."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Trellix Collaboration Security Pricing and Cost Advice →
Cisco Secure Email is ranked 2nd in Email Security with 56 reviews while Trellix Collaboration Security is ranked 15th in Email Security with 13 reviews. Cisco Secure Email is rated 8.4, while Trellix Collaboration Security is rated 8.6. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of Trellix Collaboration Security writes "Has an easy implementation phase to deal with for users". Cisco Secure Email is most compared with Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection, Trend Micro Email Security and Cisco Secure Email Threat Defense, whereas Trellix Collaboration Security is most compared with Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security, Fortinet FortiMail and Barracuda Email Security Gateway. See our Cisco Secure Email vs. Trellix Collaboration Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.