We performed a comparison between Cisco Secure Email and IceWarp based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, TitanHQ and others in Email Security."The good part is that you don't have to configure it, which is very convenient."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"Does a thorough job of examining email and URLs for malicious content."
"There are several features that I consider valuable."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"Cisco Secure Email Cloud Gateway has allowed our users to be able to concentrate on the emails that they do receive. Previously, our users had to deal with nine million additional emails across the organization, which is nearly 1,000 emails per user to have to deal with a month. That's a massive amount for our staff to deal with and probably several hours of their time. We have a lot of clinical staff, being a hospital. We want to make our staff as productive as possible. By removing a lot of that spam and phishing type emails, this allows them to do their job."
"There are a lot of filters for scam emails and things like that work out of the box. You can also use the antivirus features. I like its features."
"It's a bit easy to handle Cisco Secure Email; it's not that difficult. For the logs, which are in PDF format, it's not hard to read them. We don't need Wireshark much to analyze the logs."
"Because we scan products, and there is a lot of critical data, security is very important in these cases."
"ATP has been the most valuable in improving our email security posture."
"At one point, there was a zero-day attack. The Cisco appliance detected it and stopped it, helping us out. We avoided the attack and potential damage."
"It's flexible. There are a lot of rules and policies that can be easily applied for certain employees or certain mailboxes."
"The product blocks spam emails."
"The solution has a very good log-in to the UI when compared to other solutions."
"Its price is the most valuable. It is definitely one of the lowest price solutions."
"IceWarp has multiple applications that are easy to use for many people."
"It has great communication capabilities for team chatting and web conferences."
"The product is used very extensively in my company since we have around 1,500 users using it. Also, there is no requirement for any administrators to manage the product by the people who own the solution."
"It's scalable and stable."
"An effective, functional, very good tool for controlling resources."
"The solution's voice services work well for our company."
"Microsoft wants its well-paying customers to finish testing some of its half-baked products, find bugs, and report bugs back to Microsoft's team, which is a little frustrating for those who have to manage it and roll it up to thousands of people across the organization."
"I'd like some additional features any product can give me to protect our environment in a better way."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"We need to be able to whitelist data at the backend."
"We need a separate license and we don't know how to get the license that is required."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"The Forged Email Detection feature needs improvement, particularly with domain. The sensors are not that good and the rules sets are unclear."
"Many smaller businesses opt for more cost-effective solutions, such as Gmail or Hotmail accounts, instead of investing in Cisco Secure Email, given its higher cost."
"The pricing needs to be reconsidered or enhanced."
"They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like."
"The interface is dated. It has looked pretty much the same for 15 years or so. It would be helpful to be able to do everything from one spot. The centralized quarantine and reporting are completely separate from policy administration."
"Cisco Email Secure's pricing needs to be less. We have vendors who provide cheaper solutions with the same features."
"The reporting functionality needs to be improved."
"We have occasionally had hardware problems because we are using an appliance-based solution, but that might change. We may consider going to virtual systems."
"I would like to have a trial for mobile applications and more documentation similar to Google Drive with mobile applications."
"With multiple databases for VOIP, chat and web IMAP, maintenance is cumbersome."
"Although it is not a tool, video conferencing should be scalable and operate in a professional and efficient way."
"Although the documentation is extensive and in depth, you must familiarize yourself with it before taking full advantage of the product."
"It is difficult to disable user rights on the console so some users accidentally delete their documents or user details."
"The tool's configuration capabilities are not straightforward. Apart from that, if I want to archive emails into a vault so that they can be retrieved again later, the integration doesn't work, and IceWarp crashes."
"The exchange compatibility mode is rather limited. Their technical support can also be better. They only provide online support, and there should be some option for escalating."
"Support should be improved. Most of the time, the queries are not resolved within the SLA."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
Cisco Secure Email is ranked 2nd in Email Security with 55 reviews while IceWarp is ranked 6th in Email Applications with 15 reviews. Cisco Secure Email is rated 8.4, while IceWarp is rated 8.6. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of IceWarp writes "A tool that is scalable and can accommodate a large number of users but needs to improve the support it provides to its users ". Cisco Secure Email is most compared with Trellix Collaboration Security, Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection and Cisco Secure Email Threat Defense, whereas IceWarp is most compared with Google Workspace, Zimbra Collaboration, Microsoft Exchange, Zoho Mail and Open-Xchange.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.