Cisco Secure Email vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Microsoft Logo
12,659 views|10,155 comparisons
97% willing to recommend
Cisco Logo
9,374 views|6,133 comparisons
94% willing to recommend
Trellix Logo
2,270 views|1,896 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cisco Secure Email and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Cisco Secure Email vs. Trellix Collaboration Security Report (Updated: May 2024).
772,127 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links.""Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected.""Microsoft Defender for Office 365's most valuable features are safe attachments and safe links.""The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over.""The initial setup was easy.""Since we have started using the solution, there have been fewer compromises.""Does a thorough job of examining email and URLs for malicious content.""There are several features that I consider valuable."

More Microsoft Defender for Office 365 Pros →

"The product blocks spam emails.""Cisco Secure Email Cloud Gateway has allowed our users to be able to concentrate on the emails that they do receive. Previously, our users had to deal with nine million additional emails across the organization, which is nearly 1,000 emails per user to have to deal with a month. That's a massive amount for our staff to deal with and probably several hours of their time. We have a lot of clinical staff, being a hospital. We want to make our staff as productive as possible. By removing a lot of that spam and phishing type emails, this allows them to do their job.""The strong point of the solution is that we hardly get any spam emails because of Cisco Secure Email.""The most valuable features are protection against ransomware and spam.""Anti-Spam and Advanced Malware Protection are the most valuable features... and we also have the option to block Zero-day attacks.""Because we scan products, and there is a lot of critical data, security is very important in these cases.""The solution works well.""What I find the most valuable about Cisco Secure Email is that the logs are not that difficult to see even if you're not used to them. The logs are reasonably readable and diagnosing the problem is not too hard with them."

More Cisco Secure Email Pros →

"The product helps reduce the number of malicious emails reaching the user's inbox.""FireEye Email Security is easy to use.""FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.""We can control this solution from the cloud and are able to access it from wherever we are.""FireEye is good for malware depicting and security.""The initial setup is simple.""The auto-remediation feature is valuable.""What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."

More Trellix Collaboration Security Pros →

Cons
"Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data.""They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not.""They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are.""Several simulation options are available within 365, and the phishing simulation could be better.""There's room for improvement regarding the time frame for retrieving emails.""The UI needs to be more user-friendly.""In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help.""In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."

More Microsoft Defender for Office 365 Cons →

"My opinion on the licensing of this solution is that it is a mess that needs sorting out. I am not particularly bothered by pricing as I administer it and make recommendations for people to buy or not to buy.""They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like.""The user interface is a bit complex.""The pricing needs to be reconsidered or enhanced.""We cannot manage multiple devices from a single UI.""The product's GUI for the dashboard needs improvement.""Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way.""The hardware is not up to the mark. Two to three times a year we have complete downtime."

More Cisco Secure Email Cons →

"I would like to see this solution become more flexible.""The spam detection feature could be better.""The solution must provide features to scan QR codes for threats.""The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier.""In general, our company should make the tool more robust to protect our systems.""If they want to be the primary or best solution, they need to have better email management features.""FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""The reporting aspect of the solution needs improvement."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • "Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "We do annual licensing for Cisco Secure Email Gatewayand SMA together, and possibly SmartNet support. Packaged together, the cost is just under $38,000."
  • "In addition to the standard licensing, there is a cost for SMARTnet as well."
  • "Pricing depends on your environment and which model you want to buy."
  • "Licensing costs depend on how many users there are. It could range between $5 and $7 per month, per user."
  • "The license was not per user, the license model was per feature. You could choose anti-virus, anti-spam, etc. It was feature-based and charged yearly."
  • "There were no other costs in addition to the standard licensing fees."
  • "We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
  • "It is not that costly. We pay for the solution through a contractor and pay an annual fee."
  • More Cisco Secure Email Pricing and Cost Advice →

  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • "I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    772,127 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various… more »
    Top Answer:The product must provide better malware detection. The detection algorithms don't perform the way I hope they would.
    Top Answer:Cisco Secure Email is a budget-friendly solution.
    Top Answer:The product's price falls on the higher side when compared to the other products on the market. Whether the product… more »
    Top Answer:I am not satisfied with the solution's reporting and logging.
    Top Answer:One of the valuable features of the product stems from the fact that it is easy to implement the tool in our… more »
    Top Answer:Technology is an area that is evolving every day. As changes are introduced on a day-to-day basis, I feel that my… more »
    Top Answer:Ideally, I don't manage the installation, but I do manage the security part. I am responsible for defining… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    Cisco Email Security, IronPort, Cisco Email Security, ESA, Email Security Appliances
    FireEye Email Security
    Learn More
    Trellix
    Video Not Available
    Overview

    Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.

    With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.

    This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.

    Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.

    Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.

    Cisco Secure Email is an email security solution that provides advanced protection to safeguard inboxes. The solution includes comprehensive defense from the most damaging threats so your employees and organization can remain secure at all times. In addition, it includes advanced threat defense capabilities that detect, block, and remediate threats in incoming email faster. Simultaneously, it protects an organization’s brand, prevents data loss, and secures important information in transit with end-to-end encryption.

    Cisco Secure Email Features

    Cisco Secure Email has many valuable key features. Some of the most useful ones include:

    • Advanced threat analysis: Easily identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack.
    • Robust, actionable threat data: The solution’s searchable threat analysis data provides critical contextual insight to the attack scope and breadth and expedites remediation.
    • Real-time URL analysis: With this feature, you can drop emails with risky links automatically or block access to newly infected sites with real-time URL analysis to protect against phishing.
    • Domain-based message authentication (DMARC): Users can prevent brand abuse from attackers using their organization’s domain to carry out phishing campaigns with automation of the domain-based message authentication (DMARC) process.
    • Data loss prevention (DLP): The solution enables users to protect sensitive content in outgoing emails.

    Cisco Secure Email Benefits

    There are many benefits to implementing Cisco Secure Email. Some of the biggest advantages the solution offers include:

    • Optimize your defenses: The solution is designed to protect your organization from threats that can come from multiple sources, including phishing, malware, and ransomware. It can defend against all of them with industry-leading threat intelligence that empowers you to act quickly.
    • More efficient processes: You can use the solution’s orchestration feature to simplify workflows, reduce the burden on your team, and focus on more strategic initiatives.
    • Easy-to-manage tools: The solution is built with tools that are user-friendly and help you spend less time managing alerts. They allow users to quickly detect emerging threats and quarantine suspected threats to prevent their spread.
    • Flexible license options: Cisco Secure Email provides three different license choices: Secure Email Essentials, Secure Email Advantage, and Secure Email Premier.
    • Increase spam catch rates: Cisco Secure Email blocks unwanted emails using a multilayered scanning architecture.

    Reviews from Real Users

    Cisco Secure Email is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has an intuitive interface, reputation filtering, few false positives, and great protection features.

    Enrique J., Owner at Jolly Security Inc., says, "It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. The most valuable feature is reputation filtering.”

    The solution has a “low rate of false positives, good support, and it integrates well with other Cisco security products,” explains Mark R., IT Admin / Manager at a retailer.

    PeerSpot user Charles N., Network Security Engineer at Galaxy Backbone Ltd., mentions, “It is doing its work. It is doing what it was actually designed to do. They have a lot of features such as Advanced Malware Protection, Email Protection, Advanced Phishing Protection, Antispam, Antivirus, and Outbreak Filters.”

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    SUNY Old Westbury, CoxHealth, City of Fullerton, Indra
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    REVIEWERS
    Manufacturing Company17%
    Computer Software Company17%
    Comms Service Provider13%
    Government7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm8%
    Manufacturing Company7%
    Government7%
    REVIEWERS
    Computer Software Company19%
    Energy/Utilities Company10%
    Retailer10%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Educational Organization17%
    Financial Services Firm7%
    Government6%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Government8%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business45%
    Midsize Enterprise15%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise51%
    REVIEWERS
    Small Business31%
    Midsize Enterprise32%
    Large Enterprise37%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise28%
    Large Enterprise48%
    REVIEWERS
    Small Business38%
    Midsize Enterprise23%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Cisco Secure Email vs. Trellix Collaboration Security
    May 2024
    Find out what your peers are saying about Cisco Secure Email vs. Trellix Collaboration Security and other solutions. Updated: May 2024.
    772,127 professionals have used our research since 2012.

    Cisco Secure Email is ranked 2nd in Email Security with 56 reviews while Trellix Collaboration Security is ranked 17th in Email Security with 13 reviews. Cisco Secure Email is rated 8.4, while Trellix Collaboration Security is rated 8.6. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of Trellix Collaboration Security writes "Has an easy implementation phase to deal with for users". Cisco Secure Email is most compared with Microsoft Exchange Online Protection (EOP), Fortinet FortiMail, Proofpoint Email Protection, Cisco Secure Email Threat Defense and Trend Micro Email Security, whereas Trellix Collaboration Security is most compared with Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security, Fortinet FortiMail and Barracuda Email Security Gateway. See our Cisco Secure Email vs. Trellix Collaboration Security report.

    See our list of best Email Security vendors.

    We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.