We performed a comparison between Menlo Security Email Isolation and Trellix Collaboration Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, TitanHQ and others in Email Security."Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"The product is not resource-intensive."
"Does a thorough job of examining email and URLs for malicious content."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The initial setup was easy."
"The product's scalability is good."
"I can't say that there is one specific feature that is most valuable. It's the overall platform that is well-suited to our needs. It's something that is different from a lot of other products or platforms in the marketplace."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"FireEye is good for malware depicting and security."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"We can control this solution from the cloud and are able to access it from wherever we are."
"The initial setup is simple."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy."
"The company should focus on adding threats that the solution is currently unable to detect."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"Microsoft Defender for Office 365 should be more proactive."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"I'd like some additional features any product can give me to protect our environment in a better way."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data."
"There are several features, such as supporting web technologies, that the company is working on implementing in the platform. There are a lot of backend web technologies in use on various websites, for example, two-way audio/video and WebGL, for which support may not be fully implemented in the product."
"The solution must provide features to scan QR codes for threats."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"The custom tailoring is limited."
"The solution needs better support."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"The reporting aspect of the solution needs improvement."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Trellix Collaboration Security Pricing and Cost Advice →
Menlo Security Email Isolation is ranked 20th in Email Security with 1 review while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. Menlo Security Email Isolation is rated 10.0, while Trellix Collaboration Security is rated 8.6. The top reviewer of Menlo Security Email Isolation writes "Decreased our security alerts without impacting employees' work". On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". Menlo Security Email Isolation is most compared with Proofpoint Email Protection, whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security and Fortinet FortiMail.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.