We changed our name from IT Central Station: Here's why
Get our free report covering Microsoft, Cisco, Fortinet, and other competitors of Mimecast Email Security with Targeted Threat Protection. Updated: January 2022.
563,148 professionals have used our research since 2012.

Read reviews of Mimecast Email Security with Targeted Threat Protection alternatives and competitors

Sameer Babu
Senior System Administrator at UAS
Real User
Top 5
Responsive support, saves us time dealing with threats, but the email notifications should be customizable
Pros and Cons
  • "The most valuable feature is the hardware-assisted platform module."
  • "Email alerts should be available in real-time."

What is our primary use case?

We have a hybrid Exchange environment with an on-premises email server and also Office 365. We have multiple domains and the challenge was related to the email filter. We were doing a lot of things manually and we wanted a simpler system.

As of now, we are only using this product for email. However, in the future, we may implement some of the other modules such as SharePoint, Dropbox, or other services.

How has it helped my organization?

Perception Point has improved the way our organization functions in many cases. For example, there are a lot of malicious files coming into the company and the previous solution that we had was not filtering them in an effective manner. When we switched to Perception Point, it became quite handy and it started detecting most of them. I would estimate that nine out of ten were being found and then blocked.

The only challenge we were facing was a small number of false positives, which was okay because we were able to handle them properly. In terms of reduction, implementing Perception Point has resulted in a 50% to 60% drop in the number of false positives that we were experiencing.

In my experience, the detection capabilities have been good. I would rate the performance an eight out of ten because it is much better than some other products I have researched. I have seen examples of it detecting malware.

The vendor's incident response team acts as an extension to our own SOC team.  This is important because we need to know exactly what is happening so that we can report it to the top management, accordingly. 

Perception Point's incident response team has aptly handled the incidents that we have had. So far, we have only had a few, so our challenges have not been great.

With respect to engine optimization, I see a lot of features being upgraded every month. The engine seems to be getting more robust. I can see the differences in this AI-based technology.

I would estimate that each day, Perception Point saves our own SOC team between one and two hours. We were spending a lot of time on security and since implementing this product, we have been able to reallocate time and put it toward other tasks.

I estimate that overall, the number of alerts that we receive at our endpoint layer has been reduced by between 40% and 50% since transitioning from our previous product. Time-wise, this saves us between an hour and two hours a day.

In terms of how long it took to begin showing value, from the perspective of a customer, I think that it took about three days before we started to notice the difference. It required no tuning or customization and it was very clear in the console. The dashboard showed everything that it was doing, making the system very transparent.

What is most valuable?

The most valuable feature is the hardware-assisted platform module. The HAP is hardware-based and does not exist in many products. It is a unique CPU technology that can detect ransomware attacks.

The notification system is helpful. We received two notifications a day, which include the false positives.

What needs improvement?

Email alerts should be available in real-time. Alternatively, emails should be sent more often. It would be better to get between six and eight emails per day to help us understand what is happening.

At this time, we don't have an option to customize alert emails for our customers. They come directly from the vendor and we have no control over them.

The reports should be more customizable.

For how long have I used the solution?

We have been using Perception Point Advanced Email Security for less than a year.

What do I think about the stability of the solution?

It's a robust product and we don't have to manually intervene when it comes to filtering when we use the engine. In production, it seems to be stable and we haven't faced any downtime.

What do I think about the scalability of the solution?

Perception Point is used throughout the organization and we have 250 devices that are protected.

Scalability-wise, we haven't explored or tested it. I think the product can be scaled in terms of adding more features. More than its security, they can add more features, like email archiving, but I'm not concerned about it.

Whether we increase our usage depends on the business. If we continue to grow then we will continue using this product and we will increase the number of users. I think that it's quite capable of scaling with us.

How are customer service and support?

When we need to create reports for management, we sometimes send queries to the support team. They are very responsive and normally, they answer the same day, within a couple of hours.

In total, I have spoken with them approximately 10 times and the experience was always good. I believe that the nearest support center is in Israel, and we're approximately two hours apart, yet the response was still quick and on time. They have always been able to resolve our issues.

Which solution did I use previously and why did I switch?

We had challenges with malware when we were using another on-premises product. The product was MailMarshal, by Trustwave. The first reason that we decided to switch was that it was purely a signature-based system. The second reason was the support. Simply, they did not provide the support that we needed.

How was the initial setup?

We had done some brainstorming before the project, and we could see that the setup process was transparent. As such, it was straightforward and even though there was some complexity, we could see exactly what they were going to do. All things considered, it was not overly complex.

The implementation strategy did not deviate from our IT policy and it was good. They were not using the MX pointing but rather, it was another kind of shared organization policy that is hidden from the attackers. The fact that the attackers cannot directly see what we are using, and it is similar to a shadow, is one of the features that we liked.

We are a 24/7 organization so for us, the main challenge was minimizing downtime. Downtime is crucial for us and we were able to complete everything in less than six hours.

What about the implementation team?

From our side, there was one IT manager and two network administrators involved in the deployment. The two network administrators continue to work with this product but in a maintenance capacity.

What was our ROI?

We have absolutely seen a return on our investment. Cost savings and technology-wise, the HAP module is the feature that gives us the biggest ROI. It is implemented in hardware and not available in a lot of systems. It is incorporated directly into our data center for multilayer protection.

What's my experience with pricing, setup cost, and licensing?

The price of this solution was within our budget and I think that it will suit most SMBs. There are no additional costs beyond the standard licensing fees.

Which other solutions did I evaluate?

We evaluated Mimecast at the same time that we were looking at Perception Point. It is a top runner in this space and they have more services, such as mail archiving. Ultimately, we found that Perception Point is a better product. It delivers approximately the same value for what we needed, but for less cost, and pricing was one of the other constraints.

We did not implement a PoC with Mimecast, so I can't make any technical or performance comparisons based on actual usage.

What other advice do I have?

The biggest lesson that I have learned from using this product is that when you use smart products in a smart way, it can save you a lot of time with respect to productivity. This in turn allows us to look at how that time can be used for other major tasks.

My advice for anybody who is thinking about implementing this product is to start with a PoC. The vendor offers a 14-day PoC, which will give you a clear idea as to exactly what is happening. From there, you can choose to proceed with it or not.

I would rate this solution a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
Senior Security Architect at a tech services company with 51-200 employees
Real User
Easy to install and secures users against URL relay attacks, spam, and malicious attachments
Pros and Cons
  • "The most valuable feature is the URL relay protection because it protects users from phishing attacks."
  • "In the next release of this solution, I would like to see more user awareness, such as information about phishing email attacks that have been prevented."

What is our primary use case?

We are a technical services company and we work with many different solutions, including the Sophos Email Appliance. We currently have a couple of customers who use Sophos.

This solution is for the secure delivery of inbound email. There are various use cases including checking email against spam, DNS or configuration related issues, and spoofing-related security issues. It also checks URL in emails, as well as for malicious attachments. All of these things are checked before the email is delivered to the user.

What is most valuable?

The most valuable feature is the URL relay protection because it protects users from phishing attacks.

What needs improvement?

The frequency in which this solution receives technical updates should be improved. If they are to be rated as the number one email appliance then they should also be the first to receive updates. It should happen across all of the customers, immeidately.

In the next release of this solution, I would like to see more user awareness, such as information about phishing email attacks that have been prevented.

The baselining and reporting is better with some of the competing solutions.

For how long have I used the solution?

We have been dealing with the Sophos Email Appliance for more than a year.

What do I think about the stability of the solution?

This is a very stable solution.

What do I think about the scalability of the solution?

Being cloud-based, the email appliance is very scalable.

How are customer service and technical support?

I have been part of the implementation team for this solution, and once that is complete, we hand it over to the managed services team. We have never had issues that required contacting support.

Which solution did I use previously and why did I switch?

We have implemented the Sophos Email Appliance for clients, but we have also deployed similar solutions by Mimecast and Proofpoint. These products have some easy-to-go connectors with Office 365.

How was the initial setup?

The initial setup is straightforward. The time required for setup and deployment is between five and seven working days.

What about the implementation team?

We have our own teams in-house for implementation, deployment, and maintenance.

What other advice do I have?

My advice is that every organization should select an email security appliance, based on their requirements. Even if they are using Microsoft Office 360 Protection, they should still be using a cloud-based email security solution because there are some specific security rules and controls that are applied through these appliances.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Get our free report covering Microsoft, Cisco, Fortinet, and other competitors of Mimecast Email Security with Targeted Threat Protection. Updated: January 2022.
563,148 professionals have used our research since 2012.