• 5
  • 183

What is the best email encryption software for small enterprises using Office 365?

Hi community, 

What is the best email encryption software for small enterprises using Office 365? 

It needs to:

  • Support 20 users
  • Most staff are at remote sites
  • Staff are mostly technical but not IT experts
  • Needs to be robust 
  • Need to be easy to install and use 

Thanks! I appreciate the help. 

PeerSpot user
5 Answers
Cyber Security Advisor - Director at Fort Net UK
Top 5Leaderboard
Aug 1, 2022

Unless you are in some defence or Government business I would buy an anti-virus package (like Bitdefender) and add the encryption module. Very cost effective! You could also add a patch module and even a complete EDR solution - (endpoint detection and remediation package).

As you are only 20 staff, I would also suggest that you buy Bitdefender as a managed service from a Managed security service provider (MSSP). That way you pay monthly and can flex your workforce up and down without having to commit to 12-month contracts and end up paying for redundant licences due to staff who have left the company. The MSSP would monitor & manage the reports too, so you would only need to take action if something new and sophisticated got through your defences.

@PatrickWheaton is correct, encryption is one layer of many you should be considering. And encryption needs to be considered when data just sits on a disk somewhere and what happens to data when it is being sent. 

Barracuda is OK however, I think alternatives are less expensive, easier to manage and potentially offer better protection (just my opinion - let's not get into an argument).



Search for a product comparison in Email Security
IT Consultant & Trainer at ReallySimpleTech, Inc.
Real User
Top 5
Aug 5, 2021

In many years of working in secure environments, I have found a combination of MS BitLocker on the local machines O365 E3-E5 and adding on Barracuda Essentials https://www.barracuda.com/prod...   works great.

Encryption is only a very small part of protecting against cyber threats. Encryption in transit and Encryption at rest are important. But, most email threats and vulnerabilities are in the payload itself.  

Barracuda allows you to control what your users can send and receive via emails, has a plethora of other features and is affordable for small businesses.

Account Executive at Meriplex
Aug 4, 2021

For third-party Email Encryption we work with ZIX.

James OConnor - PeerSpot reviewer
Sr. Solutions Sales Executive - Commercial/Charity/Healthcare/SMB Individual Contributor at Hypertec Direct
Top 10
Aug 3, 2021

The first question is what version of Office 365?  It may already be included...

Office Message Encryption or OME: https://docs.microsoft.com/en-...

  • Office 365 Message Encryption is offered as part of Office 365 Enterprise E3 and E5, Microsoft Enterprise E3 and E5, Microsoft 365 Business Premium, Office 365 A1, A3, and A5, and Office 365 Government G3 and G5. You don't need additional licenses to receive the new protection capabilities powered by Azure Information Protection.

reviewer1787877 - PeerSpot reviewer
User at RPost
Feb 21, 2022

I'm using the RMail services for years in Office 365, which provides the free plan and starts from $7 only. [https://rmail.com/product/rmai...

If you use a Mac and are using Office 365 Outlook Online, Outlook On the Web, Outlook.com, Hotmail.com and even if you are using a desktop version of the Outlook app you can log in to the Outlook online version (your Outlook desktop email content is often automatically synced to show the same email on your desktop and in the Outlook Online interface).

RMail specializes in easy-to-use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors.

Learn what your peers think about Cisco Secure Email. Get advice and tips from experienced pros sharing their opinions. Updated: January 2023.
670,523 professionals have used our research since 2012.
Related Questions
Quality Executive at Dharampal Premchand Limited(DPPCL)
Dec 12, 2022
Hello, I work as a Quality Executive at a Consumer Goods company.  At the moment, we're researching an email security solution. We have 1000+ users. Among others, we've been looking at these products: Cisco Secure Email, Forcepoint Email Security and Barracuda Email Security Gateway.  Which of those solutions would you recommend? Please explain its advantages. Would you recommend any diffe...
2 out of 7 answers
Cyber Security Advisor - Director at Fort Net UK
Jun 20, 2022
Top brands don't mean best or most cost-effective. My advice is to look a bit further before you make a decision. Evidence suggests that most top brands are pretty good at detecting and blocking malicious attachments, best case letting through 1%, but can be worse than 50% when it comes to detecting malicious links in the text of the email.  There are numerous less well-known vendors with lower-cost AI-based solutions that have a far better success rate, also providing employees the ability to report on suspect emails which auto-removes them from other staff members' inboxes until they have been properly assessed. Some will provide a visual risk score to the recipient to give them advance warning to be more cautious. Combining this kind of capability with staff awareness products keeps your vendor list lower and further improves efficiency. For around £2 GBP per user per month (less than $3) we provide different vendors depending upon the customer's environment but provided as a managed service. This allows our customers to outsource some of the monitoring and day-to-day management, spread the cost on a monthly basis, and flex how many licences they need on a monthly basis too i.e. if you drop 20 users don't pay for them but if you increase by 20 you don't need complex co-termination and pro rata discussions.
Security Technician at Mercadona
Jun 21, 2022
I only can recommend Cisco because it´s the only one with which I'd worked enough. I think it is powerful enough and has a lot of possibilities. In addition, to a great support team. 
Rony_Sklar - PeerSpot reviewer
Community Manager at a tech services company with 51-200 employees
Jan 24, 2023
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
2 out of 13 answers
Cyber Security Officer at Grupo Vision
Jan 7, 2021
You should build a lab, try the tools and analyze the traffic and behavior with a traffic analizer like wireshark and any sandbox or edr that shows you what the tools do, but all this should be outside your production environment, use tools that has been released by the company provider and not third party downloads or unknown or untrusted sources.
Senior Manager at a financial services firm with 10,001+ employees
Jan 7, 2021
One should 1st have details understanding of what he/she is looking to protect within environment as tool are specially designed for point solution. Single tool will not able to secure complete environment and you should not procure any solution without performing POC within your environment  As there is possibility that tool which works for your peer organisation does not work in similar way for yours as each organisation has different components and workload/use case
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote! If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brief voter registration form, review the list of nominees and vote. Get your colleagues to vote, too! ...
Director of Community at PeerSpot (formerly IT Central Station)
Jul 5, 2022
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.  Check them out! Trending See what your peers are discussing at the moment! What were your main pain points during the SIEM product purchase process? What...
Content Manager at PeerSpot (formerly IT Central Station)
Jan 24, 2023
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
See 2 comments
CTO at a tech company with 11-50 employees
Apr 8, 2022
I agree with many of these observations.  A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.  As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.  Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.  Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
Navcharan Singh - PeerSpot reviewer
Senior Seo Executive at Ace Cloud Hosting
Jan 24, 2023
With zero trust, there are no boundaries, and nothing is inherently trusted. While clearly more restrictive, the benefit of the Zero Trust Security model is it creates a far more secure environment that protects against unauthorized access to sensitive data and digital assets.
Editor at a tech company with 11-50 employees
Oct 31, 2022
Phishing is the starting point of most cyberattacks. When sending malicious messages or creating a clone site, attackers use psychological techniques and social engineering tools, so protecting against such campaigns is not an easy task for information security professionals. To protect against phishing attacks, you can use different tools built into browsers and mail servers, as well as “ov...
See 1 comment
Nandita Shrivastav - PeerSpot reviewer
Sr. SEO Analyst at RTDS
Oct 31, 2022
4 common ways to avoid phishing attacks that you should know: 1. Don’t click on web links received in emails 2. Personally verify the sender's identity 3. Protect your accounts & passwords 4. Use managed email security
Enterprise Technology Analyst at Journal of Cyber Policy
May 11, 2021
On Saturday, May 8, 2021, major media outlets reported that Colonial Pipeline, whose fuel pipeline network supplies gasoline, jet fuel, and other petroleum necessities to over 50 million Americans, had suffered a ransomware attack and shut down its pipeline as a precaution. The disruption in supply sent gasoline prices rising over the weekend, with financial markets on edge in anticipation of e...
See 1 comment
CEO at a computer software company with 11-50 employees
May 11, 2021
These attacks are inevitable and organizations need to plan for fast and secure recovery.  It's no longer necessary to take days or weeks to reimage hundreds or endpoints. Solutions are available that can restore systems to pre-attack condition in minutes.
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
PeerSpot User's Choice Award 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technol...
Director of Community at PeerSpot (formerly IT Central Station)
Jul 5, 2022
Community Spotlight #17
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summ...
Download Free Report
Download our free Cisco Secure Email Report and get advice and tips from experienced pros sharing their opinions. Updated: January 2023.
670,523 professionals have used our research since 2012.