We performed a comparison between Check Point Anti-Spam and Email Security Software Blade and Cisco Secure Email based on real PeerSpot user reviews.
Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"The email protection is excellent, especially in terms of anti-phishing policies."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"Mail sanitisation features are second to none."
"This solution is very efficient."
"It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
"This product integrates well and is easy to manage."
"The robust Smart Dashboard enables to us fetch important and accurate data insights concerning the blocking of spammers and malware attacks on the system."
"Advanced Spam Filtering to identify and block unwanted email messages."
"It does a better job of recognizing spammers."
"Due to its technology, monitoring, and manufacturer features, we have been able to reduce the intrusion of spam and other threats that can be uploaded via email."
More Check Point Anti-Spam and Email Security Software Blade Pros →
"The filtering is definitely better at catching both spam and malicious messages, and there's a lot of extremely granular ability for setting up rules. You can do it the way you want to. The Microsoft solution tends to be pretty limited in how it allows some of that to be done."
"It has the IMS engine, Intelligent Multi-Scan engine, and it does a good job, right out-of-the-box, of blocking the vast majority of things that should be blocked."
"It provides good IT assistance."
"What I find the most valuable about Cisco Secure Email is that the logs are not that difficult to see even if you're not used to them. The logs are reasonably readable and diagnosing the problem is not too hard with them."
"ATP has been the most valuable in improving our email security posture."
"It does a great job of preventing spam, malware, and ransomware. I can only go by what people have told me and what I've seen, but I have not seen spam in a year and a half to two years in my own company mailbox. And there are not a lot of catches where it's catching something that should have gotten through, either."
"The solution works well."
"Initially, the most valuable feature for us was the SenderBase Reputation, because that reduced the number of emails that were even considered by the system by a huge number..."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"The custom alerts have to improve a lot."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"Microsoft Defender for Office 365 should be more proactive."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"I'd like some additional features any product can give me to protect our environment in a better way."
"Configuration requires going to a lot of places rather than just accessing one tab."
"There is room for improvement with the UI."
"It is expensive but worth it."
"It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."
"Recognizing spammers and spam email sourcing is extremely lagging these days, and the performance could be improved to provide better efficiency."
"The cost is high when putting through Check Point Blade in your Gateway."
"If you face any configuration problems, Check Point is the only solution."
"In my book, more and more customized integrations could be made available so that different kinds of mail servers and cloud servers can be internally integrated for real-time system flow and security enablement."
"While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
More Check Point Anti-Spam and Email Security Software Blade Cons →
"The graphical user interface is not user-friendly like other vendors. I find it very difficult at times to find some options on the UI."
"The user interface could be updated."
"I would like to see sandboxing for email, where suspicious emails received by the system are analyzed through online services."
"Cisco Email Secure's pricing needs to be less. We have vendors who provide cheaper solutions with the same features."
"My opinion on the licensing of this solution is that it is a mess that needs sorting out. I am not particularly bothered by pricing as I administer it and make recommendations for people to buy or not to buy."
"The tool's pricing can be improved."
"There could be additional DLP functionality for it."
"They could improve the filters. In my time at the company, there were several times we had to contact support to update the filters."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Anti-Spam and Email Security Software Blade Pricing and Cost Advice →
Check Point Anti-Spam and Email Security Software Blade is ranked 9th in Email Security with 32 reviews while Cisco Secure Email is ranked 2nd in Email Security with 56 reviews. Check Point Anti-Spam and Email Security Software Blade is rated 8.2, while Cisco Secure Email is rated 8.4. The top reviewer of Check Point Anti-Spam and Email Security Software Blade writes "Effectively secures data centers against various threats, including spam emails and provides policy-based control". On the other hand, the top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". Check Point Anti-Spam and Email Security Software Blade is most compared with Barracuda Email Security Gateway, Abnormal Security and Fortinet FortiMail, whereas Cisco Secure Email is most compared with Trellix Collaboration Security, Microsoft Exchange Online Protection (EOP), Fortinet FortiMail, Proofpoint Email Protection and Cisco Secure Email Threat Defense. See our Check Point Anti-Spam and Email Security Software Blade vs. Cisco Secure Email report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.