Cisco Secure Email Threat Defense Valuable Features

Karthik Venkataraman - PeerSpot reviewer
Senior Consultant at Velocis Systems

The product offers very good documentation and guides.

It's very easy to deploy and configure.

Their intelligence is pretty competitive when compared to other email security vendors. Cisco has a strong reputation.

The solution has been stable. 

We find the product to be scalable. 

View full review »
BF
Presales Consultant - Cybersecurity at a computer software company with 201-500 employees

Cisco has a threat mechanism called cloud-based Talos, where all the threats are inbuilt. Cisco has a very powerful engine, and that's the most valuable thing you can have from Cisco in terms of security.

View full review »
MB
Director IT Security at a wellness & fitness company with 5,001-10,000 employees

The ability to see east-west traffic is its most valuable feature. Traditionally, email defense focuses on north-south, inbound-outbound, egress-ingress traffic. With Cisco Secure Email Cloud Mailbox, it's able to quickly identify, track, tag, and categorize emails that are internal. That can typically give us visibility into if there's an internal compromised account (for example). Someone can then use that internal compromised account to email additional accounts with either malicious software or links, but internal within that Office tenant. Effectively, that email message never leaves the tenant. Any of the mail gateways really do not have any method or way of seeing this traffic since it's not leaving the environment. 

The solution is very easy to use. It's just a single pane of glass, single screen web page that you access. Then, there are a small number of clicks necessary to get at the information you need. Reporting is easily generated. Likewise, the search capability is easily accessed and usable as well as provides the first initial information that you need about messages identified, categorized, and total volumes. All that information is easily identifiable and quickly accessible as soon as you log in. It is an easy to use, single web page, SaaS application.

Cisco Secure Email Cloud Mailbox’s user interface is intuitive. We didn't need any training. There was a quick deployment document that you skim through, and it's fairly easy to both deploy as well as start using. 

Threat Grid is a capability which allows for running or executing software in a special sandbox environment where it's not affecting your enterprise or corporate systems. For that particular use case, Threat Grid works really well. It also ties in with various threat intelligence sources, e.g., detonating/testing our particular software or file in the sandbox can immediately identify indicators of compromise and share them with other clients that leverage Threat Grid. Likewise, the software that I uploaded for sandboxing is immediately validated and checked against all other client submissions as well as open source and Cisco Talos Threat Intelligence Sources. I find that really valuable. While there are other sandboxing solutions out there, I use Threat Grid quite a bit and I find it to be extremely useful and very usable.

Threat Grid also gives us a sense of safety because I don't have to test it or build out custom virtual machines to do the testing. I don't have to test it on enterprise systems. From that perspective, Threat Grid is definitely a very good solution. Its ability to integrate with other Cisco portfolio tools is helpful because then you can tie in and quickly view what malicious files might've been found in your environment regardless of what Cisco security solution you are using, whether it's AMP, Email Security, Cisco Secure Email Cloud Mailbox, or anything else.

AMP for Endpoints is something that I've used extensively. We have also used AMP for Network and Email. Collectively, it seems to be doing a pretty good job, especially when combined with Threat Grid because it's quickly able to identify files by hashing them and figuring out within the databases that Cisco owns, as well as open source threat intelligence databases, whether that particular hash is found in those databases. If it is, then it is malicious. It takes corresponding action pretty quickly.

If it's an unknown hash (after it identifies the file by hash value), and if it's unknown and not found in the databases, then it automatically uploads that file to Threat Grid for sandboxing and analysis. That layered approach with respect to treating the files as they come in works well, whether via email, network, or found on an endpoint, especially as an ecosystem solution that integrates with other Cisco components and security tooling that one may have in the enterprise. This works well because the information found on a single endpoint, for example, can then immediately take action on an email by blocking that identified malicious file. Likewise, if there is a file that's coming in via email and it's found to be malicious by AMP or Threat Grid, then the information about that file is immediately known by the endpoints. The endpoint solution can then take action on that malicious file. As an ecosystem, it works really well.

View full review »
Buyer's Guide
Cisco Secure Email Threat Defense
April 2024
Learn what your peers think about Cisco Secure Email Threat Defense. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
Mukesh Tiwari - PeerSpot reviewer
AVP- Sales at Velocis Systems

Cisco Secure Email Cloud Mailbox can handle a complete portfolio, which is required to protect any kind of attack coming from emails. However, it does not have advanced phishing, but it is available through Cisco. If you compare Cisco Secure Email Cloud Mailbox with the competition, in the competition you have to have one or two solutions together to address the customer's requirement, whereas Cisco Secure Email Cloud Mailbox is addressing everything, such as web domain and email protection. If there is any kind of challenge it will come across through email.

View full review »
AJ
IT Professional at a construction company with 1,001-5,000 employees

The features and functionalities are much better than Microsoft's in-built Defender plan.

The sandboxing and file analysis as well as the malware protection are great. People send either through attachments or Excel or PDF or a Java script embedded in something. This product has helped us to protect our organization from any malware attack in the past.

It is a mature solution that provides good security.

The solution is simple to set up.

View full review »
HD
Engineer

The solution's most valuable feature is email filtering.

View full review »
MG
Systems Administrator at a university with 1,001-5,000 employees

The most valuable feature that I have found so far is that it actually works within our tenant. If we have anybody that we serve the email that it would go to, and someone else that we serve the email to, it will find that; it will go through that filter as well. And it will do it quickly and efficiently for us. It's not something that we need to push out to then have it circle back in so that our email filters or spam filters will catch things.

On ease of use, it rates very high. It's something that I was able to get into without really looking at any documentation. I wanted to see what it felt like before I started looking at any documentation on how to use it, and it was very easy to use. It works very smoothly. The user experience is very intuitive. They did an amazing job on that.

The solution also provides a diversity of intelligence, the way that we have it implemented. Since it's not taking anything out, it can bring stuff to our attention and we can remediate it if there is actually a threat. And it shows us the links, and all the information regarding why it caught something.

View full review »
DK
Product Manager-Cyber Security & Networking Active at a tech services company with 501-1,000 employees

I would say it's very comprehensive, with multiple antivirus OEMs, virus encrypt features, encryption, and more.

In terms of email security, I believe Trend Micro is similar to this solution to some extent it is closest, otherwise, it has no competition.

View full review »
PM
Technical Support Executive at a tech company with 51-200 employees

Cisco Cloud Mailbox is used for copying emails, anti-spamming, and securing the company's email. We really enjoy the anti-spamming capabilities as well as the rejecting of bulk emails. We can customize these actions by adjusting the variables. It is very user-friendly.

View full review »
MA
Security Technical Manager at a tech services company with 51-200 employees

This solution is easy to use. 

View full review »
Buyer's Guide
Cisco Secure Email Threat Defense
April 2024
Learn what your peers think about Cisco Secure Email Threat Defense. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.