Cisco Secure Email vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Microsoft Logo
12,858 views|10,247 comparisons
97% willing to recommend
Cisco Logo
9,348 views|6,215 comparisons
94% willing to recommend
Trellix Logo
2,307 views|1,917 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cisco Secure Email and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Cisco Secure Email vs. Trellix Collaboration Security Report (Updated: March 2024).
768,415 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack.""Microsoft Defender for Office 365 is a stable solution.""The initial setup was easy.""Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats.""It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not.""Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."

More Microsoft Defender for Office 365 Pros →

"There were detailed logs available. That was a seriously good feature... It turns out these were actually spoof emails that came into our environment. I got to know about them from the log system.""What I find the most valuable about Cisco Secure Email is that the logs are not that difficult to see even if you're not used to them. The logs are reasonably readable and diagnosing the problem is not too hard with them.""It's a bit easy to handle Cisco Secure Email; it's not that difficult. For the logs, which are in PDF format, it's not hard to read them. We don't need Wireshark much to analyze the logs.""The tech engineers are very knowledgeable.""The most valuable feature is the different content filters we are using, such as DKIM.""The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load.""It's flexible. There are a lot of rules and policies that can be easily applied for certain employees or certain mailboxes.""The security features are valuable."

More Cisco Secure Email Pros →

"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.""The auto-remediation feature is valuable.""What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use.""The initial setup is simple.""I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy.""The solution's most valuable feature is its simplicity. It's very user-friendly.""FireEye is good for malware depicting and security.""The product protects my email."

More Trellix Collaboration Security Pros →

Cons
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration.""Microsoft Defender for Office 365 should be more proactive.""We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice.""Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data.""Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features.""The pre-sales cost calculations could be more transparent.""Microsoft wants its well-paying customers to finish testing some of its half-baked products, find bugs, and report bugs back to Microsoft's team, which is a little frustrating for those who have to manage it and roll it up to thousands of people across the organization.""We need to be able to whitelist data at the backend."

More Microsoft Defender for Office 365 Cons →

"They could improve the filters. In my time at the company, there were several times we had to contact support to update the filters.""Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way.""There are some concerns in the way the architecture is set up, making it an area where improvements are required.""The reporting functionality needs to be improved.""I use the search all the time. Sometimes, it is hard to search for things and things are hard to find. People come to me all the time, saying, "This email didn't get through." Then, I go searching and don't find it on the first search. You have to think about alternative searches. I don't know if there is an easier way that they could help to find things. I don't know how they could simplify it, because now everybody else is using the cloud and everything is coming from Office 365, or whatever. It is just not the same environment from years ago where everybody had their own server and you could search easier.""We cannot manage multiple devices from a single UI.""The pricing needs to be reconsidered or enhanced.""The configuration UI should be made more intuitive. Currently, it takes a while to understand how to do the basic configurations."

More Cisco Secure Email Cons →

"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed.""The solution needs better support.""I would like to see this solution become more flexible.""If they want to be the primary or best solution, they need to have better email management features.""The solution must provide features to scan QR codes for threats.""The reporting aspect of the solution needs improvement.""FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""Sometimes especially zero-day spam emails can be passed to the user's inbox."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • "Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "We do annual licensing for Cisco Secure Email Gatewayand SMA together, and possibly SmartNet support. Packaged together, the cost is just under $38,000."
  • "In addition to the standard licensing, there is a cost for SMARTnet as well."
  • "Pricing depends on your environment and which model you want to buy."
  • "Licensing costs depend on how many users there are. It could range between $5 and $7 per month, per user."
  • "The license was not per user, the license model was per feature. You could choose anti-virus, anti-spam, etc. It was feature-based and charged yearly."
  • "There were no other costs in addition to the standard licensing fees."
  • "We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
  • "It is not that costly. We pay for the solution through a contractor and pay an annual fee."
  • More Cisco Secure Email Pricing and Cost Advice →

  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    768,415 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various… more »
    Top Answer:The product must provide better malware detection. The detection algorithms don't perform the way I hope they would.
    Top Answer:The product's initial setup phase was easy.
    Top Answer:The product's price falls on the higher side when compared to the other products on the market. Whether the product… more »
    Top Answer:There are some concerns in the way the architecture is set up, making it an area where improvements are required. When… more »
    Top Answer:The solution must provide features to scan QR codes for threats. Nowadays, threats are embedded inside QR codes.
    Top Answer:The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
    Comparisons
    Also Known As
    MS Defender for Office 365
    Cisco Email Security, IronPort, Cisco Email Security, ESA, Email Security Appliances
    FireEye Email Security
    Learn More
    Trellix
    Video Not Available
    Overview

    Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.

    With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.

    This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.

    Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.

    Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.

    Cisco Secure Email is an email security solution that provides advanced protection to safeguard inboxes. The solution includes comprehensive defense from the most damaging threats so your employees and organization can remain secure at all times. In addition, it includes advanced threat defense capabilities that detect, block, and remediate threats in incoming email faster. Simultaneously, it protects an organization’s brand, prevents data loss, and secures important information in transit with end-to-end encryption.

    Cisco Secure Email Features

    Cisco Secure Email has many valuable key features. Some of the most useful ones include:

    • Advanced threat analysis: Easily identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack.
    • Robust, actionable threat data: The solution’s searchable threat analysis data provides critical contextual insight to the attack scope and breadth and expedites remediation.
    • Real-time URL analysis: With this feature, you can drop emails with risky links automatically or block access to newly infected sites with real-time URL analysis to protect against phishing.
    • Domain-based message authentication (DMARC): Users can prevent brand abuse from attackers using their organization’s domain to carry out phishing campaigns with automation of the domain-based message authentication (DMARC) process.
    • Data loss prevention (DLP): The solution enables users to protect sensitive content in outgoing emails.

    Cisco Secure Email Benefits

    There are many benefits to implementing Cisco Secure Email. Some of the biggest advantages the solution offers include:

    • Optimize your defenses: The solution is designed to protect your organization from threats that can come from multiple sources, including phishing, malware, and ransomware. It can defend against all of them with industry-leading threat intelligence that empowers you to act quickly.
    • More efficient processes: You can use the solution’s orchestration feature to simplify workflows, reduce the burden on your team, and focus on more strategic initiatives.
    • Easy-to-manage tools: The solution is built with tools that are user-friendly and help you spend less time managing alerts. They allow users to quickly detect emerging threats and quarantine suspected threats to prevent their spread.
    • Flexible license options: Cisco Secure Email provides three different license choices: Secure Email Essentials, Secure Email Advantage, and Secure Email Premier.
    • Increase spam catch rates: Cisco Secure Email blocks unwanted emails using a multilayered scanning architecture.

    Reviews from Real Users

    Cisco Secure Email is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has an intuitive interface, reputation filtering, few false positives, and great protection features.

    Enrique J., Owner at Jolly Security Inc., says, "It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. The most valuable feature is reputation filtering.”

    The solution has a “low rate of false positives, good support, and it integrates well with other Cisco security products,” explains Mark R., IT Admin / Manager at a retailer.

    PeerSpot user Charles N., Network Security Engineer at Galaxy Backbone Ltd., mentions, “It is doing its work. It is doing what it was actually designed to do. They have a lot of features such as Advanced Malware Protection, Email Protection, Advanced Phishing Protection, Antispam, Antivirus, and Outbreak Filters.”

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    SUNY Old Westbury, CoxHealth, City of Fullerton, Indra
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Computer Software Company16%
    Comms Service Provider13%
    Government6%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Manufacturing Company7%
    Government7%
    REVIEWERS
    Computer Software Company20%
    Energy/Utilities Company10%
    Retailer10%
    Manufacturing Company8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Educational Organization16%
    Financial Services Firm7%
    Government6%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Government8%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business42%
    Midsize Enterprise16%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise51%
    REVIEWERS
    Small Business32%
    Midsize Enterprise32%
    Large Enterprise37%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise28%
    Large Enterprise49%
    REVIEWERS
    Small Business42%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Cisco Secure Email vs. Trellix Collaboration Security
    March 2024
    Find out what your peers are saying about Cisco Secure Email vs. Trellix Collaboration Security and other solutions. Updated: March 2024.
    768,415 professionals have used our research since 2012.

    Cisco Secure Email is ranked 2nd in Email Security with 55 reviews while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. Cisco Secure Email is rated 8.4, while Trellix Collaboration Security is rated 8.6. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". Cisco Secure Email is most compared with Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection, Cisco Secure Email Threat Defense and Trend Micro Email Security, whereas Trellix Collaboration Security is most compared with Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security, Fortinet FortiMail and Barracuda Email Security Gateway. See our Cisco Secure Email vs. Trellix Collaboration Security report.

    See our list of best Email Security vendors.

    We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.