We performed a comparison between Cisco Secure Email and Webroot Advanced Email Encryption powered by Zix based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, TitanHQ and others in Email Security."Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"There are several features that I consider valuable."
"The product's scalability is good."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"The most valuable features are Advanced Malware Protection, URL filtering, and of course Reputation Filtering."
"Cisco Secure Email Cloud Gateway has allowed our users to be able to concentrate on the emails that they do receive. Previously, our users had to deal with nine million additional emails across the organization, which is nearly 1,000 emails per user to have to deal with a month. That's a massive amount for our staff to deal with and probably several hours of their time. We have a lot of clinical staff, being a hospital. We want to make our staff as productive as possible. By removing a lot of that spam and phishing type emails, this allows them to do their job."
"The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load."
"The strong point of the solution is that we hardly get any spam emails because of Cisco Secure Email."
"Initially, the most valuable feature for us was the SenderBase Reputation, because that reduced the number of emails that were even considered by the system by a huge number..."
"The system enables end users to manage their own whitelists/blacklists."
"It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. There are a lot of things that you cannot handle on the graphic interface, like message filters. For this, you need to go to a lower level where you have more power, like command line interface. So, this solution has the best of both worlds. There are not a lot of bells and whistles. It is more practical with access to most features that you can configure."
"It is a user-friendly product."
"They do a better job of determining what's real and what's not than most of the other solutions we have tried, and it's been very painless to use."
More Webroot Advanced Email Encryption powered by Zix Pros →
"Configuration requires going to a lot of places rather than just accessing one tab."
"The UI needs to be more user-friendly."
"The custom alerts have to improve a lot."
"Microsoft wants its well-paying customers to finish testing some of its half-baked products, find bugs, and report bugs back to Microsoft's team, which is a little frustrating for those who have to manage it and roll it up to thousands of people across the organization."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"The product must provide better malware detection."
"Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"It would be nice to have an easier way to check on the health of the system, how stressed these appliances are. Sure, you can do it, but it would be helpful to have an easier way to do it, maybe even at a glance."
"They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like."
"We didn't get any malware, but a few phishing emails, maybe one or two, slipped in."
"Cisco Secure Email can be improved from the administrator's point of view. Usually, you have to work with different areas, and they can try to make it easy for the administrator to use different functions."
"The initial setup was complex because I have two sites with physical clusters."
"Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way."
"While Cisco offers excellent solutions and innovations, the pricing may not be suitable for everyone. The cost of the software is relatively high. In the current market, there are numerous competitive alternatives that focus on security, enterprise networks, and various other aspects. Cisco, being a comprehensive provider, extends its expertise across data, servers, storage, and security, making them a preferred choice for many enterprises. However, when it comes specifically to security solutions, there are other vendors that specialize solely in this domain, offering competitive options."
"The tool's pricing can be improved."
"They have some areas that could be improved. For example, we also use this solution for email encryption, which was clunky and could be improved, but the email security itself has been excellent."
More Webroot Advanced Email Encryption powered by Zix Cons →
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Webroot Advanced Email Encryption powered by Zix Pricing and Cost Advice →
Earn 20 points
Cisco Secure Email is ranked 2nd in Email Security with 55 reviews while Webroot Advanced Email Encryption powered by Zix is ranked 14th in Secure Email Gateway (SEG). Cisco Secure Email is rated 8.4, while Webroot Advanced Email Encryption powered by Zix is rated 7.0. The top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". On the other hand, the top reviewer of Webroot Advanced Email Encryption powered by Zix writes "Inexpensive, with good email security, but the technical support could be improved". Cisco Secure Email is most compared with Trellix Collaboration Security, Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection and Cisco Secure Email Threat Defense, whereas Webroot Advanced Email Encryption powered by Zix is most compared with Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP) and Barracuda Email Security Gateway.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.