Anonymous UserSecurity Engineer at a energy/utilities company
EnriqueDiaz JollyOwner at Jolly Security Inc
Secengin46Security Engineer at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"There were detailed logs available. That was a seriously good feature... It turns out these were actually spoof emails that came into our environment. I got to know about them from the log system."
"It has the IMS engine, Intelligent Multi-Scan engine, and it does a good job, right out-of-the-box, of blocking the vast majority of things that should be blocked."
"Initially, the most valuable feature for us was the SenderBase Reputation, because that reduced the number of emails that were even considered by the system by a huge number..."
"The most valuable feature is the different content filters we are using, such as DKIM."
"We like the in-built features, like the email filtering based on the IP and domain. Cisco has its own blacklisted domains and IPs, which is very good. This filters around 70 percent of emails from spam, and we are seeing fewer false positives with this."
"The most valuable features are Advanced Malware Protection, URL filtering, and of course Reputation Filtering."
"It does a great job of preventing spam, malware, and ransomware. I can only go by what people have told me and what I've seen, but I have not seen spam in a year and a half to two years in my own company mailbox. And there are not a lot of catches where it's catching something that should have gotten through, either."
"It has the ability to tell us, after an email has been delivered, where else it went, once it got inside. Maybe it's something we wanted it to stop and it didn't stop it, but it notified us later that it was something that it should have stopped. It can give us a trajectory of all the other places that it went internally and it can tell us what files were transferred as well."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"The auto-remediation feature is valuable."
"FireEye is good for malware depicting and security."
"The feature I find most valuable is the web, email and DLP integration."
"All of the filtering features are very nice."
"The filtering of the solution is very good. You can do URL filtering and, while you need a custom URL to filter under other solutions like Symantec, here the solution covers most categories and the database."
"The Forcepoint Email Security roadmap easily integrates with the data loss prevention (DLP) suite of Forcepoint. Therefore, the customer doesn't have to buy another solution for DLP."
"This is a reasonably stable solution."
"The email and the web filter aspects of the solution are the most valuable features."
"They could improve the filters. In my time at the company, there were several times we had to contact support to update the filters."
"It would be nice to have an easier way to check on the health of the system, how stressed these appliances are. Sure, you can do it, but it would be helpful to have an easier way to do it, maybe even at a glance."
"We have occasionally had hardware problems because we are using an appliance-based solution, but that might change. We may consider going to virtual systems."
"We would like to see more options for the customization of content filters."
"The solution needs to improve its advanced phishing filters. It is very good at filtering things which have bad reputations. However, when phishing or malicious emails are new or coming from a legitimate source, we don't feel that the solution is working."
"The reporting functionality needs to be improved."
"Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way."
"I would like more functionality and how to use it for Level 2 type staff. The biggest issue is it needs to be easier to use and navigate."
"The reporting aspect of the solution needs improvement."
"The spam detection feature could be better."
"If they want to be the primary or best solution, they need to have better email management features."
"I would like to see some improvement like cloud application and integration capabilities and the classification part is missing from the DLP."
"The reporting functionality needs to be improved, as it is not customizable."
"We've fixed a couple of issues on the solution so far. It doesn't work perfectly all the time."
"It would be better if it were simpler to deploy on one or two machines instead of three or four machines."
"It's quite difficult to learn this solution, it's not an entry level product. If you are a skilled user you will think it's a very useful tool, but if you are not a skilled user, you'll think it is very difficult to learn."
"Technical support is lacking. It could be a lot better."
"We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
"It is not that costly. We pay for the solution through a contractor and pay an annual fee."
"You're going to get what you pay for. If you're not willing to pay the price of Cisco, you're not going to get a product that's as good as Cisco. I don't think Cisco is overpriced, because for the last two years I've been comparing it to Microsoft and Cisco has been cheaper and given us more features."
"In my previous organization, avoiding four instances of CryptoLocker within an estimated six month period is approximately $600,000 in lost time and effort. Our five year cost was about a million dollars, and the four outages that we had equated to 65 percent of that five year cost."
"The licensing was all transferred."
"Compared to Cisco's on-prem service, the cost is the same, but you don't have to pay for the hardware and you don't have to maintain the system, as far as upgrades and hardware failures are concerned. It is cheaper to operate on their cloud service than it is to operate with their on-prem service."
"Cisco Secure Email and the support are priced well. It's not cheap, but there are other solutions that offer less and cost so much. For example, Microsoft is more expensive than Cisco."
"Licensing is a yearly subscription that is based on the number of users."
"The licensing is user base (per user). The product is purchased mostly by medium to large companies. For smaller companies, we have other solutions because the pricing is not cheap."
"There are three types of support licenses."
"When compared to other email security solutions, the price is not cheap."
Customers of all sizes face the same daunting challenge: email is simultaneously the most important business communication tool and the leading attack vector for security breaches. Cisco Email Security enables users to communicate securely and helps organizations combat Business Email Compromise (BEC), ransomware, advanced malware, phishing, spam, and data loss with a multilayered approach to security.
FireEye Email Security delivers dynamic defense to detect attacks from the very first time they're seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.
Forcepoint Email Security gives you the security you need by protecting you against multi-stage advanced threats that often exploit email to penetrate your IT environment. It applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to identify targeted attacks, high-risk users and insider threats. Forcepoint Email Security monitors outbound email to prevent leaks of sensitive information, and it empowers your workers — in the office or on the road — to safely adopt technologies like Microsoft Office 365.
FireEye Email Security is ranked 12th in Email Security with 3 reviews while Forcepoint Email Security is ranked 7th in Email Security with 6 reviews. FireEye Email Security is rated 7.6, while Forcepoint Email Security is rated 7.6. The top reviewer of FireEye Email Security writes "Malware security exceptional, great complementary solution, and support knowledgeable". On the other hand, the top reviewer of Forcepoint Email Security writes "Easily integrates with the data loss prevention suite". FireEye Email Security is most compared with Microsoft Exchange Online Protection, Fortinet FortiMail, DMARC Compass, Symantec Messaging Gateway and Mimecast Email Security with Targeted Threat Protection, whereas Forcepoint Email Security is most compared with Proofpoint Email Protection, Fortinet FortiMail, Microsoft Exchange Online Protection, Barracuda Email Security Gateway and Symantec Messaging Gateway. See our FireEye Email Security vs. Forcepoint Email Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.