Anonymous UserSecurity Engineer at a energy/utilities company
EnriqueDiaz JollyOwner at Jolly Security Inc
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
"It is not that costly. We pay for the solution through a contractor and pay an annual fee."
"You're going to get what you pay for. If you're not willing to pay the price of Cisco, you're not going to get a product that's as good as Cisco. I don't think Cisco is overpriced, because for the last two years I've been comparing it to Microsoft and Cisco has been cheaper and given us more features."
"In my previous organization, avoiding four instances of CryptoLocker within an estimated six month period is approximately $600,000 in lost time and effort. Our five year cost was about a million dollars, and the four outages that we had equated to 65 percent of that five year cost."
"The licensing was all transferred."
"Compared to Cisco's on-prem service, the cost is the same, but you don't have to pay for the hardware and you don't have to maintain the system, as far as upgrades and hardware failures are concerned. It is cheaper to operate on their cloud service than it is to operate with their on-prem service."
"Cisco Secure Email and the support are priced well. It's not cheap, but there are other solutions that offer less and cost so much. For example, Microsoft is more expensive than Cisco."
Earn 20 points
Customers of all sizes face the same daunting challenge: email is simultaneously the most important business communication tool and the leading attack vector for security breaches. Cisco Email Security enables users to communicate securely and helps organizations combat Business Email Compromise (BEC), ransomware, advanced malware, phishing, spam, and data loss with a multilayered approach to security.
FireEye Email Security delivers dynamic defense to detect attacks from the very first time they're seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.
Secure G Suite isolates emailed links and attachments to protect against phishing attacks or malicious websites. It is built on our Global Cloud Proxy, which includes global low latency peering on the Internet backbone for the best G Suite user experience.
Secure G Suite relies on two key technologies, Cloud Proxy and our Isolation Core. Our cloud proxy help businesses adopt a direct-to-Internet architecture by pointing all traffic to a single location on the internet that we then secure. Our Isolation Core prevents email-based attacks by opening documents in the cloud and safely rendering the content to the end-device.
FireEye Email Security is ranked 12th in Email Security with 3 reviews while Menlo Security Email Security is ranked 30th in Email Security. FireEye Email Security is rated 7.6, while Menlo Security Email Security is rated 0.0. The top reviewer of FireEye Email Security writes "Malware security exceptional, great complementary solution, and support knowledgeable". On the other hand, FireEye Email Security is most compared with Forcepoint Email Security, Microsoft Exchange Online Protection, Fortinet FortiMail and DMARC Compass, whereas Menlo Security Email Security is most compared with Proofpoint Email Protection and Mimecast Email Security with Targeted Threat Protection.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.