Trellix Collaboration Security vs Webroot Advanced Email Encryption powered by Zix comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Trellix Collaboration Security and Webroot Advanced Email Encryption powered by Zix based on real PeerSpot user reviews.

Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG).
To learn more, read our detailed Secure Email Gateway (SEG) Report (Updated: April 2024).
769,630 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use.""FireEye is good for malware depicting and security.""The product protects my email.""The solution's most valuable feature is its simplicity. It's very user-friendly.""The product helps reduce the number of malicious emails reaching the user's inbox.""The auto-remediation feature is valuable.""FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.""The initial setup is simple."

More Trellix Collaboration Security Pros →

"They do a better job of determining what's real and what's not than most of the other solutions we have tried, and it's been very painless to use."

More Webroot Advanced Email Encryption powered by Zix Pros →

Cons
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""The spam detection feature could be better.""The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier.""The custom tailoring is limited.""I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed.""Sometimes especially zero-day spam emails can be passed to the user's inbox.""I would like to see this solution become more flexible.""The solution needs better support."

More Trellix Collaboration Security Cons →

"They have some areas that could be improved. For example, we also use this solution for email encryption, which was clunky and could be improved, but the email security itself has been excellent."

More Webroot Advanced Email Encryption powered by Zix Cons →

Pricing and Cost Advice
  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

  • "In terms of pricing, I believe they provide excellent value."
  • More Webroot Advanced Email Encryption powered by Zix Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Secure Email Gateway (SEG) solutions are best for your needs.
    769,630 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution must provide features to scan QR codes for threats. Nowadays, threats are embedded inside QR codes.
    Top Answer:The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
    Ask a question

    Earn 20 points

    Ranking
    Views
    517
    Comparisons
    426
    Reviews
    4
    Average Words per Review
    328
    Rating
    9.0
    Views
    220
    Comparisons
    163
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    FireEye Email Security
    Zix Email Encryption, ZixEncrypt
    Learn More
    Trellix
    Video Not Available
    Overview

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Proven Content Filters

    To send an encrypted email, your employees simply create a message and hit ‘send'. Our content filters take care of the rest.

    Transparent Delivery

    When your employees receive an encrypted reply, the experience is just as easy. They simply open the encrypted email like regular email. No matter where they are or what device they use, if your customers and partners have email, they can easily receive encrypted email.

    Convenient Recipient Experience

    Our patented Best Method of Delivery ensures all messages are delivered in the most secure and easy manner possible, including transparent, pull and push methods. For pull delivery, secure web portals can be in the cloud or on-site. Also among our robust methods is secure PDF for statement delivery.

    Simplified Quarantined Messages

    If an email is quarantined, then employees, managers and IT receive notification to view the message and policy violations and can delete the email, or justify and release it for delivery.

    Sample Customers
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Erie County of Pennsylvania’s Human Services Department, Justice Federal Credit Union, STAR Financial Group, Chisago County, Minn., The National Banks of Central Texas, Kentucky Retirement Systems (KRS), Frankfort, Ky, Athletico Physical Therapy, District of Columbia Retirement Board (DCRB), CIBM Bank
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm15%
    Government9%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm12%
    Government11%
    Healthcare Company8%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise23%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise17%
    Large Enterprise45%
    Buyer's Guide
    Secure Email Gateway (SEG)
    April 2024
    Find out what your peers are saying about Proofpoint, Barracuda Networks, IRONSCALES and others in Secure Email Gateway (SEG). Updated: April 2024.
    769,630 professionals have used our research since 2012.

    Trellix Collaboration Security is ranked 9th in Secure Email Gateway (SEG) with 12 reviews while Webroot Advanced Email Encryption powered by Zix is ranked 13th in Secure Email Gateway (SEG). Trellix Collaboration Security is rated 8.6, while Webroot Advanced Email Encryption powered by Zix is rated 7.0. The top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". On the other hand, the top reviewer of Webroot Advanced Email Encryption powered by Zix writes "Inexpensive, with good email security, but the technical support could be improved". Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP) and Trend Micro Email Security, whereas Webroot Advanced Email Encryption powered by Zix is most compared with Microsoft Defender for Office 365, Proofpoint Email Protection and Microsoft Exchange Online Protection (EOP).

    See our list of best Secure Email Gateway (SEG) vendors.

    We monitor all Secure Email Gateway (SEG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.