Ray LaCasseEmail Adminstrator at Merchants Capital Resources, Inc.
Anonymous UserInformation Technology Help Desk Technician at a consumer goods company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
"It is not that costly. We pay for the solution through a contractor and pay an annual fee."
"You're going to get what you pay for. If you're not willing to pay the price of Cisco, you're not going to get a product that's as good as Cisco. I don't think Cisco is overpriced, because for the last two years I've been comparing it to Microsoft and Cisco has been cheaper and given us more features."
"In my previous organization, avoiding four instances of CryptoLocker within an estimated six month period is approximately $600,000 in lost time and effort. Our five year cost was about a million dollars, and the four outages that we had equated to 65 percent of that five year cost."
"The licensing was all transferred."
"Compared to Cisco's on-prem service, the cost is the same, but you don't have to pay for the hardware and you don't have to maintain the system, as far as upgrades and hardware failures are concerned. It is cheaper to operate on their cloud service than it is to operate with their on-prem service."
"Cisco Secure Email and the support are priced well. It's not cheap, but there are other solutions that offer less and cost so much. For example, Microsoft is more expensive than Cisco."
"Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost."
"The price is reasonable."
"Proofpoint is fairly expensive."
"The licensing is basically $8/user."
Earn 20 points
Customers of all sizes face the same daunting challenge: email is simultaneously the most important business communication tool and the leading attack vector for security breaches. Cisco Email Security enables users to communicate securely and helps organizations combat Business Email Compromise (BEC), ransomware, advanced malware, phishing, spam, and data loss with a multilayered approach to security.
Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as email fraud). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk "graymail" and other unwanted email. And business continuity capabilities keep email communications flowing, even when your email server fails.
Symantec Web Isolation executes web sessions away from endpoints, sending only safe rendering information to users’ browsers thereby preventing any website delivered zero-day malware from reaching your devices. When combined with Symantec Secure Web Gateways, policies allow isolating traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk profiles. By integrating with Symantec messaging solutions, Web Isolation allows to isolate links in email to prevent phishing threats and credential attacks.
Proofpoint Email Protection is ranked 2nd in Email Security with 10 reviews while Symantec Web Isolation is ranked 21st in Anti-Malware Tools. Proofpoint Email Protection is rated 9.0, while Symantec Web Isolation is rated 0.0. The top reviewer of Proofpoint Email Protection writes "Flexible, very secure, and offers excellent technical support". On the other hand, Proofpoint Email Protection is most compared with Palo Alto Networks WildFire, Microsoft Exchange Online Protection, Fortinet FortiMail, Microsoft Defender for Office 365 and Agari, whereas Symantec Web Isolation is most compared with Menlo Web Security, Palo Alto Networks WildFire, FireEye Network Security, Cisco Stealthwatch and Trend Micro Deep Discovery Email Inspector.
See our list of .
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.