We compared Avanan and Perception Point Advanced Email Security across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Avanan is highly praised for its customizability as well as its consistent advancements in artificial intelligence and machine learning. Perception Point Advanced Email Security is known for its ability to identify impersonation attacks and exceptional scanning capabilities.
Room for Improvement: Avanan can enhance its alert clearance speed, decrease false positives, and improve scanning and backup options. Perception Point Advanced Email Security could improve content analysis and the ability to detect BEC attacks.
Service and Support: Avanan's customer service is consistently commended for its exceptional quality, efficiency, and expertise. Perception Point's customer service is highly regarded for being responsive, attentive, and interactive.
Ease of Deployment: Users like Avanan's trouble-free setup and easy updates. Some users find Perception Point’s setup process to be straightforward and easy, while others have encountered hurdles.
Pricing: Avanan offers affordable, transparent SaaS-based pricing. Users find it cost-effective, particularly for small and medium-sized enterprises. Perception Point Advanced Email Security offers affordable pricing that accommodates all budgets and delivers satisfactory value.
ROI: Avanan has consistently provided positive results by enhancing email network security and contributing to revenue growth. Perception Point Advanced Email Security excels in its ability to detect threats effectively, resulting in significant time and cost savings by preventing downtime and the need for extensive cleanup.
Comparison Results: Avanan is praised for its ease of implementation, adaptability, and cost-effectiveness. Users say Avanan could improve by reducing false positives and providing better documentation. Perception Point Advanced Email Security is praised for its ability to detect and prevent impersonation attacks and great customer support. The solution could improve in detecting BEC attacks and providing user-friendly configuration options.
"The basic features are okay and I'm satisfied with the Defender."
"The deployment capability is a great feature."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"Since we have started using the solution, there have been fewer compromises."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"When we don't understand some functionalities, the customer support staff responds fast to our calls and provides immediate action."
"I like Avanan's SmartDLP module. It's seamless, and the administrative overhead is low. We aren't a very sophisticated operation. We just want to reduce our exposure, so we find ThreatCloud helpful. Avanan's acquisition by Check Point was beneficial for them."
"The threat detection tools enable us to ascertain malware and phishing messages across the email network infrastructure."
"If we look at four to five years ago, we had close to six or eight people click a link in an email per month. Now, we are probably down to about five or six clicks a year, if not less."
"This technology is one of Check Point's acquisitions, and it is currently a powerful tool that provides all the protection that is not found in other tools."
"Easy to use for non-technical users."
"Email inspection has saved many employees from spam attacks and viruses from unauthorized sources."
"It can detect corrupted files and filters out documents with viruses."
"The most valuable feature is the technical support services."
"The solution is used to block malicious items hidden inside a document or PDF file."
"It really works well on SharePoint when you upload a file or save a file. Advanced Email Security scans if it is malicious and identifies issues. It can do some forensics on its console, which is nice."
"What's really good about this platform is that you have full visibility, it has a very nice and very friendly UI, it's quick, and there's no latency in the scanning."
"We can use it to perform detection and analysis of emails. For any malicious content found in emails, it gives in-depth analysis reports to end users. If you log into the console, you can see in-depth detection and how it happens."
"The most valuable feature of Perception Point Advanced Email Security is the filtering and securing of emails."
"Their security engines are very effective at stopping malware and potential attacks before they reach a user's mailbox. They have the best detection engine."
"We haven't had a client, who uses their protection, have an email security breach. That is the best thing about what they do. We don't have to think too much. Their product just works and keeps bad emails away."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"The only thing they should improve is the licensing model. They should stop changing it. A year ago, the five features I mentioned were included in one product. Now, three of them are bundled into one product, and you have to pay extra for the other two. I don't mind paying extra, but I don't want them to change it every year or every six months. I need to know what I'm looking at and not worry about it next year."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"Several simulation options are available within 365, and the phishing simulation could be better."
"The company should focus on adding threats that the solution is currently unable to detect."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"The system could be designed to give corporate emails first priority due to demands."
"Integration with various SaaS offerings, who are leading in the SaaS market."
"The system response in a slow computing device affects performance when sending and receiving emails."
"The unified dashboard that it displays needs some improvements in terms of the KPIs that they have."
"The overall user interface is not attractive. It needs some improvement."
"Being cloud first and because we are in the movie business, we use a lot of Macintoshes. So, there is absolutely no reason for us to have Active Directory whatsoever. However, if you are using Office 365, you must have Active Directory in order to reset passwords. Even though we have a single sign-on provider, we must have Azure Active Directory for Office 365, which is really stupid. As a cloud application, you would think that I don't need Active Directory, which I don't need for anything else except Office 365. We have one server inside that space to help us manage Active Directory just for Office 365. This is a very sore point, but it is what it is."
"The cost can be reviewed to enable SMEs to acquire it and enjoy great security features."
"Sometimes it seemed like the allow list wasn't working. I've created many allow list rules however, they still seem to be blocked; the same is true with the blocked list rules."
"This is an option to preview an email in their console, and that could be improved. If you open the preview, then it auto scrolls. Therefore, it is hard to look at the email when it is going to the next page or scrolling. It should not have the auto-scroll."
"We have had a few false positives, not that many, but a few... they have a feature where someone from the Incident Response team can look at an email and mark it as 'verified malicious.' You might think that if an engine detects it is malicious, and an IR team member has flagged it as malicious, it will definitely be malicious. But that's not always the case."
"Its websites for analysis need to be a bit more approachable for people who are less technical. Technically, it is a fire-and-forget solution. So, you want to be able to implement this solution for a lot of companies who don't have security operation teams (SOCs) behind them. You need to have something where a secretary can jump onto this console and release whatever she needs to release. Therefore, it needs to be written in a very specific non-technical language."
"They could provide additional data loss prevention features as we encounter different kinds of attacks in today's scenario."
"Our users would like the solution to scan outgoing emails. So, if my system is compromised, and I have malicious content in my system, then there is a possibility that I am sending a colleague that malicious content."
"Email alerts should be available in real-time."
"They just don't do a good job of promoting themselves. They seem like a typical busy IT company who is just working on fixing problems and making technology better. However, they are not fantastic at marketing themselves to existing partners, which is not a bad thing. It is just something for improvement."
"There is still room for improvement with BEC. There is more work to be done by Perception Point on machine learning and neuro language as well. BEC is very difficult if you don't have a computer language looking into the content of the email and trying to make a determination through that. With BEC you often don't have an attachment or a URL."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Perception Point Advanced Email Security Pricing and Cost Advice →
Avanan is ranked 6th in Email Security with 21 reviews while Perception Point Advanced Email Security is ranked 16th in Email Security with 21 reviews. Avanan is rated 9.2, while Perception Point Advanced Email Security is rated 9.0. The top reviewer of Avanan writes "We've noticed a significant decline from people accidentally or intentionally clicking on things". On the other hand, the top reviewer of Perception Point Advanced Email Security writes "Incident Response team answers immediately and fine-tunes system to continually improve detection". Avanan is most compared with Check Point Harmony Email & Collaboration, IRONSCALES, Abnormal Security, Mimecast Email Security and Fortinet FortiMail, whereas Perception Point Advanced Email Security is most compared with Proofpoint Email Protection, IRONSCALES, Sophos Email, Darktrace and Barracuda Email Security Gateway. See our Avanan vs. Perception Point Advanced Email Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.