Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Cisco Secure Email Threat Defense comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
45
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (10th)
Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
8.0
Number of Reviews
37
Ranking in other categories
No ranking in other categories
Cisco Secure Email Threat D...
Ranking in Email Security
26th
Average Rating
8.0
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 15.9%, down from 20.3% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 1.0%, up from 0.7% compared to the previous year. The mindshare of Cisco Secure Email Threat Defense is 1.3%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Luis-Brown - PeerSpot reviewer
Allows for easy reporting of problems, valuable anti-phishing, and anti-malware support
Microsoft Defender for Office 365 lacks proactivity in assisting us with preparing for potential threats before they occur. While they employ a substantial amount of threat intelligence to preemptively prevent incidents, their effectiveness diminishes when it comes to delivering proactive threat intelligence alerts from Microsoft. Their focus primarily revolves around managing the internal environment. On the other hand, my other vendor, Check Point, along with my membership in MS-ISAC, supplements me with this type of information. The phishing and spam filters could use some improvement. It is adequate, but it doesn't match the quality of Proofpoint or Mimecast. However, it comes close in effectiveness. Plus, if we're obtaining it for free, investing in the other products seems impractical.
Dushyant Trivedi - PeerSpot reviewer
Effectively secures data centers against various threats, including spam emails and provides policy-based control
It is a stable solution. We implemented the solution in HA. This is because the solution is highly available and can withstand hardware failures and software upgrades. Once the solution is implemented, there is no need for any further downtime for the Check Point server. Because once we change any policy, we can break the High Availability (HA) session and define the new policy on the Check Point Security Gateway (SGW) in isolation. This allows us to test the new policy without affecting the production traffic. Once the new policy is tested and active, we can then activate it on the HA pair and bring the HA session back up. This process ensures that we can make changes to the policy without any interruption to the user experience. It is a really stable solution. I would rate the stability a ten out of ten.
Mike Bulyk - PeerSpot reviewer
Can quickly identify, track, tag, and categorize internal emails. Reporting accessibly via the main dashboard would be a great addition.
If Cisco could continue to develop integrations, whether it's internal tooling, Threat Grid, or AMP reporting which could be accessible via a single web page, that would be helpful. This would essentially add additional context on messages as well as files or links being detected. Potentially adding additional context on why certain messages are tagged as spam or malware. In our case, malware hasn't been detected yet, but spam certainly has been. Knowing what engines or which components of the message make it identifiable as spam, that could be useful. Additional context and reporting accessibly via the main dashboard would be great. There is still room for improvement in terms of integrations with other Cisco tools and non-Cisco tools. There is also some room for improvement needed in terms of the reporting.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Does a thorough job of examining email and URLs for malicious content."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"The initial setup was easy."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"We use Microsoft Defender for its ability to integrate with existing business technologies, which is beneficial for protecting business areas."
"The basic features are okay and I'm satisfied with the Defender."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"There are several features that I consider valuable."
"It is easy to install, and the deployment is super easy as well."
"Since the engine is made to block by IP, domains, and reputation, we minimized the spam threats that end up in the user's mailbox."
"The robust Smart Dashboard enables to us fetch important and accurate data insights concerning the blocking of spammers and malware attacks on the system."
"When sharing files with my colleagues, it provides a comprehensive report on the security status of the document."
"I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
"The solution can be monitored on a single dashboard with actionable insights and reporting."
"Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
"This product integrates well and is easy to manage."
"I would say it's very comprehensive, with multiple antivirus OEMs, virus encrypt features, encryption, and more."
"Cisco Secure Email Cloud Mailbox can handle a complete portfolio, which is required to protect any kind of attack coming from emails. However, it does not have advanced phishing, but it is available through Cisco. If you compare Cisco Secure Email Cloud Mailbox with the competition, in the competition you have to have one or two solutions together to address the customer's requirement, whereas Cisco Secure Email Cloud Mailbox is addressing everything, such as web domain and email protection. If there is any kind of challenge it will come across through email."
"It's very easy to deploy and configure."
"Cisco has a threat mechanism called cloud-based Talos, where all the threats are inbuilt."
"This solution is easy to use."
"On ease of use, it rates very high. It's something that I was able to get into without really looking at any documentation. I wanted to see what it felt like before I started looking at any documentation on how to use it, and it was very easy to use. It works very smoothly. The user experience is very intuitive. They did an amazing job on that."
"The ability to see east-west traffic is its most valuable feature. Traditionally, email defense focuses on north-south, inbound-outbound, egress-ingress traffic. With Cisco Secure Email Cloud Mailbox, it's able to quickly identify, track, tag, and categorize emails that are internal. That can typically give us visibility into if there's an internal compromised account (for example). Someone can then use that internal compromised account to email additional accounts with either malicious software or links, but internal within that Office tenant. Effectively, that email message never leaves the tenant. Any of the mail gateways really do not have any method or way of seeing this traffic since it's not leaving the environment."
"Secure Email Threat Defense's scalability is good."
 

Cons

"I'd like some additional features any product can give me to protect our environment in a better way."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"There's room for improvement regarding the time frame for retrieving emails."
"We need to be able to whitelist data at the backend."
"There is room for improvement with the UI."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once."
"Microsoft Defender for Office 365 should be more proactive."
"A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings."
"In my book, more and more customized integrations could be made available so that different kinds of mail servers and cloud servers can be internally integrated for real-time system flow and security enablement."
"I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."
"While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
"It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."
"Check Point Anti-Spam and Email Security Software Blade could improve by focusing more on promoting and marketing its products. Despite having a great solution, it hasn't captured a larger market share, possibly due to insufficient promotion. It should also incorporate a module to monitor client identities, similar to CrowdStrike. It could also improve by systemizing and simplifying their documentation to make it easier to find needed information."
"The pattern used to filter emails could be improved"
"If you face any configuration problems, Check Point is the only solution."
"There is still room for improvement in terms of integrations with other Cisco tools and non-Cisco tools. There is also some room for improvement needed in terms of the reporting."
"Cisco's multiple product lines and verticals made this just one of their many verticals, and we could see a shift in focus."
"The tool gives false positives and it needs to be more accurate. I would like to see AI as a new feature."
"The pricing could always be better."
"Cisco Secure Email Cloud Mailbox can improve by adding advanced phishing, then the solution would become the best in the market. However, this could increase the price even more. Additionally, if CES with domain protection could be added it would be an even better solution."
"The solution is a bit expensive."
"The search area has room for improvement. When you go to the next page, it remains at the bottom of the current page that you're on. Also, under the reports section, it allows you to see any "convictions," but if you want to search for those convictions you have to remember when they all came in and go back and edit the search accordingly. You cannot click on the list of convictions to actually see if you had a spike at a certain time."
"This solution could be improved by integration with Sandbox."
 

Pricing and Cost Advice

"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"The license is expensive because the cost is based on the number of users."
"The pricing is normal. Considering its popularity, it's not overpriced."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"The pricing has become expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Reasonably priced solution."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"I rate the product pricing a seven out of ten."
"The cost is competitive with other security products on the market."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"For licensing, my company makes yearly payments, which is expensive."
"It is expensive compared to other vendors."
"The feedback from vendors and customer is that it is expensive."
"Cisco Secure Email Cloud Mailbox does not have any competition with Sophos, Trend Micro, or other vendors of the world. However, there is a pricing premium for the solution. One has to look at it from that angle that while they are buying Cisco, there will be a premium, and Cisco justifies that premium value. That's why they're charging a high price."
"The solution’s pricing is manageable."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
816,636 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Security Firm
30%
Financial Services Firm
14%
Computer Software Company
10%
Educational Organization
5%
Computer Software Company
41%
Financial Services Firm
6%
Manufacturing Company
5%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
The pricing is reasonable since it comes integrated with our Office 365 license.
What needs improvement with Microsoft Defender for Office 365?
Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detec...
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-p...
What do you like most about Secure Email Threat Defense?
Secure Email Threat Defense's scalability is good.
What needs improvement with Secure Email Threat Defense?
Cisco is a multi-product, diverse organization. Before it was acquired by Cisco, the company that developed Email Thr...
 

Also Known As

MS Defender for Office 365
No data available
Cisco Secure Email Cloud Mailbox, Cisco CMD, Cisco Cloud Mailbox Defense
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
SF Police Credit Union (SFPCU)
Luiss University, Lone Star College, T-Systems, Magyar Telekom
Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Cisco Secure Email Threat Defense and other solutions. Updated: October 2024.
816,636 professionals have used our research since 2012.