Try our new research platform with insights from 80,000+ expert users

Cisco Secure Email vs Seclore Email Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Email
Ranking in Email Security
6th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
62
Ranking in other categories
Cisco Security Portfolio (7th)
Seclore Email Encryption
Ranking in Email Security
72nd
Average Rating
0.0
Reviews Sentiment
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Email Security category, the mindshare of Cisco Secure Email is 5.1%, down from 7.1% compared to the previous year. The mindshare of Seclore Email Encryption is 0.2%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Cisco Secure Email5.1%
Seclore Email Encryption0.2%
Other94.7%
Email Security
 

Featured Reviews

BD
Chief Information Security Officer at Abcl
Threat intelligence with fast attack detection enables comprehensive email protection
In some cases, detection is missed, leading to false positives where genuine emails are flagged as spam. This could result in users not opening genuine emails. We have highlighted this to Cisco because sometimes phishing or marketing campaigns, which are genuine, are incorrectly flagged as spam. The solution should better analyze the actual content rather than only focusing on the email header or origin.
Shruti Shetty - PeerSpot reviewer
Implementation Specialist - Data Privacy at EVSPL
Automatically protects any files placed within a designated folder, simplifying data protection and ensure continuous data control
The hot folder feature is the most valuable feature of Seclore for safeguarding communications. For example, if an unauthorized user gets access to a file, you can remove their access even if they've forwarded it to someone else. The hot folder feature creates a parent folder that automatically protects any files placed within it. Additionally, when policies are created for third-party applications, files downloaded from them are automatically protected. For instance, pharmaceutical companies generate many files from third-party applications, and Seclore can automatically protect them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Users were able to do a check by themselves on quarantined emails. They could check if a valid email had been stopped, if it matched up with the SPF certification."
"The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load."
"This solution provides some benefits, like comfortable access to TAC support. You get prompt support when working directly with Cisco."
"The tech engineers are very knowledgeable."
"The added value of it is that every migration to a new version is initiated by the Cisco version itself, so that is a bunch of work that you don't have to do on the Cisco ESA system on-premise. As it becomes a safe platform, you don't need to invest anything in your own data center or in your upgrade path."
"ATP has been the most valuable in improving our email security posture."
"I love the Advanced Malware Protection feature. It works very well... The appliance has more security such as SDF, DKIM, DMARC, and encryption."
"It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. There are a lot of things that you cannot handle on the graphic interface, like message filters. For this, you need to go to a lower level where you have more power, like command line interface. So, this solution has the best of both worlds. There are not a lot of bells and whistles. It is more practical with access to most features that you can configure."
"The hot folder feature is the most valuable feature of Seclore for safeguarding communications. For example, if an unauthorized user gets access to a file, you can remove their access even if they've forwarded it to someone else."
 

Cons

"The solution needs to improve its advanced phishing filters. It is very good at filtering things which have bad reputations. However, when phishing or malicious emails are new or coming from a legitimate source, we don't feel that the solution is working."
"In some cases, detection is missed, leading to false positives where genuine emails are flagged as spam."
"Cisco Email Secure's pricing needs to be less. We have vendors who provide cheaper solutions with the same features."
"They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like."
"I have some frustrations with the user experience in the interface, specifically with regard to making a list of people for whom I want to allow email access."
"The configuration UI should be made more intuitive. Currently, it takes a while to understand how to do the basic configurations."
"Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way."
"I use the search all the time. Sometimes, it is hard to search for things and things are hard to find. People come to me all the time, saying, "This email didn't get through." Then, I go searching and don't find it on the first search. You have to think about alternative searches. I don't know if there is an easier way that they could help to find things. I don't know how they could simplify it, because now everybody else is using the cloud and everything is coming from Office 365, or whatever. It is just not the same environment from years ago where everybody had their own server and you could search easier."
"In future releases, I would like to see new features or more connectors for specific applications."
 

Pricing and Cost Advice

"We were using Proofpoint and then we switched to Cisco... reportability was one of the main reasons we switched, but the biggest one was cost. If you can get an equivalent functionality for a better price it's wise to do so. That's what our primary decision came down to: We could get equivalent functionality at a lower price point."
"It is not that costly. We pay for the solution through a contractor and pay an annual fee."
"The licensing was all transferred."
"Pricing depends on your environment and which model you want to buy."
"The license was not per user, the license model was per feature. You could choose anti-virus, anti-spam, etc. It was feature-based and charged yearly."
"I rate the product price as six on a scale of one to ten, where one means it is a very expensive tool."
"In my previous organization, avoiding four instances of CryptoLocker within an estimated six month period is approximately $600,000 in lost time and effort. Our five year cost was about a million dollars, and the four outages that we had equated to 65 percent of that five year cost."
"I don't have the insights into it, but compared to different products, it seems to have a medium level of pricing."
Information not available
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
882,103 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
9%
Financial Services Firm
8%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise18
Large Enterprise25
No data available
 

Questions from the Community

What do you like most about Cisco Secure Email?
Cisco Secure Email is a budget-friendly solution.
What is your experience regarding pricing and costs for Cisco Secure Email?
The pricing structure is good as it is user-based or email client-based, which is positive for clients.
What needs improvement with Cisco Secure Email?
The user interface of the Email Security Gateway ( /products/security-gateway-reviews ) should be improved. It would be beneficial to have the functionality of the Email Threat Defense integrated i...
What is your experience regarding pricing and costs for Seclore Email Encryption?
It's a flexible scheme that can be adjusted based on the client's budget.
What needs improvement with Seclore Email Encryption?
In future releases, I would like to see new features or more connectors for specific applications.
What is your primary use case for Seclore Email Encryption?
It's used to protect files that leave the company, providing redaction and full control. The main purpose is data protection. There are several tools for internal data protection, but we use Seclor...
 

Also Known As

Cisco Email Security, IronPort, Cisco Email Security, ESA, Email Security Appliances
No data available
 

Overview

 

Sample Customers

SUNY Old Westbury, CoxHealth, City of Fullerton, Indra
Information Not Available
Find out what your peers are saying about Microsoft, Proofpoint, Check Point Software Technologies and others in Email Security. Updated: January 2026.
882,103 professionals have used our research since 2012.