Try our new research platform with insights from 80,000+ expert users

Darktrace vs Mimecast Email Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Darktrace
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
74
Ranking in other categories
Email Security (12th), Intrusion Detection and Prevention Software (IDPS) (1st), Network Traffic Analysis (NTA) (1st), Network Detection and Response (NDR) (1st), Extended Detection and Response (XDR) (3rd), AI-Powered Chatbots (3rd), Cloud Security Posture Management (CSPM) (15th), Cloud-Native Application Protection Platforms (CNAPP) (12th), Attack Surface Management (ASM) (3rd), AI-Powered Cybersecurity Platforms (1st)
Mimecast Email Security
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Office 365 Protection (5th), Secure Email Gateway (SEG) (4th)
 

Featured Reviews

Luis KiambatA - PeerSpot reviewer
Nov 9, 2022
Great autonomous support, offers an easy setup, and has responsive support
We primarily use the solution for IT. Customers use it for banks or construction sites, depending on our customers. We haven't had an OT implementation yet. However, we have interest from two companies The autonomous response is great. It blocks basically everything that is outside the normal,…
Frank Rawson - PeerSpot reviewer
May 26, 2023
It gives clients peace of mind and helps them educate their users about threats
A few years ago, our team found the implementation to be somewhat challenging. It has gotten easier as we've grown more experienced. The difficulty depends on the expertise of the person doing it. I don't work with Mimecast every day, so it might be more difficult for me than it is for one of my techs who regularly does Mimecast implementations. It requires some specific in-depth product knowledge and an understanding of email solutions. The deployment time varies. In South Africa, it depends on who you use to deploy it. If you use one of Mimecast's local partners, it can take up to two weeks because of their process. However, it's only about four to eight hours of work. After deployment, there isn't much maintenance aside from supporting and educating your customers. Users require constant education on how to use the Mimecast client and release an email that has been blocked.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are the AI and advanced learning tools that distinguish it from other products."
"It is a stable solution."
"I find the complete portfolio to be excellent."
"Provides great network protection."
"The ability to see what we have not seen before is most valuable. It is very interesting to find out the most vulnerable devices in our network."
"I have found the most valuable features to be artificial intelligence for cybersecurity, advanced machine learning capabilities, enterprise Immune System, Antigena Network, and Antigena Email. The way the solution detects the threat over the network before it spreads is very good. It notifies you of what the threat is exactly doing and gives you all the details about the execution of that application that had created the threat over your network."
"The most valuable feature is that it works autonomously."
"Ability to see events and exactly what traffic or website the device had tried to connect to that raised the alert or issue."
"We like the content filtering and secure messaging features."
"The product's most valuable features are impersonation protection and phishing countermeasures."
"URL inspection works pretty well."
"The most valuable feature is the DMARC Analyzer."
"Due to our specialized use case, that HIPAA dictionary really comes in handy."
"The platform's most valuable features are journaling and email archiving, effectively stopping phishing attacks."
"The integration is straightforward."
"The product is good. To date, we have not faced any challenges."
 

Cons

"They just need to work on their price. In terms of features, we are trying to understand all the features that we have. We're still exploring everything that we have so that we can fully utilize it. At this point in time, it is not about the features. It is more about utilization. We're just trying to utilize everything to full capacity."
"A reporting portal could be a great addition to help customize reports."
"One thing that I would like to look at going forward is to have a fully automated network infrastructure that is monitored automatically real-time, and that gives me this kind of capability where I would be able to look at my network at any given time and see the state of my network. With Darktrace, at the moment, I have to almost put in a date and tell them that want you to give me data from this date to this date. I don't want that. I want a fast solution in which it doesn't matter when I log into the application. Whenever I log in, I must be able to see my network and run a report. In other words, if I go in now and I say, "Give me a full report of what happened today, it must be able to give me that. It mustn't just be limited to a seven-day period, for argument's sake. It must be able to give me real-time and day-to-day tracking of what has happened within my network."
"I believe their network monitoring device licensing module could use some improvement."
"I would like to see a feature where the tool ingests information from an anti-malware product that is present at the endpoint."
"The solution could be easier to use."
"Getting logs from different sources can be a challenge."
"In the next version, I'd like to see penetration testing."
"The platform's cost-effectiveness could be improved."
"I did have a problem with Mimecast. That is why I was looking for an alternative solution because their sender IP address gets poorly rated by Microsoft."
"The detection rates are an area for improvement."
"As a user, the user interface of the management console could be upgraded, for example."
"The solution should include more AI features instead of Mimecast's more general static configuration tooling."
"Their support should be improved. They are notorious for sending you to knowledge-based articles rather than actually talking to you, but that is, unfortunately, kind of becoming a trend with everything. In terms of features, I haven't had any complaints. However, I don't like the fact they moved to a paid training subscription model. They used to have a lot of free webinars for training, but they have started to charge for them in the past year."
"I'd like to have better support from the product in the future."
"The attachment scanning feature doesn't work properly."
 

Pricing and Cost Advice

"We've budgeted about 50,000 Kuwaiti dinars for the solution. That is a yearly operating cost."
"Darktrace is pricey, but the price is reasonable for what the solution does, and it's comparable to other products."
"All of the other modules, such as the licensing modules, are on par. It's one for one."
"The pricing is reasonable."
"In the ballpark, we're talking about $30K, $50K, and up. It can even be as much as $50K or $100K."
"The cost of the solution is expensive for smaller businesses. They will not be able to afford it or might not need this type of security solution."
"It is inexpensive considering what it can do and the competition."
"The pricing is expensive. It costs over $100,000 a year."
"The solution is expensive."
"The customers can select the license packages as per their requirements."
"For what it is, the product is overpriced."
"There are additional costs beyond the standard licensing fee."
"On a scale of one to ten, where one is cheap, and ten is expensive, I rate the pricing a ten."
"The licensing costs are per-user for the product that you get with them."
"It is a bit expensive."
"The product has good pricing in terms of return on investment."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
8%
Manufacturing Company
8%
Government
7%
Computer Software Company
16%
Manufacturing Company
7%
Financial Services Firm
7%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
Which is better - SentinelOne or Darktrace?
Which solution is better depends on which is more suitable specifically for your company. Darktrace, for example, is meant for smaller to medium-sized businesses. It is also a good option for organ...
What do you like most about Darktrace?
A very useful feature in Darktrace for real-time threat analysis is the packet inspection that analyzes the packet traffic in real time.
What do you like most about Mimecast Email Security with Targeted Threat Protection?
The interface of this solution is very easy to navigate and user-friendly. There is no delivery in email and other communications, making it reliable. The configuration is relatively easy.
What needs improvement with Mimecast Email Security with Targeted Threat Protection?
The product's interface could be improved to be more user-friendly.
 

Also Known As

No data available
Mimecast Email Security with Targeted Threat Protection
 

Overview

 

Sample Customers

Irwin Mitchell, Open Energi, Wellcome Trust, FirstGroup plc, Virgin Trains, Drax, QUI! Group, DNK, CreaCard, Macrosynergy, Sisley, William Hill plc, Toyota Canada, Royal British Legion, Vitol, Allianz, KKR, AIRBUS, dpd, Billabong, Mclaren Group.
Azizi Developments, Affinity Credit Union, Aftercare, Al Abbar Group
Find out what your peers are saying about Darktrace vs. Mimecast Email Security and other solutions. Updated: January 2024.
815,854 professionals have used our research since 2012.