Ideally, I don't manage the installation, but I do manage the security part. I am responsible for defining security-based best practices and implementing them in our company's environment. I know about Trellix (formerly FireEye) Endpoint Security HX. I use Trellix Network Security (NX) for network security and devices, while Trellix (formerly FireEye) Endpoint Security HX is used for email security requirements.
Our primary use case for this solution is as a layer of advanced security for emails. FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
Network Security Services at ACE Managed Securty Services
Real User
Top 5
2022-11-25T06:15:54Z
Nov 25, 2022
My primary use case for FireEye Email Security is to protect our organization from malicious emails that could contain malware or ransomware. We also use it to scan incoming and outgoing email traffic for sensitive information that should not be shared externally.
One of the biggest challenges in email security today is social engineering and signature-less threats. That’s where most email security solutions get defeated, but not Ace Managed Email Security.
Powered by Proofpoint Email Protection’s advanced detection engines and content filtering flags suspicious emails and makes it very easy for users to flag potentially fraudulent emails. Proofpoint’s heuristic detection analyzes message header data, verifies the sender’s IP address, examines the message body as per context, detects malicious IPs, and identifies impersonated supplier domains.
System Engineer at a tech vendor with 51-200 employees
Real User
2021-11-03T20:01:00Z
Nov 3, 2021
We get inbound emails via MS 365. It directs those emails to our ETP product, the cloud product. Then messages that it's been analyzed as clean and will be sent back to MS 365 for us to receive. Right now we are using the solution for EPT analysis purposes.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-08-31T13:11:27Z
Aug 31, 2021
The primary use case of the solution is for detecting malicious URLs which has been delivered through email. We either block or remove the destructive emails.
Email security solutions help protect organizations from email-borne threats, such as malware, phishing, spam, and business email compromise (BEC). These tools typically use various techniques to scan emails for malicious content, block unwanted messages, and educate users about email security best practices.
Ideally, I don't manage the installation, but I do manage the security part. I am responsible for defining security-based best practices and implementing them in our company's environment. I know about Trellix (formerly FireEye) Endpoint Security HX. I use Trellix Network Security (NX) for network security and devices, while Trellix (formerly FireEye) Endpoint Security HX is used for email security requirements.
The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
Our primary use case for this solution is as a layer of advanced security for emails. FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
My primary use case for FireEye Email Security is to protect our organization from malicious emails that could contain malware or ransomware. We also use it to scan incoming and outgoing email traffic for sensitive information that should not be shared externally.
One of the biggest challenges in email security today is social engineering and signature-less threats. That’s where most email security solutions get defeated, but not Ace Managed Email Security.
Powered by Proofpoint Email Protection’s advanced detection engines and content filtering flags suspicious emails and makes it very easy for users to flag potentially fraudulent emails. Proofpoint’s heuristic detection analyzes message header data, verifies the sender’s IP address, examines the message body as per context, detects malicious IPs, and identifies impersonated supplier domains.
We use FireEye Email Security for our emails.
We get inbound emails via MS 365. It directs those emails to our ETP product, the cloud product. Then messages that it's been analyzed as clean and will be sent back to MS 365 for us to receive. Right now we are using the solution for EPT analysis purposes.
The primary use case of the solution is for detecting malicious URLs which has been delivered through email. We either block or remove the destructive emails.
I used the solution as a secondary security assessment gateway.
I use FireEye Email Security to block spam and advanced threats.
We primarily use the solution for messaging security and sandboxing.