Avanan Review
April 07, 2022

Avanan Review

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Avanan

Avanan has been a very comprehensive email security which allows the organization is safe and free from any phishing attacks. It is also support API integration with other products such as Office 365 and G-Suite. Overall deployment is quite straight forward and easy to implement. Besides, it also comes with advanced features such as machine learning and automation which helps to reduce the operational and administration tasks.
  • Reduce phishing attacks
  • API integrations
  • Anomaly detections
  • API integrations are complex
  • SmartDLP require more time for data classifications
  • Dashboard is not very user-friendly
  • User behavior analytics
  • API integration
  • SmartDLP
  • SmartDLP may take long time to implement
  • API integration may not be straight forward
  • Required expertise to operate and manage
Avanan comes with many advanced features which can be very user-friendly. The overall cost is slightly cheaper than Proofpoint Email Protection. Technical support from Avanan is quite responsive and able to resolve the reported issue in timely manners. Anomaly detections are quite accurate and does not introduce a lot of false positive events.

Do you think Avanan delivers good value for the price?

Yes

Are you happy with Avanan's feature set?

Yes

Did Avanan live up to sales and marketing promises?

Yes

Did implementation of Avanan go as expected?

Yes

Would you buy Avanan again?

Yes

Avanan provides anomaly detections which helps to identify any suspicious user activity and events which may lead to any potential email threats. It is also having AI features which able to identify and learn the patterns of the user behavior and determine the differences. Besides, it is not only protecting the on-premise email servers but email solutions which hosted in the cloud.

Avanan Feature Ratings

Anti-malware
8
Cusomizability
9
Data Loss Protection
8
Threat Detection
10
Sandboxing
8
End-to-End Encryption
9
Management Tools
9