Cisco Secure Email (formerly Cisco Email Security) review
August 11, 2021

Cisco Secure Email (formerly Cisco Email Security) review

Ankit Singh | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Cisco Secure Email (formerly Cisco Email Security)

Email security is necessary for every company and needs to use it to block attacks. We have been using Cisco Secure Email (formerly Cisco Email Security) for the last 2 years in our company. Prior to that, someone sent malware via email to my organization and we faced many issues. We decided to implement Cisco Secure Email which has provided us lot of security from phishing attacks.
  • Malware protection
  • Phishing attacks protection
  • Spam protection
  • Email encryption
  • Support office 365
  • Virus protection
  • Too expensive
  • UI is not user friendly
  • Configuration process is complicated
  • Cisco support is very responsive
  • All supportive documentation available
  • Cost is very high compared to other vendors
We were using Mimecast Secure Email Gateway before Cisco Secure Email and faced many issues. After we switched to Cisco, we are not facing any downtime or any other type of issue. Also, Cisco Secure Email provides us with many features like virus protection, encryption, spam filtering & malware protection with responsive support.

Do you think Cisco Secure Email delivers good value for the price?

Yes

Are you happy with Cisco Secure Email's feature set?

Yes

Did Cisco Secure Email live up to sales and marketing promises?

Yes

Did implementation of Cisco Secure Email go as expected?

Yes

Would you buy Cisco Secure Email again?

Yes

There is a basic need of every organization to protect from any cyber-attacks. Cisco Secure Email (formerly Cisco Email Security) provides us with many advanced features like malware email protection, phishing attacks, virus protection & spam filtering.

Cisco Secure Email Feature Ratings

Anti-malware
10
Cusomizability
8
Data Loss Protection
9
Threat Detection
9
Sandboxing
9
End-to-End Encryption
10
Management Tools
8