TrustRadius: an HG Insights company

Cisco Secure Email Threat Defense

Score8.8 out of 10

53 Reviews and Ratings

What is Cisco Secure Email Threat Defense?

Cisco Secure Email Threat Defense provides protection against email threats that compromise an organization’s brand and operations. Its advanced threat detection capabilities uncover known, emerging and targeted threats. And it expands the scope of organizations' defenses to detect dangerous threats and rapidly search for and remediate threats across security controls.


Secure Email Threat Defense's Artificial Intelligence and machine learning models include Natural Language Processing to identify malicious techniques used in attacks targeting organizations, derive context for specific business risks, provide searchable threat telemetry, and categorize threats to understand which parts of the organization are most vulnerable to attack. Threat intelligence from Talos™ provides broader and deeper threat data that informs better and faster decision making.


Search capabilities provide access to message details that empower more informed responses. Remediating threats directly in Threat Response streamlines processes and saves time.


As part of a larger Extended Detection and Response (XDR) strategy, Cisco Secure Email Threat Defense defends against critical threats with threat intelligence, advanced threat detection capabilities and vital telemetry that informs strategic threat protection. In combination with numerous third-party integration partners and the larger Cisco Secure portfolio of products, this provides visibility, efficiency, simplicity, and telemetry to security operations.


The ability to orchestrate workflows in Cisco’s XDR solution simplifies processes reduces the burden on organizations' team so they can focus on more strategic initiatives.



Categories & Use Cases

Media

an Impact Report showing efficacy metrics and ROI indicators
a detailed view of phishing messages
the dashboard

1 / 3

Top Performing Features

  • Threat Detection

    Threat protection defend against sophisticated malware or hacking-based attacks targeting sensitive data.

    Category average: 8.7

  • Customizability

    Customizing email security gateways can improve detection capabilities

    Category average: 7.7

  • End-to-End Encryption

    In end-to-end encryption the data is encrypted on the sender's system or device and only the recipient is able to decrypt it

    Category average: 8.4

Areas for Improvement

  • Data Loss Protection

    A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

    Category average: 7.5

  • Sandboxing

    Sandboxing is a software management strategy that isolates applications from critical system resources and other programs providing an extra layer of security

    Category average: 7.3

  • Management Tools

    Management tools include administrator dashboards, reports, etc.

    Category average: 8.4

Security out of the box

Use Cases and Deployment Scope

In our organization, we selected Cisco Secure Email Threat Defense as a foundational component of our email security strategy. Our decision was driven by the escalating volume and sophistication of email-borne threats, which had become a primary concern—particularly with the shift toward a hybrid workforce model, addressing our business challenges.

Pros

  • Email encryption and DLP
  • Mailbox remediation
  • Effective threat prevention

Cons

  • Reporting and analytics
  • self-service portal and quarantine notifications user-friendly
  • False positives

Return on Investment

  • Email threat correlation w/ Cisco stack
  • Securing outbound PII emails
  • Sandboxing + auto-removal effective

Alternatives Considered

Proofpoint Email Protection

Other Software Used

Cisco AnyConnect, Cisco Umbrella, Tenable Vulnerability Management

Cisco Secure Email Threat Defense

Use Cases and Deployment Scope

We use Cisco Secure Email Threat Defense it with O365 to help us identify threats. It helps use identify who within our organization is being attacked, what type of attacks, and the context of the attack. Being able to search emails and see if its inbound, outbound, forwarded helps us in case we need to contain.

Pros

  • Dash Board
  • Great Interface
  • Forensic

Cons

  • Sharing Dashboard Data with Security Awareness Training tool in order to automatically generate training based on the attack type user is experiencing.
  • More Forensic information on threat actors.

Return on Investment

  • Less Email Threats
  • More Threat Insight of my users

Alternatives Considered

Proofpoint Targeted Attack Protection (TAP)

Other Software Used

Cisco XDR

Cisco Secure Email Threat Defense is a vital asset to our security platforms

Use Cases and Deployment Scope

Provides a first line of defense in our email environment targeting malware and bad actors.

Pros

  • Filtering spam
  • Filtering malware links
  • Header inspection

Cons

  • Document inspection

Return on Investment

  • The management interface could be a little more intuitive

Alternatives Considered

Cisco Secure Endpoint and Cisco Duo

Other Software Used

Cisco Secure Endpoint, Cisco Duo, Cisco Secure Firewall Management Center

Great email security product from Cisco

Use Cases and Deployment Scope

We use Cisco Secure Email Threat Defense to safeguard our emails. It provides us comprehensive protection against email-based threats. Its advanced threat intelligence helped us to defend our users from phishing, business email compromise, malware and ransomware attacks. It also assisted us in quickly identifying new threats and putting suspected threats in quarantine to stop their spread.

Pros

  • It helps you to safeguard your emails from phishing, malware and ransomware attacks.
  • It offers you strong spam filtering, real-time threat detection and customizable security policies.
  • It enables you to quickly identify new threats and place suspected threat under quarantine to stop them spreading.

Cons

  • Need more documentation on policy creation.
  • Policy creation should be more easier.
  • Occasionally blocks regular emails.

Return on Investment

  • It helped us to safeguard our emails from phishing and ransomware attacks.
  • We able to quickly identify new threats and quarantine it.
  • It helped us to protect organization data from external threats.

Alternatives Considered

FortiMail

Other Software Used

AnyDesk, TeamViewer

A new Episode

Use Cases and Deployment Scope

We will use it especially in my case for Data Loss prevention

Pros

  • Modern Usability (Simplification)
  • Includes all necessary Requirements of the Organization
  • Includes the adaption for Identification of Users

Cons

  • Reporting shaped for the organization

Return on Investment

  • Be able to secure the Mail Gateway and have features included in one Product

Alternatives Considered

Splunk Application Performance Monitoring (APM)