Try our new research platform with insights from 80,000+ expert users

Perception Point Advanced Email Security vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Perception Point Advanced E...
Ranking in Email Security
16th
Average Rating
9.0
Reviews Sentiment
7.1
Number of Reviews
26
Ranking in other categories
Internet Security (10th)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (9th)
 

Mindshare comparison

As of March 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.8% compared to the previous year. The mindshare of Perception Point Advanced Email Security is 2.0%, down from 2.3% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.3%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Trellix Collaboration Security2.3%
Perception Point Advanced Email Security2.0%
Cloudflare One1.5%
Other94.2%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
GK
Senior Information Security Analyst at Lumora Security
Advanced email security has reduced phishing risk and has improved multi-layered threat detection
I would like to improve reporting in Perception Point Advanced Email Security, along with adding options in the console where customers or users can create policies. That is what we are currently lacking; we need customized policies that we can create according to proofs of concept. If a customer is receiving cybersecurity advisory from any organization or their own company, it would be better if we could create an option to establish policies so that the AI and ML engine will work accordingly to those policies. Currently, they have the feature, but we need to request them in the backend, and they will be doing it for us from the backend. This process is difficult for us, as every time we want to make policy adjustments, we have to send them an email or get support. It is challenging sometimes for some customers when this type of advisory or policy change request occurs. I would like to see custom reports as an additional feature in the future to make it better. Some customers might require customized reporting based on their requirements and priorities. Seamless integration with other security solutions is also something I recommend. Third-party tools such as other XDR or SIEM tools or other MDR tools would benefit from seamless integration as well.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare is by far the most effective solution that I have come across."
"Cloudflare DDoS mitigates DDoS attacks."
"The blocking feature is very good."
"Enables me to work from two locations."
"It is a stable solution."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"Cloudflare, in my opinion, was easy to implement."
"Cloudflare Access is part of the Zero Trust philosophy."
"One is the hardware-assisted platform that provides more insight into the threat scenarios. And the other is their instant response team's availability, 24/7, for identifying and responding to incidents. These are the two main things that everyone likes."
"The most valuable features of the solution are the ones that are related to finding impersonation attacks and detecting attempts to steal credentials. In scenarios where attackers get you to follow URLs to a malicious site that looks similar to a good site, and then ask for the user credentials to try to steal them, it is very useful."
"With the features, functionalities, and detection capabilities that FortiMail Workspace Security provides, it is worth the investment."
"Scalability-wise, I rate the solution a ten out of ten."
"It has modules to detect malware and that is a strong point. It has a very nice way of showing you, directly in the product, a lot of details about certain pieces of malware. It goes very deep and even shows you the assembly code. It also does detonations on files and shows you the results in different operating systems. That is very useful."
"We can use it to perform detection and analysis of emails. For any malicious content found in emails, it gives in-depth analysis reports to end users. If you log into the console, you can see in-depth detection and how it happens."
"One of the most valuable features is the service provided by the incident response team. There have been cases where we have suspected that emails were fraudulent or something was suspicious. In those cases, we immediately contacted the incident response team through the platform, and we had a response in less than a minute."
"It really works well on SharePoint when you upload a file or save a file. Advanced Email Security scans if it is malicious and identifies issues. It can do some forensics on its console, which is nice."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy."
"In my experience, the best features related to Trellix Collaboration Security concern the protection against threats."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"The initial setup is simple."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"FireEye is good for malware depicting and security."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
 

Cons

"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"They don't have a person to provide support for customers using the solution under their free plan."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"Lacks a VPN feature to provide a secure connection to the data center."
"The initial onboarding was causing us some confusion."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Its websites for analysis need to be a bit more approachable for people who are less technical. Technically, it is a fire-and-forget solution. So, you want to be able to implement this solution for a lot of companies who don't have security operation teams (SOCs) behind them. You need to have something where a secretary can jump onto this console and release whatever she needs to release. Therefore, it needs to be written in a very specific non-technical language."
"We have had a few false positives, not that many, but a few... they have a feature where someone from the Incident Response team can look at an email and mark it as 'verified malicious.' You might think that if an engine detects it is malicious, and an IR team member has flagged it as malicious, it will definitely be malicious. But that's not always the case."
"Perception Point Advanced Email Security should make available more use cases."
"In terms of architecture, and I know that they're going to improve this, the solution needs to be much more redundant. There was an outage a month ago in AWS, and that basically stopped the service for two or three hours. Although in two years, this was the first time that something like that happened, our expectation from a company like Perception Point is that it should work with either a multi-cloud or multi-region architecture, to improve the resilience."
"They can do better on the spam. Today, Perception Point is not our only solution. We have two solutions, and they are the second in line because the spam filtering is not yet the best."
"They could improve their anti-spam engine a little bit, because there are a lot of false positives. Sometimes, emails pass through their system but are spam. In terms of security and engines for malicious emails and antivirus, they're doing a good job. Their other engines can be improved."
"They could provide additional data loss prevention features as we encounter different kinds of attacks in today's scenario."
"Email alerts should be available in real-time."
"If they want to be the primary or best solution, they need to have better email management features."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"I would like to see this solution become more flexible."
"The reporting aspect of the solution needs improvement."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"I would rate them as a 1.5. The new hub created in India is not good."
"In general, our company should make the tool more robust to protect our systems."
"The solution needs better support."
 

Pricing and Cost Advice

"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"In Brazil, the dollar price affects the cost. Perception Point Advanced Email Security is about 50 percent less expensive."
"When compared to other solutions on the market, it is relatively fair."
"We would always like it to be cheaper and save more money. However, we are getting the value from it."
"The price of the solution is high."
"The pricing and licensing are very fair compared to competing companies in the same field."
"It fits every budget. It has a low price. I can't go ahead and sell it for any price I want. They are quite strict. They say, "This is the price that you can sell it for and this is the price for you as a reseller." That is it. It is not a lot of money. I will not become rich from it, but I like that they keep a standard for everyone. They are a fair company."
"It has very reasonable pricing. Normally, the end user is paying. Perception Point is already in the Amazon marketplace, so we cannot sell it as a distribution partner. For example, we cannot take more than that margin of what they offer in the marketplace. Whatever the end user is paying, it is definitely worth it and it is not that high."
"They are not the most expensive vendor. There are much more expensive vendors. They are not cheap, but they are not the most expensive. They are somewhere in the middle."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
"The licensing is on a yearly basis."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
11%
Manufacturing Company
8%
Comms Service Provider
7%
Retailer
6%
Manufacturing Company
15%
Healthcare Company
12%
Comms Service Provider
11%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise4
Large Enterprise6
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Perception Point Advanced Email Security?
In Brazil, the dollar price affects the cost. Perception Point Advanced Email Security is about 50 percent less expen...
What needs improvement with Perception Point Advanced Email Security?
I would like to improve reporting in Perception Point Advanced Email Security, along with adding options in the conso...
What is your primary use case for Perception Point Advanced Email Security?
My main use case for Perception Point Advanced Email Security is proactive defense against advanced threats, particul...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Information Not Available
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Perception Point Advanced Email Security vs. Trellix Collaboration Security and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.