height="0" width="0" style="display:none;visibility:hidden">
Try our
new research platform
with insights from 80,000+ expert users
Research Reports
Categories
Cybersecurity
Endpoint Detection and Response (EDR)
Cloud Security Posture Management (CSPM)
Vulnerability Management
Extended Detection and Response (XDR)
Endpoint Protection Platform (EPP)
Security Information and Event Management (SIEM)
Firewalls
Intrusion Detection and Prevention Software (IDPS)
Container Security
ZTNA
Unified Threat Management (UTM)
Advanced Threat Protection (ATP)
Anti-Malware Tools
Cloud-Native Application Protection Platforms (CNAPP)
Cloud Workload Protection Platforms (CWPP)
Attack Surface Management (ASM)
ZTNA as a Service
Distributed Denial-of-Service (DDoS) Protection
Threat Intelligence Platforms (TIP)
Identity Threat Detection and Response (ITDR)
IT Management
Log Management
IT Infrastructure Monitoring
Remote Access
Managed DNS
Configuration Management
Server Monitoring
Operating Systems (OS) for Business
Server Virtualization Software
Container Monitoring
IT Service Management (ITSM)
Container Management
Workload Automation
IT Asset Management
Virtual Desktop Infrastructure (VDI)
Virtualization Management Tools
Managed File Transfer (MFT)
User Provisioning Software
IT Alerting and Incident Management
Remote Monitoring and Management (RMM)
SaaS Management Platforms
Cloud Computing
Microsoft Security Suite
Cloud Monitoring Software
Cloud Backup
Cloud Management
Cisco Security Portfolio
PaaS Clouds
AWS Marketplace
Infrastructure as a Service Clouds (IaaS)
Cloud Migration
Cloud Storage
Hybrid Cloud Computing Platforms
Cloud Cost Management
Public Cloud Storage Services
Cloud Analytics
MSP Backup
Software Defined Data Center (SDDC)
OpenStack
Compute Service
Cloud Storage Gateways
Hadoop
Data Management
Data Integration
Compliance Management
Cloud Data Integration
Data Governance
Data Warehouse
Cloud Data Warehouse
Vector Databases
Relational Databases Tools
Open Source Databases
Deduplication Software
NoSQL Databases
Data Quality
Metadata Management
Database as a Service (DBaaS)
Managed NoSQL Databases
Data Masking
Database Development and Management
Cloud Master Data Management (MDM) Solutions
Data Observability
Embedded Database
Application Development Software
Application Performance Monitoring (APM) and Observability
Application Security Tools
Static Application Security Testing (SAST)
Rapid Application Development Software
IT Operations Analytics
DevSecOps
Application Security Posture Management (ASPM)
Test Automation Tools
Functional Testing Tools
Patch Management
Application Lifecycle Management (ALM) Suites
API Testing Tools
Software Development Analytics
Mobile APM
Software Supply Chain Security
Regression Testing Tools
Build Automation
Enterprise Agile Planning Tools
Release Automation
Enterprise Architecture Management
Enterprise Communications and Networking
Secure Web Gateways (SWG)
Network Monitoring Software
Software Defined WAN (SD-WAN) Solutions
WAN Edge
AIOps
CDN
Ethernet Switches
Network Traffic Analysis (NTA)
Wireless LAN
Network Management Applications
Network Automation
Application Delivery Controllers (ADC)
Rack Servers
Network Troubleshooting
Blade Servers
Routers
LAN Switching
Wireless WAN
WAN Optimization
AV Over IP Switching
Data Protection and Storage
Backup and Recovery
All-Flash Storage
Disaster Recovery (DR) Software
NVMe All-Flash Storage Arrays
File and Object Storage
Software Defined Storage (SDS)
NAS
HCI
SaaS Backup
Enterprise SAN
Modular SAN (Storage Area Network)
File Archiving
Container Backup Software
Converged Infrastructure
Disk Based Backup Systems
Data Replication
Application Server
File System Software
Cloud Software Defined Storage
Frame-Based Disk Arrays
Enterprise Architecture and Integration
API Management
Integration Platform as a Service (iPaaS)
Streaming Analytics
Business-to-Business Middleware
Event Monitoring
Application Infrastructure
Message Queue (MQ) Software
Enterprise Service Bus (ESB)
Data Migration Appliances
Message Oriented Middleware (MOM)
Migration Tools
General Purpose HSM
SOA Application Gateways
SOA Governance
Payment HSM
Web Access Management
CEP
Code Signing Management
Enterprise Applications
Email Security
AI-Powered Cybersecurity Platforms
Business Process Management (BPM)
Process Automation
BI (Business Intelligence) Tools
Business Process Design
Low-Code Development Platforms
Robotic Process Automation (RPA)
Reporting
Data Science Platforms
ERP
Data Visualization
Secure Email Gateway (SEG)
GRC
Project Management Software
Process Mining
Talent Management
Cloud HCM
AI Development Platforms
Email Archiving
Customer Care
Help Desk Software
CRM
Customer Experience Management
Digital Experience Monitoring (DEM)
Data Management Platforms (DMP)
AI-Powered Chatbots
CRM Customer Engagement Centers
Contact Center Platforms
Contact Center as a Service (CCaaS)
Field Service Management
Workforce Engagement Management
Digital Experience Platforms (DXP)
Social CRM
Social Media Management Solutions
Customer Communications Management (CCM)
Live Chat
Contact Center Infrastructure
IVR Systems
Customer Feedback Management
Partner Relationship Management (PRM)
Data Center and Facilities Management
Data Center Networking
Enterprise Asset Management (EAM)
Data Center Infrastructure Management
Data Center Power Solutions
Workplace Management Software
Data Center Cooling Systems
Facility Maintenance Management Software
Computerized Maintenance Management Software (CMMS)
Data Center Monitoring
Workplace Analytics Software
Wiring and Cabling Solutions
Supply Chain
Supply Chain Analytics
Supply Chain Management Software
Procurement Software
Contract Management Software
Warehouse Management
Demand Management
Accounts Payable Automation Software
Inventory Management Software
Advanced Distribution Management Systems (ADMS)
Accounts Receivable Automation Software
Transportation Management
Mobile Supply Chain Applications
All categories
Comparisons
Top comparisons
Netgate pfSense vs. OPNsense
Cloudflare vs. Quad9
Fortinet FortiGate vs. Sophos XG
Amazon API Gateway vs. Microsoft Azure API Management
GitLab vs. Microsoft Azure DevOps
Checkmarx One vs. SonarQube Server (formerly SonarQube)
Figma vs. Miro Business - Enterprise
Hyper-V vs. VMware vSphere
MinIO vs. Red Hat Ceph Storage
AWS Secrets Manager vs. Azure Key Vault
Amazon Web Services (AWS)
Amazon API Gateway vs. Microsoft Azure API Management
AWS Secrets Manager vs. Azure Key Vault
Akamai Connected Cloud (Linode) vs. Amazon AWS
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon Route 53 vs. Azure DNS
Amazon EKS vs. Red Hat OpenShift Container Platform
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
AWS Security Hub vs. Microsoft Sentinel
AWS Database Migration Service vs. AWS Glue
Amazon QuickSight vs. Microsoft Power BI
Cisco
Cisco Secure Firewall vs. Fortinet FortiGate
Aruba Wireless vs. Cisco Wireless
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Cisco Umbrella vs. Zscaler Internet Access
Aruba Switches vs. Cisco Ethernet Switches
Cisco Meraki Wireless LAN vs. Juniper Mist Wireless Access Points
Cisco Linksys Ethernet Switches vs. NETGEAR Switches
Cisco Meraki MX vs. Palo Alto Networks NG Firewalls
Arista Networks Platform vs. Cisco Catalyst Switches
Cisco Intersight vs. Cisco UCS Manager
Dell Technologies
Dell PowerEdge R-Series vs. HPE ProLiant DL Servers
Dell PowerFlex vs. VxRail
Dell PowerStore vs. Dell Unity XT
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell PowerEdge T-Series vs. HPE Proliant ML
Dell Avamar vs. Dell PowerProtect Data Manager
Dell PowerScale (Isilon) vs. NetApp FAS Series
Amazon AWS vs. Dell ObjectScale
Dell APEX vs. HPE GreenLake
Dell RecoverPoint for Virtual Machines vs. VMware Live Recovery
Fortinet
Fortinet FortiGate vs. Sophos XG
Cisco Identity Services Engine (ISE) vs. Fortinet FortiNAC
Fortinet FortiGate Cloud vs. Fortinet FortiManager
Fortinet FortiClient vs. OpenVPN Access Server
Cisco Ethernet Switches vs. Fortinet FortiSwitch - Secure Access
Azure Firewall vs. Fortinet FortiGate-VM
F5 Advanced WAF vs. Fortinet FortiWeb
CrowdStrike Falcon vs. Fortinet FortiEDR
F5 BIG-IP Local Traffic Manager (LTM) vs. Fortinet FortiADC
FortiSASE vs. Prisma Access by Palo Alto Networks
Hewlett Packard Enterprise
Aruba Wireless vs. Cisco Wireless
Dell PowerEdge R-Series vs. HPE ProLiant DL Servers
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Aruba Switches vs. Cisco Ethernet Switches
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
HPE SimpliVity vs. VxRail
Dell PowerEdge T-Series vs. HPE Proliant ML
Dell PowerStore vs. HPE Alletra Storage
HPE Zerto Software vs. Veeam Data Platform
HPE 3PAR StoreServ vs. HPE Primera
IBM
ActiveMQ vs. IBM MQ
IBM Security QRadar vs. Splunk Enterprise Security
IBM Open Liberty vs. Spring Boot
Dell PowerStore vs. IBM FlashSystem
IBM DOORS vs. Polarion Requirements
IBM API Connect vs. IBM DataPower Gateway
IBM Security Guardium Data Protection vs. Imperva Data Security Fabric
Camunda vs. IBM BPM
IBM MaaS360 vs. Microsoft Intune
IBM Db2 Database vs. SQL Server
Microsoft
Amazon API Gateway vs. Microsoft Azure API Management
GitLab vs. Microsoft Azure DevOps
Hyper-V vs. VMware vSphere
AWS Secrets Manager vs. Azure Key Vault
Jamf Pro vs. Microsoft Intune
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon Route 53 vs. Azure DNS
Microsoft Power BI vs. Tableau Enterprise
Windows 11 vs. Windows Server
Microsoft Power Automate vs. UiPath Platform
Oracle
Oracle VM VirtualBox vs. Proxmox VE
Oracle Linux vs. Ubuntu Linux
Oracle VM vs. VMware vSphere
Firebird SQL vs. MySQL
Microsoft Power Apps vs. Oracle Application Express (APEX)
Oracle Database vs. SAP HANA
Microsoft Azure vs. Oracle Cloud Infrastructure (OCI)
Oracle HCM Cloud vs. SAP SuccessFactors
NetSuite ERP vs. Oracle Fusion Cloud ERP
Oracle Data Integrator (ODI) vs. Oracle Integration Cloud Service
SAP
SAP ERP vs. SAP S/4HANA
Celonis vs. SAP Signavio Process Manager
SAP SuccessFactors vs. Workday
Amazon AWS vs. SAP Cloud Platform
Oracle Database vs. SAP HANA
Microsoft Dynamics CRM vs. SAP CRM
SAP Analytics Cloud vs. SAP BusinessObjects Business Intelligence Platform
Kinaxis vs. SAP Integrated Business Planning for Supply Chain
SAP PowerDesigner vs. erwin Data Modeler
Oracle WMS vs. SAP Warehouse Management
Broadcom
Hyper-V vs. VMware vSphere
VMware Fusion Pro vs. VMware Workstation
Jakarta EE vs. Spring Boot
VMware vSAN vs. VxRail
Microsoft Defender for Endpoint vs. Symantec Endpoint Security
AutoSys Workload Automation vs. Control-M
Microsoft Azure vs. Pivotal Cloud Foundry
Azure Stack vs. VMware Cloud Foundation
VMware Live Recovery vs. Veeam Data Platform
Rancher Labs vs. VMware Tanzu Platform
More comparisons
For Vendors
For Vendors
Learn More
AWS + PeerSpot
Get Listed
Sign In
Home
Email Security
Fortra's Agari
Pros & Cons
Fortra's Agari pros and cons
Vendor:
Fortra
4.3
out of 5
4 reviews
100% willing to recommend
Leave a review
Overview
Reviews
Pros & Cons
Pricing
Alternatives
Fortra's Agari Pros review quotes
TF
Tom Foale
CTO at Klaatu IT Security Ltd
Aug 17, 2022
It comes with a lot of helpful tips for complicated areas.
Read full review
reviewer1052493
Senior Email Engineer at a legal firm with 1,001-5,000 employees
Jan 9, 2021
If spam or some kind of malicious email gets past Mimecast and gets into our email environment, we can go into Agari and we can search for it.
Read full review
reviewer1347105
Managing Director at a tech vendor with 11-50 employees
May 17, 2020
It is really important for large companies to have the brand protection that is provided by Agari.
Read full review
Buyer's Guide
Email Security
September 2025
Download Free Report
Find out what your peers are saying about Fortra, Proofpoint, Cisco and others in Email Security.
Updated: September 2025.
DOWNLOAD NOW
869,785 professionals have used our research since 2012.
TF
Tom Foal
CTO at Klaatu IT Security Ltd
May 18, 2023
I am impressed with the tool's discovery capabilities which help me find out who is sending the emails on the company's behalf. I also find the ability to detect and generate reports on phishing emails a valuable feature.
Read full review
Fortra's Agari Cons review quotes
TF
Tom Foale
CTO at Klaatu IT Security Ltd
Aug 17, 2022
The protocol is quite complicated, which may not be something that could be improved, but it would be better if it was simplified.
Read full review
reviewer1347105
Managing Director at a tech vendor with 11-50 employees
May 17, 2020
Some customers in the financial sector do not like the cloud solution because they don't want data to be transferred to a US-based cloud.
Read full review
TF
Tom Foal
CTO at Klaatu IT Security Ltd
May 18, 2023
The product's user interface is clunky. We have difficulty in finding what we need. I would also like to see automation in the onboarding processes.
Read full review
Product Categories
Product Categories
Email Security
Popular Comparisons
Popular Comparisons
Microsoft Defender for Office 365
vs Fortra's Agari
Proofpoint Email Protection
vs Fortra's Agari
Cisco Secure Email
vs Fortra's Agari
Abnormal Security
vs Fortra's Agari
Cisco Secure Email Threat Defense
vs Fortra's Agari
Fortra's Clearswift Secure Email Gateway
vs Fortra's Agari
Valimail Monitor
vs Fortra's Agari
See all alternatives
Product Categories
Product Categories
Email Security
Popular Comparisons
Popular Comparisons
Microsoft Defender for Office 365
vs Fortra's Agari
Proofpoint Email Protection
vs Fortra's Agari
Cisco Secure Email
vs Fortra's Agari
Abnormal Security
vs Fortra's Agari
Cisco Secure Email Threat Defense
vs Fortra's Agari
Fortra's Clearswift Secure Email Gateway
vs Fortra's Agari
Valimail Monitor
vs Fortra's Agari
See all alternatives
Related questions
101
What are the threats associated with using ‘bogus’ cybersecurity tools?
18
When evaluating Messaging Security, what aspect do you think is the most important to look for?
60
Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
34
What is the best email encryption software for small enterprises using Office 365?
19
What security measures should businesses prioritize to support secure remote work?
83
When evaluating Email Security tools, what aspects do you think are the most important to look for?
149
Why is Email Security important for companies?
38
Which is the best email security gateway?
49
Why are Email Security tools important for companies?
Overview
Reviews
Pros & Cons
Pricing
Alternatives
© 2025 PeerSpot, All Rights Reserved.