Cisco Secure Email Cloud Mailbox can handle a complete portfolio, which is required to protect any kind of attack coming from emails. However, it does not have advanced phishing, but it is available through Cisco. If you compare Cisco Secure Email Cloud Mailbox with the competition, in the competition you have to have one or two solutions together to address the customer's requirement, whereas Cisco Secure Email Cloud Mailbox is addressing everything, such as web domain and email protection. If there is any kind of challenge it will come across through email.
Learn what your peers think about Cisco Secure Email Threat Defense. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
Systems Administrator at a university with 10,001+ employees
Real User
Jun 28, 2020
On ease of use, it rates very high. It's something that I was able to get into without really looking at any documentation. I wanted to see what it felt like before I started looking at any documentation on how to use it, and it was very easy to use. It works very smoothly. The user experience is very intuitive. They did an amazing job on that.
The ability to see east-west traffic is its most valuable feature. Traditionally, email defense focuses on north-south, inbound-outbound, egress-ingress traffic. With Cisco Secure Email Cloud Mailbox, it's able to quickly identify, track, tag, and categorize emails that are internal. That can typically give us visibility into if there's an internal compromised account (for example). Someone can then use that internal compromised account to email additional accounts with either malicious software or links, but internal within that Office tenant. Effectively, that email message never leaves the tenant. Any of the mail gateways really do not have any method or way of seeing this traffic since it's not leaving the environment.
Cisco Secure Email Threat Defense offers robust email security with features like east-west traffic visibility and seamless SaaS deployment. It enhances cloud email protection by integrating Threat Grid sandboxing and AMP for malware defense, supported by Cisco Talos threat intelligence.Enhancing email security for Microsoft 365 and cloud emails, Cisco Secure Email Threat Defense acts as an email gateway, blocking phishing, malware, and business email compromise. Users benefit from a...
Secure Email Threat Defense's scalability is good.
Cisco has a threat mechanism called cloud-based Talos, where all the threats are inbuilt.
It has an efficient email filtering feature.
It's very easy to deploy and configure.
The features and functionalities are much better than Microsoft's in-built Defender plan.
Cisco Secure Email Cloud Mailbox can handle a complete portfolio, which is required to protect any kind of attack coming from emails. However, it does not have advanced phishing, but it is available through Cisco. If you compare Cisco Secure Email Cloud Mailbox with the competition, in the competition you have to have one or two solutions together to address the customer's requirement, whereas Cisco Secure Email Cloud Mailbox is addressing everything, such as web domain and email protection. If there is any kind of challenge it will come across through email.
I would say it's very comprehensive, with multiple antivirus OEMs, virus encrypt features, encryption, and more.
This solution is easy to use.
On ease of use, it rates very high. It's something that I was able to get into without really looking at any documentation. I wanted to see what it felt like before I started looking at any documentation on how to use it, and it was very easy to use. It works very smoothly. The user experience is very intuitive. They did an amazing job on that.
The ability to see east-west traffic is its most valuable feature. Traditionally, email defense focuses on north-south, inbound-outbound, egress-ingress traffic. With Cisco Secure Email Cloud Mailbox, it's able to quickly identify, track, tag, and categorize emails that are internal. That can typically give us visibility into if there's an internal compromised account (for example). Someone can then use that internal compromised account to email additional accounts with either malicious software or links, but internal within that Office tenant. Effectively, that email message never leaves the tenant. Any of the mail gateways really do not have any method or way of seeing this traffic since it's not leaving the environment.