# Best Enterprise Email Anti-spam Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Products classified in the overall Email Anti-spam category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Email Anti-spam to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Email Anti-spam category.

In addition to qualifying for inclusion in the Email Anti-spam Software category, to qualify for inclusion in the Enterprise Business Email Anti-spam Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 122


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 5,200+ Authentic Reviews
- 122+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### Sublime Email Security Platform

Sublime’s agentic platform stops more email attacks with less work. Our AI agents work like a digital SOC team in your environment, triaging and blocking advanced threats while adapting protections at adversary speed. It provides full transparency and automation by default, with control on demand for advanced teams, eliminating vendor bottlenecks or one-size-fits-all limits. Core Outcomes (The What): - Stop More Attacks with Fewer False Positives - block sophisticated threats (BEC, novel phishing, QR-based phishing) and reduce the false positives that waste time and disrupt workflows. Our tailored protections deliver a demonstrably higher catch rate, validated by the world&#39;s most demanding security teams. - Automate the Abuse Mailbox - Our Autonomous Security Analyst (ASA) automates triage, investigation, and remediation of user-reported email, cutting MTTR from hours to seconds and freeing your SOC team to focus on the threats that matter most. - Adapt Defenses Automatically. - When a missed attack is identified, we can create new coverage in hours. Our Autonomous Detection Engineer (ADÉ) generates, backtests, and deploys org-specific coverage, eliminating vendor ticket limbo. Differentiators (The How): - A Team of Agents using AI, Not Just a Black Box - Sublime deploys a team of specialized agents - like an analyst and a detection engineer - that use AI to protect, triage, and adapt your defenses. Unlike an opaque, monolithic AI, our agentic approach provides full transparency into every action, with visible decision history, message lineage, and backtests. - Org-Specific Protection, Not One-Size-Fits-All - Our Distributed Detection Model (DDM) is the foundation of our platform. It runs per-environment coverage that adapts to the unique attacks you face, allowing us to safely deploy protections that would be noisy in global models - something centralized systems simply can’t support. This means higher day-one efficacy and fewer false positives. - Autonomous by Default, Control on Demand - By stopping more attacks and reducing false positives, Sublime delivers a superior autonomous experience that requires less work. For advanced teams, the platform is fully extensible, allowing you to author your own detections and hunt for threats with a level of precision that one-size-fits-all solutions can&#39;t. Innovative organizations including Spotify, Snowflake, Brex, Elastic, Compass, Anduril, SentinelOne, and others rely on Sublime to secure the business and keep teams focused on strategic defense. 🔗 Learn how Sublime helps security teams stop more attacks with less work at sublime.security



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=paid_promo&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1628&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1417082&amp;secure%5Bresource_id%5D=1628&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Femail-anti-spam&amp;secure%5Btoken%5D=116c870ba87f716d1d8ff15fb59192e8bc34f7b356a5909b7ca8f6cb30a8b832&amp;secure%5Burl%5D=https%3A%2F%2Fsublime.security&amp;secure%5Burl_type%5D=paid_promos&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Proofpoint Core Email Protection](https://www.g2.com/products/proofpoint-core-email-protection/reviews)
  Proofpoint’s Core Email Protection (CEP) stops 99.99% of all email threats before they become compromises. It stops the broadest range of email cyberattacks, spam and graymail. For security analysts, it provides integrated search and alert-based workflows, automatically remediates user reported emails, and coaches users in-the-moment. Core Email Protection leverages Nexus language models, relationship graphs, machine learning and computer vision to stop advanced email threats. It’s powered by unparallelled email threat data from over 3 trillion emails scanned per year, to automatically stop threats like BEC, account takeovers, QR code phishing, impersonations, and lateral phishing. Customers choose how to deploy Core Email Protection, with SEG and API options available. SEG provides the highest security via defense in depth, with pre-delivery, post-delivery, and click time protection. API is a faster deployment, and augments M365 with the same detection engine to block threats, spam, and graymail.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 571

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Admin:** 8.5/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.5/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Company Website:** https://www.proofpoint.com/us
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,155 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Information Security Analyst, IT Security Engineer
  - **Top Industries:** Financial Services, Hospital &amp; Health Care
  - **Company Size:** 66% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Protection (88 reviews)
- Email Security (81 reviews)
- Ease of Use (66 reviews)
- Effective (52 reviews)
- Security (49 reviews)

**Cons:**

- Outdated Interface (28 reviews)
- User Interface (24 reviews)
- Email Issues (23 reviews)
- Complexity (20 reviews)
- False Positives (19 reviews)

### 2. [Microsoft Defender for Office 365](https://www.g2.com/products/microsoft-microsoft-defender-for-office-365/reviews)
  Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations from advanced threats targeting email and collaboration tools within the Microsoft 365 environment. It offers robust protection against phishing, malware, and business email compromise, ensuring secure communication and collaboration across platforms like Exchange Online, Microsoft Teams, SharePoint, and OneDrive. Key Features and Functionality: - Safe Attachments: Scans email attachments in a secure environment to detect and block malicious content before it reaches users. - Safe Links: Provides real-time protection by analyzing URLs at the time of click, safeguarding users from malicious links. - Anti-Phishing Policies: Utilizes advanced algorithms and machine learning to identify and mitigate phishing attempts, including those involving domain impersonation. - Protection for Collaboration Tools: Extends security measures to Microsoft Teams, SharePoint, and OneDrive, ensuring safe file sharing and collaboration. - Automated Investigation and Response (AIR): Automates threat investigation processes, enabling swift identification and remediation of security incidents. - Attack Simulation Training: Offers tools to simulate phishing attacks, helping organizations educate employees and strengthen their security posture. Primary Value and Problem Solved: Microsoft Defender for Office 365 addresses the critical need for advanced threat protection in today&#39;s digital workplace. By integrating seamlessly with Microsoft 365 applications, it provides a unified defense against sophisticated cyber threats, reducing the risk of data breaches and ensuring business continuity. Its comprehensive approach not only safeguards email communications but also secures collaborative platforms, enabling organizations to operate confidently in a secure environment.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 276

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.7/10 (Category avg: 9.0/10)
- **Ease of Admin:** 8.9/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Associate Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (9 reviews)
- Email Security (8 reviews)
- Office 365 Integration (8 reviews)
- Integrations (7 reviews)

**Cons:**

- Complexity (8 reviews)
- False Positives (6 reviews)
- Configuration Difficulties (4 reviews)
- Limited Reporting (4 reviews)
- Poor Detection (3 reviews)

### 3. [Sublime Email Security Platform](https://www.g2.com/products/sublime-email-security-platform/reviews)
  Sublime’s agentic platform stops more email attacks with less work. Our AI agents work like a digital SOC team in your environment, triaging and blocking advanced threats while adapting protections at adversary speed. It provides full transparency and automation by default, with control on demand for advanced teams, eliminating vendor bottlenecks or one-size-fits-all limits. Core Outcomes (The What): - Stop More Attacks with Fewer False Positives - block sophisticated threats (BEC, novel phishing, QR-based phishing) and reduce the false positives that waste time and disrupt workflows. Our tailored protections deliver a demonstrably higher catch rate, validated by the world&#39;s most demanding security teams. - Automate the Abuse Mailbox - Our Autonomous Security Analyst (ASA) automates triage, investigation, and remediation of user-reported email, cutting MTTR from hours to seconds and freeing your SOC team to focus on the threats that matter most. - Adapt Defenses Automatically. - When a missed attack is identified, we can create new coverage in hours. Our Autonomous Detection Engineer (ADÉ) generates, backtests, and deploys org-specific coverage, eliminating vendor ticket limbo. Differentiators (The How): - A Team of Agents using AI, Not Just a Black Box - Sublime deploys a team of specialized agents - like an analyst and a detection engineer - that use AI to protect, triage, and adapt your defenses. Unlike an opaque, monolithic AI, our agentic approach provides full transparency into every action, with visible decision history, message lineage, and backtests. - Org-Specific Protection, Not One-Size-Fits-All - Our Distributed Detection Model (DDM) is the foundation of our platform. It runs per-environment coverage that adapts to the unique attacks you face, allowing us to safely deploy protections that would be noisy in global models - something centralized systems simply can’t support. This means higher day-one efficacy and fewer false positives. - Autonomous by Default, Control on Demand - By stopping more attacks and reducing false positives, Sublime delivers a superior autonomous experience that requires less work. For advanced teams, the platform is fully extensible, allowing you to author your own detections and hunt for threats with a level of precision that one-size-fits-all solutions can&#39;t. Innovative organizations including Spotify, Snowflake, Brex, Elastic, Compass, Anduril, SentinelOne, and others rely on Sublime to secure the business and keep teams focused on strategic defense. 🔗 Learn how Sublime helps security teams stop more attacks with less work at sublime.security


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.8/10 (Category avg: 9.0/10)
- **Ease of Admin:** 8.7/10 (Category avg: 8.9/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Sublime Security](https://www.g2.com/sellers/sublime-security)
- **Company Website:** https://sublime.security/
- **Year Founded:** 2019
- **HQ Location:** Washington, District of Columbia, United States
- **Twitter:** @sublime_sec (2,456 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sublime-security (284 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 56% Enterprise, 19% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Detection Efficiency (13 reviews)
- Easy Setup (10 reviews)
- Setup Ease (10 reviews)
- Customization (9 reviews)

**Cons:**

- Missing Features (5 reviews)
- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Limited Features (4 reviews)
- Learning Difficulty (3 reviews)

### 4. [Abnormal AI](https://www.g2.com/products/abnormal-ai/reviews)
  Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event--detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection is available for Slack, Workday, ServiceNow, Zoom, and multiple other cloud applications. Abnormal is currently trusted by more than 3,200 organizations, including over 25% of the Fortune 500, as it continues to redefine how cybersecurity works in the age of AI. For more information, please visit abnormal.ai


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.5/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.5/10 (Category avg: 8.9/10)
- **Ease of Use:** 9.6/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Abnormal AI](https://www.g2.com/sellers/abnormal-ai)
- **Company Website:** https://abnormal.ai
- **Year Founded:** 2018
- **HQ Location:** Las Vegas, USA
- **LinkedIn® Page:** https://www.linkedin.com/company/abnormalsecurity/ (1,465 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Manufacturing
  - **Company Size:** 51% Enterprise, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Customer Support (12 reviews)
- Easy Setup (12 reviews)
- Detection Efficiency (11 reviews)
- Email Security (11 reviews)

**Cons:**

- Email Filtering Issues (3 reviews)
- Email Issues (3 reviews)
- False Positives (3 reviews)
- Limited Reporting (3 reviews)
- Email Security (2 reviews)

### 5. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.2/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.1/10 (Category avg: 8.9/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Cloudflare, Inc.](https://www.g2.com/sellers/cloudflare-inc)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @Cloudflare (279,070 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/407222/ (6,898 employees on LinkedIn®)
- **Ownership:** NYSE: NET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Protection (7 reviews)
- Reliability (7 reviews)
- Security (7 reviews)
- User Interface (6 reviews)

**Cons:**

- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Difficult Learning (4 reviews)
- Difficult Learning Curve (4 reviews)
- Difficult Setup (4 reviews)

### 6. [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
  Check Point Harmony Email &amp; Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 465

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.1/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.3/10 (Category avg: 8.9/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Email Security (94 reviews)
- Security (83 reviews)
- Protection (74 reviews)
- Ease of Use (50 reviews)
- Phishing Protection (45 reviews)

**Cons:**

- False Positives (29 reviews)
- Complexity (23 reviews)
- Complex Setup (22 reviews)
- Limited Features (18 reviews)
- Configuration Difficulties (17 reviews)

### 7. [Valimail](https://www.g2.com/products/valimail/reviews)
  Valimail: The Leader in Email Authentication &amp; Brand Protection Valimail is the trusted leader in automated email authentication, helping organizations achieve and maintain DMARC enforcement up to 4x faster with a unique blend of speed, simplicity, and automation. By eliminating manual processes, Valimail ensures that your brand stays protected against phishing, spoofing, and email fraud while improving email deliverability and brand trust. Valimail offers three solutions: 1) Valimail Monitor provides organizations with global visibility into all senders using their domains, removing the complexity of interpreting raw DMARC reports. Key Features &amp; Benefits: -See Who’s Sending on Your Behalf – Instantly identify all senders using your domain and authorize the right ones. -Check Google &amp; Yahoo Readiness – Get a real-time check to ensure your domain meets Google &amp; Yahoo’s latest DMARC, DKIM, and SPF requirements. -Preview BIMI for Your Brand – Upload your logo and see how it would appear in inboxes on mobile and desktop. \&gt;\&gt; First step towards DMARC enforcement – Identify and authorize all senders before making changes that impact email flow. 2) Valimail Enforce is the only FedRAMP-certified platform and the vetted DMARC partner for Microsoft 365, offering fully automated DMARC, SPF, and DKIM configuration to eliminate errors and simplify implementation. Key Features &amp; Benefits: -Automated DMARC, DKIM, and SPF Configuration – Reduce the risk of misconfiguration and achieve enforcement faster. -Expert DMARC Support &amp; Advisory Services – Get direct access to technical support for tailored guidance and rapid issue resolution. -Powerful Analytics &amp; Reporting – Gain actionable insights into email performance, phishing attempts, and domain spoofing. \&gt;\&gt; Stop phishing attacks, prevent brand impersonation, and ensure only legitimate emails reach inboxes. 3) Valimail Amplify helps brands stand out in crowded inboxes by enabling BIMI (Brand Indicators for Message Identification) and displaying your verified brand logo directly in emails. Key Features &amp; Benefits: -Enhanced Brand Visibility &amp; Competitive Edge – Your logo appears directly in inboxes, making your emails instantly recognizable. -Boost Engagement &amp; Trust – Recipients trust and engage more with branded emails, improving open rates and conversions. -Seamless BIMI Implementation – The only fully automated BIMI solution, offering single-click logo configuration and automated VMC/CMC management. -Effortless Brand Asset Management – Easily assign, update, or swap logos across domains. \&gt;\&gt; For companies at DMARC enforcement, Amplify accelerates BIMI adoption—ensuring your logo appears in inboxes faster. For more information visit www.valimail.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 453

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.1/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.1/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Valimail](https://www.g2.com/sellers/valimail)
- **Company Website:** https://www.valimail.com/
- **Year Founded:** 2015
- **HQ Location:** Denver, CO
- **Twitter:** @ValiMail (1,110 Twitter followers)
- **LinkedIn® Page:** https://linkedin.com/company/valimail (102 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 43% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (77 reviews)
- DMARC Management (66 reviews)
- Easy Setup (61 reviews)
- Setup Ease (48 reviews)
- Reporting (41 reviews)

**Cons:**

- Expensive (19 reviews)
- Limited Reporting (15 reviews)
- Complexity (14 reviews)
- Lack of Detail (13 reviews)
- DMARC Issues (12 reviews)

### 8. [Barracuda Impersonation Protection](https://www.g2.com/products/barracuda-impersonation-protection/reviews)
  Impersonation Protection protects against business email compromise, account takeover, spear phishing, and other cyber fraud. It combines artificial intelligence and deep integration with Microsoft Office 365 into a comprehensive cloud-based solution. Impersonation Protection’s unique API-based architecture lets the AI engine study historical email and learn users’ unique communication patterns. It blocks phishing attacks that harvest credentials and lead to account takeover and enables real-time remediation.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 87

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.9/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.1/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,238 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Who Uses This:** Systems Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 67% Mid-Market, 17% Small-Business


#### Pros & Cons

**Pros:**

- Phishing Protection (8 reviews)
- Ease of Use (7 reviews)
- Security (6 reviews)
- Setup Ease (6 reviews)
- Customer Support (5 reviews)

**Cons:**

- False Positives (8 reviews)
- Complexity (3 reviews)
- Inadequate Protection (3 reviews)
- UX Improvement (3 reviews)
- Configuration Difficulties (2 reviews)

### 9. [Libraesva Email Security](https://www.g2.com/products/libraesva-email-security/reviews)
  Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine that uses AI to learn the usual patterns of behavior for organizations and individuals, continuously assessing the strength of business-to-business trust and proactively holding anomalous traffic. Libraesva Email Security scans and filters all inbound and outbound emails for advanced malware, phishing, business email compromise, spam and more. Proprietary sandboxing technology removes dangerous payloads and active content from attachments, and you can protect users from visiting unsafe sites with active URL analysis that checks every link. Use Libraesva Email Security to understand the threat landscape and attacks launched against your organization, deal with security incidents faster, and see how you compare against others around the world. Easy to follow workflows make it painless to change configuration settings, and full reporting and dashboards give you full visibility of email traffic and trends so you can understand the risks and use insights to plan intelligent mitigation strategies.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 102

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.1/10)
- **Quality of Support:** 9.8/10 (Category avg: 9.0/10)
- **Ease of Admin:** 9.4/10 (Category avg: 8.9/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Libraesva](https://www.g2.com/sellers/libraesva)
- **Company Website:** https://www.libraesva.com
- **Year Founded:** 2013
- **HQ Location:** Italy
- **Twitter:** @Libraesva (325 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/libraesva/ (44 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 47% Mid-Market, 34% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (37 reviews)
- Customer Support (32 reviews)
- Email Security (26 reviews)
- Effective (24 reviews)
- Setup Ease (17 reviews)

**Cons:**

- Complexity (8 reviews)
- Email Issues (5 reviews)
- User Interface (5 reviews)
- Access Issues (4 reviews)
- Difficult Setup (4 reviews)

### 10. [OfficeScan](https://www.g2.com/products/officescan/reviews)
  Trend Micro OfficeScan infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 43

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.2/10 (Category avg: 9.0/10)
- **Ease of Admin:** 8.0/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.5/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 46% Mid-Market, 28% Enterprise


### 11. [Symantec Email Security.Cloud](https://www.g2.com/products/symantec-email-security-cloud/reviews)
  Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 60

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 9.1/10)
- **Quality of Support:** 7.9/10 (Category avg: 9.0/10)
- **Ease of Admin:** 7.9/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 38% Mid-Market


### 12. [Trellix Email Security](https://www.g2.com/products/trellix-email-security/reviews)
  Trellix Email Security delivers comprehensive protection for inbound and outbound emails, safeguarding the #1 attack vector. With advanced threat detection, actionable alerts, and email claw-back capabilities, you can reduce attacks using AI, machine learning, and analytics.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 28

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.5/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.0/10 (Category avg: 9.0/10)
- **Ease of Admin:** 7.1/10 (Category avg: 8.9/10)
- **Ease of Use:** 7.4/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,661 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 39% Small-Business, 35% Enterprise


### 13. [Everest](https://www.g2.com/products/validity-inc-everest/reviews)
  Everest is a fully integrated email success platform providing crucial insights and deliverability guidance so you can reach more people, increase engagement, and improve efficiencies of your email program. Improve your email deliverability by getting complete visibility into your email marketing metrics and sender reputation, understand your audience and deliver content that is timely, personalized, and functions flawlessly on any device, and get a holistic view of your email program with the insights, guidance, and exclusive data you need at your fingertips – all in a single platform. Everest is built by the combined forces of Return Path, BriteVerify, and 250ok. Bringing together 20+ years of email marketing experience and continuous learning from thousands of customers into this unified and powerful platform.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 185

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.1/10)
- **Quality of Support:** 8.2/10 (Category avg: 9.0/10)
- **Ease of Admin:** 8.3/10 (Category avg: 8.9/10)
- **Ease of Use:** 8.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Validity Inc](https://www.g2.com/sellers/validity-inc)
- **Company Website:** https://www.validity.com
- **Year Founded:** 2018
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @TrustValidity (1,153 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/11679353/ (344 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Marketing Manager
  - **Top Industries:** Marketing and Advertising, Information Technology and Services
  - **Company Size:** 41% Mid-Market, 34% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (7 reviews)
- Helpful (5 reviews)
- Dashboard Features (3 reviews)
- Deliverability Improvement (3 reviews)
- Design Ease (3 reviews)

**Cons:**

- Expensive (2 reviews)
- Change Adaptation (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Dashboard Issues (1 reviews)



## Parent Category

[Email Security Software](https://www.g2.com/categories/email-security)



## Related Categories

- [Secure Email Gateway Software](https://www.g2.com/categories/secure-email-gateway)
- [Cloud Email Security Solutions](https://www.g2.com/categories/cloud-email-security)
- [Intelligent Email Protection Software](https://www.g2.com/categories/intelligent-email-protection)




