Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

IBM Lotus Protector

4.5
(1)

IBM Lotus Protector for Mail Security scans email messages and attached files for unwanted, confidential or malicious content, extending email security and compliance for social business platform.

Work for IBM Lotus Protector?

Learning about IBM Lotus Protector?

We can help you find the solution that fits you best.

IBM Lotus Protector Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 IBM Lotus Protector review
LinkedIn Connections
IBM Lotus Protector review by John W.
John W.
Validated Reviewer
Review Source
content

"Peace of mind at a reasonable price"

What do you like best?

It's basically set it and forget it. There's very little maintenance needed.

What do you dislike?

Too much contact from IBM. I don't like to get too much contact from sales.

What business problems are you solving with the product? What benefits have you realized?

An additional layer of protection for our customers.

Sign in to G2 to see what your connections have to say about IBM Lotus Protector

What Email Anti-spam solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Lotus Protector for G2 to provide buying insight. Below are some alternatives with more reviews:

1
OfficeScan Logo
OfficeScan
4.0
(39)
Trend Micro OfficeScan infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment.
2
SaneBox Logo
SaneBox
4.8
(12)
SaneBox prioritizes important email and moves everything else into a separate folder. The contents of this folder are summarized in a daily digest for quick and easy bulk processing.
3
Symantec Mail Security for Microsoft Exchange Logo
Symantec Mail Security for Microsoft Exchange
4.3
(12)
Symantec Mail Security for Microsoft Exchange (SMSMSE) combines Symantec anti-malware technology with advanced heuristics and file reputation to provide real-time protection for email against viruses, spyware, phishing, and other malicious attacks. For additional protection, SMSMSE offers Symantec Premium AntiSpam (additional license), powered by Brightmail technology. Together, these protections help to stop 99 percent of incoming spam with less than one false positive per million. SMSMSE enforces content filtering policies on Microsoft Exchange Server 2010, 2013, and 2016, while supporting hosted, Microsoft Hyper-V®, and VMware virtualized Exchange server environments. Symantec Mail Security for Microsoft Exchange complements other layers of protection by preventing the spread of email-borne threats and enforcing data loss prevention (DLP) policies.
4
Retruster Logo
Retruster
4.5
(4)
Retruster is an email security platform that identifies phishing and fraudulent emails. Its advanced AI and machine learning capabilities make it a powerful product for administrators, and its easy-to-use and user-friendly interface make it a favorite among users.
5
ScanMail Suite for Microsoft Exchange Logo
ScanMail Suite for Microsoft Exchange
4.8
(4)
ScanMail Suite for Microsoft Exchange stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense—protection you don't get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro Smart Protection Network cloud-based security.
6
Check Point Anti-Spam & Email Security Software Blade Logo
Check Point Anti-Spam & Email Security Software Blade
4.3
(3)
Check Point Anti-Spam & Email Security Software Blade is an email security software that provides the industry application security and identity control to organizations of all sizes. It enables IT, teams, to create granular policies based on users or groups to identify, block or limit usage of Web applications and widgets.
7
Proofpoint Mail Routing Agent Logo
Proofpoint Mail Routing Agent
4.0
(2)
Proofpoint Mail Routing Agent (MRA) provides secure, scalable, reliable email routing and management for even the most complex email infrastructures.
8
Proofpoint Targeted Attack Protection For Personal Webmail Logo
Proofpoint Targeted Attack Protection For Personal Webmail
4.0
(2)
Personal Webmail Defense (PWD) protects you and your employees across personal webmail and browsing activities across the broader web.
9
SPAMfighter Logo
SPAMfighter
4.8
(3)
SPAMfighter block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist.
10
Intermedia Exchange Email Logo
Intermedia Exchange Email
4.0
(2)
Keep your business safe from known and emerging email threats.
Show more
Kate from G2

Learning about IBM Lotus Protector?

I can help.
* We monitor all IBM Lotus Protector reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.