Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
IBM Lotus Protector

By IBM

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at IBM Lotus Protector and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with IBM Lotus Protector?

It's been two months since this profile received a new review
Leave a Review

IBM Lotus Protector Reviews & Product Details

Product Avatar Image

Have you used IBM Lotus Protector before?

Answer a few questions to help the IBM Lotus Protector community

IBM Lotus Protector Reviews (1)

Reviews

IBM Lotus Protector Reviews (1)

4.5
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
JW
Mid-Market (51-1000 emp.)
"Peace of mind at a reasonable price"
What do you like best about IBM Lotus Protector?

It's basically set it and forget it. There's very little maintenance needed. Review collected by and hosted on G2.com.

What do you dislike about IBM Lotus Protector?

Too much contact from IBM. I don't like to get too much contact from sales. Review collected by and hosted on G2.com.

There are not enough reviews of IBM Lotus Protector for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Proofpoint Core Email Protection Logo
Proofpoint Core Email Protection
4.6
(582)
Proofpoint Core Email Protection stops malware and non-malware threats such as impostor email.
2
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(514)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
3
Paubox Logo
Paubox
4.9
(465)
Paubox is an easy way to send and receive HIPAA compliant email.
4
Valimail Logo
Valimail
4.6
(424)
Valimail is the only solution that automates the path to DMARC enforcement from start to finish, providing rapid, ongoing protection against fraudulent use of your domains.
5
CyberSentriq Logo
CyberSentriq
4.6
(382)
Cybersentriq provides Integrated Cybersecurity & Data Protection for Businesses and Managed Service Providers. Our unified AI-powered platform offers all in one email phishing and spam protection, DNS filtering, security awareness training, email archiving, M365 backup and recovery - enabling users to ensure compliance, easily store and retrieve data, and protect against online threats such as phishing and ransomware
6
Microsoft Defender for Office 365 Logo
Microsoft Defender for Office 365
4.5
(288)
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.
7
SpamTitan Email Security Logo
SpamTitan Email Security
4.5
(198)
Advanced yet easy to use Business Email Security Solution. Protects your business from malicious threats via email such as phishing, malware and spoofing. Double AV protection included. Office 365 Friendly.
8
Everest Logo
Everest
4.2
(189)
Everest (formerly 250ok and Return Path) Email Intelligence Solutions for Marketers utilize the world’s most comprehensive set of email intelligence and data to maximize inbox placement rates for your overall program and individual campaigns.
9
Vade Logo
Vade
4.6
(180)
Vade is the global leader on anti-phishing, spear phishing, malware and ransomware filtering.
10
SaneBox Logo
SaneBox
4.9
(180)
SaneBox prioritizes important email and moves everything else into a separate folder. The contents of this folder are summarized in a daily digest for quick and easy bulk processing.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
IBM Lotus Protector
View Alternatives