No more typing reviews! Try our Samantha, our new voice AI agent.

Seeker Interactive vs Symantec Endpoint Protection Mobile comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Seeker Interactive
Ranking in Mobile Threat Defense
14th
Average Rating
7.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
Internet Security (15th), API Security (16th)
Symantec Endpoint Protectio...
Ranking in Mobile Threat Defense
6th
Average Rating
7.2
Reviews Sentiment
7.3
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Mobile Threat Defense category, the mindshare of Seeker Interactive is 2.3%, up from 0.1% compared to the previous year. The mindshare of Symantec Endpoint Protection Mobile is 4.9%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Symantec Endpoint Protection Mobile4.9%
Seeker Interactive2.3%
Other92.8%
Mobile Threat Defense
 

Featured Reviews

San K - PeerSpot reviewer
Senior Group Leader at Infosys
More effective than dynamic scanners, but is missing useful learning capabilities
One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need. The purposes for which applications are designed may differ in practice in the industry, and because of this, there will always be tools that sometimes report false positives. Thus, there should be some means with which I can customize the way that Seeker learns about our applications, possibly by using some kind of AI / ML capability within the tool that will automatically reduce the number of false positives that we get as we use the tool over time. Obviously, when we first start using the scanning tool there will be false positives, but as it keeps going and as I keep using the tool, there should be a period of time where either the application can learn how to ignore false positives, or I can customize it do so. Adding this type of functionality would definitely prevent future issues when it comes to reporting false positives, and this is a key area that we have already asked the vendor to improve on, in general. On a different note, there is one feature that isn't completely available right now where you can integrate Seeker with an open-source vulnerability scanner or composition analysis tool such as Black Duck. I would very much like this capability to be available to us out-of-the-box, so that we can easily integrate with tools like Black Duck in such a way that any open source components that are used in the front-end are easily identified. I think this would be a huge plus for Seeker. Another feature within Seeker which could benefit from improvement is active verification, which lets you actively verify a vulnerability. This feature currently doesn't work in certain applications, particularly in scenarios where you have requested tokens. When we bought the tool, we didn't realize this and we were not told about it by the vendor, so initially it was a big challenge for us to overcome it and properly begin our deployment.
Dennis O'Reilly - PeerSpot reviewer
Cyber SecOps Principal at Dotcom Security
An easy-to-deploy solution for mobile devices that has high stability and scalability
We use Symantec Endpoint Protection Mobile for mobile devices like Android and Apple iOS Symantec Endpoint Protection Mobile is very easy to deploy, and it is really easy to set up the policies. Since deploying to a mobile device is not your average deployment to a workstation endpoint or a…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"A significant advantage of Seeker is that it is an interactive scanner, and we have found it to be much more effective in reducing the amount of false positives than dynamic scanners such as AppScan, Micro Focus Fortify, etc., and furthermore, with Seeker, we are finding more and more valid (i.e. "true") positives over time compared with the dynamic scanners."
"A significant advantage of Seeker is that it is an interactive scanner, and we have found it to be much more effective in reducing the amount of false positives than dynamic scanners such as AppScan, Micro Focus Fortify, etc. Furthermore, with Seeker, we are finding more and more valid (i.e. "true") positives over time compared with the dynamic scanners."
"The solution has a lot of extremely useful features, is reliable and makes search engines more powerful, and the user interface, managing, and monitoring tools are also good."
"Your endpoint protection depends on the signature piece, so it's mainly for virus and malware protection, as well as also to control devices and applications."
"The most valuable feature is to be able to power up a device and wipe the data remotely."
"There is no issue with the stability of Endpoint."
"The user interface is good. Managing and monitoring tools are also good."
"One of the features I found very nice in Symantec Endpoint Protection Mobile is that it's good at scanning and fixing issues on its own. The solution is very good at finding a lot of applications and notifying you about systems that have issues. Symantec Endpoint Protection Mobile can run headless without having to report back which I found very nice about it. I also like that the solution would create alerts when a certain amount of time lapsed for systems, and it would recommend going through and scanning the systems. As an actual endpoint protection product, Symantec Endpoint Protection Mobile is good."
"One of the features I found very nice in Symantec Endpoint Protection Mobile is that it's good at scanning and fixing issues on its own."
"The biggest advantage it has is the VPN product that is incorporated into the solution."
 

Cons

"One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need."
"All in all, the enterprise server installation is very easy and straightforward, but with the agent installation you might face problems up to 50% of the time for a variety of reasons, depending on what type of application is involved, the type of deployment used, and so on."
"It would be nice to have more flexibility regarding deployment."
"Having better, real-time support would be an improvement over having to send an email."
"The price is too expensive for the Egyptian market here. Compared to other products or the other competition here in the local market, they need to be more competitive cost-wise."
"When there is an attack attempt on mobile, there doesn't seem to be much of a notification."
"Application and device control needs to be improved. We also need to enhance login features for management to have good visibility of the events."
"Having better, real-time support would be an improvement over having to send an email."
"I'm not sure if there's anything lacking; I personally don't use the solution too much, so I'd have to look at it a bit and do some more research. I'm more on the operation side of things."
"I'm not sure if there's anything lacking; I personally don't use the solution too much, so I'd have to look at it a bit and do some more research."
 

Pricing and Cost Advice

"The licensing for Seeker is user-based and for 50 users I believe it costs about $70,000 per year."
"You get the solution for free if you purchase the complete endpoint security licensing."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
885,444 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Government
16%
Comms Service Provider
9%
Retailer
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise3
 

Also Known As

No data available
Skycure
 

Overview

 

Sample Customers

El Al Airlines and Société Française du Radiotelephone
Samsung, Optiv, Exchange, MobileIron, Check Point, McAfee, AirWatch
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: March 2026.
885,444 professionals have used our research since 2012.