Coming October 25: PeerSpot Awards will be announced! Learn more

Symantec Data Center Security OverviewUNIXBusinessApplication

Symantec Data Center Security is #8 ranked solution in best Cloud Security companies. PeerSpot users give Symantec Data Center Security an average rating of 7.0 out of 10. Symantec Data Center Security is most commonly compared to Trend Micro Deep Security: Symantec Data Center Security vs Trend Micro Deep Security. Symantec Data Center Security is popular among the large enterprise segment, accounting for 70% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 25% of all views.
Buyer's Guide

Download the Cloud and Data Center Security Buyer's Guide including reviews and more. Updated: August 2022

What is Symantec Data Center Security?

Docker containers make it easy to develop, deploy, and deliver applications where containers can be deployed and brought down in a matter of seconds. This flexibility makes it very useful for DevOps to automate deployment of containers. Symantec Data Center Security: Server Advanced provides agentless Docker container protection that allows you to achieve the performance benefits of Docker without sacrificing security. Full application control enables administrator privilege de-escalation, patch mitigation, and protection against zero day threats in today's heterogeneous data centers.

Symantec Data Center Security Video

Archived Symantec Data Center Security Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Sagar_Shah - PeerSpot reviewer
Project Manager IT at a computer software company with 1,001-5,000 employees
Real User
Good centralized console, but it needs to be more flexible in terms of deployment
Pros and Cons
  • "The most valuable feature is the centralized console, which can handle different products that we have."
  • "They need to develop a more flexible product that can be scaled such that it fits well into a small business or a bigger, enterprise-level solution."

What is our primary use case?

This product makes up part of our security solution that we offer to customers for use in data centers and remote sites.

As many people are now working from home, they use this solution so that they can work remotely to their data centers and still keep operations centralized. They need to work flexibly, not only from a geolocation point of view but geographically.

How has it helped my organization?

Since the acquisition of Symantec, our customers have not been satisfied with this solution. They are moving to other products such as CrowdStrike, Trend Micro, and McAfee.

What is most valuable?

The most valuable feature is the centralized console, which can handle different products that we have. It is essentially a segregation option.

What needs improvement?

Symantec is a little bit behind on the most recent advances, such as products that are more lightweight and more flexible in their deployment to multiple operating systems. They need to develop a more flexible product that can be scaled such that it fits well into a small business or a bigger, enterprise-level solution.

If I want to set up an endpoint solution that is on the cloud or is a hybrid, then there's a dependency on old-fashioned patterns, like hash values, in the internal policies. However, in a next-generation solution, we don't have to work in this traditional way. They are capable of automatically detecting and adapting to new threats that are coming out.

This solution does not offer as many centralized management options as other vendors. for example, you cannot install or uninstall machines using the console.

Better integration with other solutions is needed. Nowadays, keeping costs in mind, people don't want to be restricted to using a single vendor or dedicated platform. They want to be able to integrate with different products from multiple vendors. Better integration allows them to stay flexible and maintain or build a competitive edge.

Buyer's Guide
Cloud and Data Center Security
August 2022
Find out what your peers are saying about Broadcom, Trend Micro, VMware and others in Cloud and Data Center Security. Updated: August 2022.
632,611 professionals have used our research since 2012.

For how long have I used the solution?

I have been working with Symantec Data Center Security for nine years.

Which solution did I use previously and why did I switch?

I am familiar with solutions from several vendors including CrowdStrike, Trend Micro, and McAfee. With Trend Micro, for example, you can implement, deploy, and monitor in a single console. I am not required to send a team to deploy it.

How was the initial setup?

The initial setup is complex for the most part.

We have three different types of deployments including on-premises, cloud-based, and hybrid. The choice of deployment model depends on the requirements.

The length of time for deployment depends on the configuration and what you want to deploy. It generally takes between four and five hours for a fresh installation.

What about the implementation team?

We have an in-house team in charge of implementation, deployment, and maintenance. They can also provide support for our remote sites if needed.

What's my experience with pricing, setup cost, and licensing?

Compared to some other solutions, such as CrowdStrike, Symantec is more expensive.

Which other solutions did I evaluate?

There are different products in competition with Symantec that we have the option to offer to our customers. We have had cases where Symantec has been replaced, whereas in other cases, we have installed the traditional Symantec security solution.

With Symantec, monitoring and reporting is not a single click. Rather, you have to look at different options to get your reports. This is an area where other vendors are ahead of Symantec.

What other advice do I have?

The suitability of Symantec Data Center Security depends on the requirements and it is important to understand them in advance. If you are fine with the traditional way of detecting threats then this is a good solution. If not, then I would suggest using newer technology.

I would rate this solution a five out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
PratapBirwatkar - PeerSpot reviewer
Group Head - Information Security at a energy/utilities company with 1,001-5,000 employees
Real User
Endpoint protection that scales well and is easy to deploy

What is our primary use case?

Symantec Data Center Security is part of our overall security solution that includes anti-virus, anti-spam, and anti-malware protection. 

What is most valuable?

The most valuable feature is the endpoint protection system.

What needs improvement?

This solution clashes with Microsoft defender, which results in performance degradation on the machine.

Technical support needs more local representation in India.

For how long have I used the solution?

We have been using Symantec Data Center Security for between three and four years.

What do I think about the stability of the solution?

We have not seen any bugs or glitches.

What do I think about the scalability of the solution?

This solution scales well. We have approximately five people using this solution. One is an administrator and the rest are end-users.

How are customer service and technical support?

We have had some issues with support because it is not available in our region in India. This means that it is very difficult for us to get direct support from Symantec, which is why we employ a consultant to manage this solution for us.

Which solution did I use previously and why did I switch?

We did use another solution prior to this one.

How was the initial setup?

The initial setup is pretty straightforward and not very complex.

What about the implementation team?

We have a consultant who manages our solution. If there is an installation or anything needs changes then he takes care of it.

What other advice do I have?

Overall, this is a pretty good product.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Cloud and Data Center Security
August 2022
Find out what your peers are saying about Broadcom, Trend Micro, VMware and others in Cloud and Data Center Security. Updated: August 2022.
632,611 professionals have used our research since 2012.
Managing Director at a tech services company with 51-200 employees
Real User
Very stable across our large and diverse environment
Pros and Cons
  • "The monitoring in the management console allows us to find out what is going wrong, and it gets reports even before the user reports it."
  • "There is plenty of room for improvement with this product, and it could start with platform metrics."

What is our primary use case?

We have a public zone that is a mix of intranet and public service. We have to ensure that none of the hosts are compromised and that nothing impacts the integrity of the servers. This is our primary use case.

Next, we have to protect data that is stored inside of Docker containers. In developing features, they are outside to an extent, so these have to be brought up in a secured form. This means that we had to create split architectures. Also, we needed something that allowed us to integrate the identity mapping and ensure a certificate-based review. The advantage in the field is that they have a template and a certificate broker. The broker wraps the application around that certificate, which can be put into the firewall security policy.

For example, if one of the programmers comes out with a new code review, which is not wrapped on our stack, then I will not allow him to put that into the code. It first has to be checked into the repository, signed, and then put back into the system.

The advantage to this is that the integrity of the person who created it, and the person who modifies it, are all approved as part of the audit entry. Because it is worked on by a lot of people, and there are millions of lines of code that are changed using this mechanism, we need to know who made what change. The code review team is integrating, but they have to rely on the integrity of the system. So, the snapshot mechanism and the ability to integrate that along with the Docker capabilities is something that is very important to us.

We have also used the Firewall and IPS components, as well as the capability for monitoring the integrity of files.

How has it helped my organization?

We have been building on this solution. For example, it did not handle the Docker security previously. It had been related to the protection of the host. We did not worry about new features or functionality. Instead, we focused on what works the best, and how to prevent the problems that occur right now.

For example, we had a situation where one of the previous Apache web services was being changed, without me knowing who was doing it. Using this solution we were able to identify the process, and it was happening because of rules that were not being followed in that city.

What is most valuable?

The most valuable feature is that the protection of the hard disk security is built in, so it is a ready-to-use product. The monitoring in the management console allows us to find out what is going wrong, and it gets reports even before the user reports it.

Having it in advance of the user is important because it takes time to comprehend. Once we know what is going on and who is doing it, we can act accordingly. We have created our own workflow mechanism as an outcome of this, and we can update the identity and provisioning if any modifications need to be done.

What needs improvement?

There is plenty of room for improvement with this product, and it could start with platform metrics. We are changing certain platforms in terms of preparing them for the system to support it. We always want legacy platforms, or those which need virtual protection or host protection, to be supported no matter how old they are.

We want the speed at which content is delivered to be improved, but not at the cost of complicating the product or reducing its stability.  

For how long have I used the solution?

Two years.

What do I think about the stability of the solution?

The product is stable. From a stability side, if something does go wrong then we should be getting reports in some form.

What do I think about the scalability of the solution?

The product is scalable, but the manageability of the solution across many thousands of servers is becoming complex. It is difficult to monitor and manage, so it is a concern. As the solution scales, I would like a simpler way of managing it.

We do plan to increase the use of the product. The number of hosts and applications are increasing, so our usage is going up.

How are customer service and technical support?

The support from Symantec is fantastic.

Which solution did I use previously and why did I switch?

Previously we had a situation where for Windows we were using one product, and then in the next, we were using something else. There were different mechanisms for different products.

We had a Unix team, a Linux team, and a Windows team. From a simplification standpoint, because we have standardized on this solution, everybody's learning curve has shortened.

How was the initial setup?

The most recent version was pretty simple, although we had our own hiccups and issues related to it. It is based on the environment, and ours has dependency challenges.

Generally, it takes time and diligence to set it up, but it is worth the effort.

Our deployment was done in stages. We have mission-critical servers, critical servers, and business servers. We started with the least critical, which is the business servers. From there we moved to the critical, and then on to the mission-critical. Those were also broken into different groups.

The business servers, where we had to learn the most, took us more than four months. For the critical servers, a lot of the work had been done, and they took us one to two weeks. The mission-critical servers are being set up now. It happens gradually because of our operational dependency.

What about the implementation team?

We did the implementation and deployment ourselves, with help from Symantec support.

What was our ROI?

ROI is very difficult to explain. The quantification done by one of our colleagues was that we have already seen ROI based on independence. We have not reduced manpower, the number of servers has gone up, but the number of incidents has tricked down to single digits. We now know what is happening and what is going wrong.

Which other solutions did I evaluate?

We had many other options to choose from, but none of them have the depth of coverage that Symantec has. We read reviews from different people, and we went ahead with it based on these.

What other advice do I have?

We have several versions of the solution installed, and the version that we install depends on the compatibility with our platforms. We have an old release installed, and we have other editions installed, but that is not because of the product. It is because we can't have the same version for everything.

Our environment is made up of equipment acquired at different times. Some parts are two years old, while other components are the latest version. Now, we have different versions to handle everything.

The implementation becomes picky, but it does its job.

The vendor has not been focused on new features. Rather, they are keeping up with the newer platforms and newer versions that have been coming out. There have been times in the past when the products did not keep up with the code, and the product had lost its importance. The pace at which they were delivering was quite slow. Now, however, the changes are happening faster. As newer operating systems are coming up, the platform is being updated, which has made it rich enough to include the same security that you would expect for all versions.

Performance has never been an issue for this product. We have not found anything that is smaller than this. The question to ask is whether there is ease of use and whether there is platform coverage. This product works on Linux, Unix, and Windows, which is important because you want to use the same product for the whole data center.

Over time, we have seen this solution become less complex and easier to use.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Cloud and Data Center Security Report and find out what your peers are saying about Broadcom, Trend Micro, VMware, and more!
Updated: August 2022
Buyer's Guide
Download our free Cloud and Data Center Security Report and find out what your peers are saying about Broadcom, Trend Micro, VMware, and more!