Scrum Master at Inalpie Enterprise
Real User
Top 5
Provides good threat detection and response and the technical support’s response time is fast
Pros and Cons
  • "The solution has integrated some AI tools for the automation of tasks."
  • "The solution needs to be marketed to more consumers so that they will use it."

What is our primary use case?

We use the solution for security purposes, my email, and website.

What is most valuable?

The solution has integrated some AI tools for the automation of tasks. At times, you don't need to do something. The solution will give you a report of what it has done. The solution's threat detection and response capabilities are quite good. The solution gives you feedback about future threats. That's a great insight because once you get the particular information, you can respond according to the report.

What needs improvement?

The solution needs to be marketed to more consumers so that they will use it. The solution is expensive, and its pricing could be improved.

For how long have I used the solution?


Buyer's Guide
Symantec Endpoint Security Enterprise
March 2024
Learn what your peers think about Symantec Endpoint Security Enterprise. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,924 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the solution a nine out of ten for stability.

What do I think about the scalability of the solution?

Symantec Endpoint Security Enterprise is a scalable solution, and we can scale it. However, the product's license is quite expensive. Around six users are using the solution in our organization.

How are customer service and support?

The solution's technical support is good, and their response time is fast.

How was the initial setup?

It's easy to deploy the solution. The solution is not difficult to use because it comes with some instructions. Even a non-technical person can deploy Symantec Endpoint Security Enterprise.

What about the implementation team?

We implemented the solution through an in-house team. The solution’s deployment takes around 30 to 40 minutes.

What's my experience with pricing, setup cost, and licensing?

We pay a yearly subscription for the solution. The solution's license is very expensive.

What other advice do I have?

The solution's performance in a large-scale enterprise environment is good. Around four people are needed to deploy and maintain the solution. I would recommend the solution to other users because its technical support and threat detection and response are quite good.

Overall, I rate the solution ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Network Support Engineer at Est
Real User
Top 20
Focuses on advanced prevention for traditional endpoints and modern mobile devices
Pros and Cons
  • "Managing the dashboard is straightforward and efficient. I appreciate the convenience of accessing all alerts in one place and find configuring policies to be a simple process. Creating and deploying policies to agents is easily accomplished, and the communication between agents and servers is effectively implemented. These aspects are what I find favorable about Symantec Endpoint Security Enterprise."
  • "I believe an improvement could be made in Symantec Endpoint Security Enterprise by incorporating a URL blocking feature within the same product. Currently, it requires a separate subscription and agent installation, which I think could be more streamlined for unified management from a single agent."

What is our primary use case?

I employ Symantec Endpoint Security Enterprise primarily for safeguarding end devices. We are safeguarding end-user devices with it.

What is most valuable?

Managing the dashboard is straightforward and efficient. I appreciate the convenience of accessing all alerts in one place and find configuring policies to be a simple process. Creating and deploying policies to agents is easily accomplished, and the communication between agents and servers is effectively implemented. These aspects are what I find favorable about Symantec Endpoint Security Enterprise.                 

What needs improvement?

I believe an improvement could be made in Symantec Endpoint Security Enterprise by incorporating a URL blocking feature within the same product. Currently, it requires a separate subscription and agent installation, which I think could be more streamlined for unified management from a single agent.

For how long have I used the solution?

I have used Symantec Endpoint Security Enterprise since 2015.

What do I think about the stability of the solution?

In terms of stability, I would rate it as very stable, around a ten. However, when it comes to stability, I would give it an eight, as occasional issues have been observed, particularly with Windows updates and irregularities with the agent.

What do I think about the scalability of the solution?

It possesses excellent scalability, especially in terms of endpoints. I would rate it 10 out of 10. 

How are customer service and support?

It is good however, there is room for improvement in terms of speed and responsiveness. For instance, with Symantec Endpoint, there may be delays in providing resolutions, possibly due to challenges or lower priority for less critical issues. Although the resolution time is currently around four to five hours, there is still a potential for enhancement.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have experience with support from Symantec and Kaspersky. In comparing them, Sophos has made significant improvements, making it a tough competitor for Symantec, especially for mid-range companies due to its favorable pricing and features.

Regarding Kaspersky, it is not currently in use due to issues arising in 2016.

How was the initial setup?

I find the deployment process quite straightforward and not challenging.Symantec deployment for a hundred users took around two days. The process involved sending out the agent to the GP, which was time-consuming. Policy creation and other tasks took an additional day. Overall, we achieved 100% deployment within two days, which is satisfactory.

What about the implementation team?

In our team, there are five members who handle this work efficiently. 

What's my experience with pricing, setup cost, and licensing?

I would rate it a seven, indicating a satisfactory and moderate level. Despite being somewhat on the expensive side, it aligns with our long-standing relationship with Symantec, and we find it acceptable.

What other advice do I have?

I believe Symantec is an excellent product with a proven track record over the years. There is no doubt in the quality of their service and support and would rate it 9 out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Symantec Endpoint Security Enterprise
March 2024
Learn what your peers think about Symantec Endpoint Security Enterprise. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,924 professionals have used our research since 2012.
Service Systems Engineer at a tech services company with 10,001+ employees
Real User
Great monitoring and reporting features, but lacks proxy routing
Pros and Cons
  • "The monitoring and reporting features are pretty awesome."
  • "We are currently looking at CrowdStrike as a replacement option because on-prem support is going away under Symantec."

How has it helped my organization?

One great thing about the solution is the ability to immediately pull logs from the client or the server and perform diagnostics and analysis on the spot, and very quickly in some cases. That's very useful and helpful because it has allowed us to reduce the time devoted to root cause analysis when it comes to security incidents.

What is most valuable?

The monitoring and reporting features are pretty awesome. They are not as extensive as I would like, but I do appreciate the ability to connect to the backend and query it directly to get information in a format that I would prefer.

Some of the automated features, in terms of firewall set up, Smart DNS and so forth, save you a lot of time because you don't have to create basic firewall entries but everything is covered and secure. 

One of the features gives you the ability to do destination source routing and mix local and remote routing. This allows you to have a very sophisticated set of network rules and throw them up pretty quickly, while keeping them all separate. It's that tie-in integrated with the intrusion prevention tie-in on the firewall side that makes the solution very effective. Network intrusions are a really big threat since we work on a dark network, so the network product is phenomenal.

In terms of the possibility of an outbreak, it really helps being able to lock down a terminal instantly with little advance preparation. There's a feature called location awareness that allows us to immediately switch a terminal into lockdown mode so that it can only communicate with the endpoint protection servers, so nothing can get in or out. We call it bricking. The workstation becomes completely useless from the outside. You can also block off all USB inputs, so nothing can connect to it physically.

What needs improvement?

It would be really awesome to have configurability of the canned reports. Those  things are built in and there are no options for configuration of any kind. It gives you the information that you're looking for, but it also gives you a set amount of information and you can't specify what you want or drill it down to the signal to get past the extra noise that comes through. This means you have to do a lot of analysis on the canned reporting. There's also only one output option and that's CML, which is kind of useless for analysis. You need a spreadsheet option and that's not available. It would be tremendous to have a spreadsheet option because then you could import the report instantly into an Excel template where all of the noise is automatically filtered out and you just have the signal. The way it stands right now, the conversion process is ugly and kind of useless. That's why I resorted to going to the back end and pulling out information that we need for every set up. I've done that for 150 days now because I need specific information.

We are currently looking at CrowdStrike as a replacement option because on-prem support is going away under Symantec. CrowdStrike is also a cloud offering, but it has a proxy option whereby all the traffic routes through our data center so we can throw up all kinds of protections that we need to have in place since all of our stations are on dark networks. The primary determinant for us is the fact that CrowdStrike offers that proxy routing, and we've been asking Symantec for that since before Broadcom came on the scene.

Ever since we went to version 14 we wanted to try to go with the cloud. Just the sonar option, for example, includes all of the reputation look ups, all of the AI, the machine learning capabilities and so forth, and having all of those features would have been awesome, but we couldn't implement it because it required a direct connection to the cloud from the workstation. In our line of work, that's crazy, and we can't do that. 

It's a straightforward networking operation to allow for tunneling through the cloud, as opposed to direct connection to the cloud. That would be my number one feature that I would like to see added. 

For how long have I used the solution?

I've been using the solution since it was called the Norton Antivirus Corporate Edition, so I've seen it through many iterations.

What do I think about the stability of the solution?

The stability of this solution is rock solid.

What do I think about the scalability of the solution?

The solution is absolutely scalable, but there are certain guidelines you have to follow in terms of the number of terminals you have connected to the number of servers that you have, and it's based on how often they communicate. If you want to connect more terminals, you can slow down the communication interval and scale it up. I think it's possible to have many terminals with a small number of servers when you are in a really secure environment. Then the only thing you have to worry about are the outliers, meaning whenever there's a security event, it jumps the chain and goes up immediately. Once your system is set up and you aren't doing a whole lot of changes, you don't need to check in that often, so it's highly scalable.

We have a little over 20,000 people using this solution in our company. 

How are customer service and support?

I would say that their support is adequate for most purposes, but for my purposes, it is not. To get the level of support I need, I use the advanced support package, which is quite costly. The advanced support offers access to the engineers and Dev software guys.

How was the initial setup?

The initial setup is very straightforward and simple. It only became complex when we started to get into the special use cases that we needed to handle, due to the unique circumstances of our high security environment, but we knew upfront that it was going to be difficult.

What about the implementation team?

We handled the implementation in-house. I wasn't involved in the initial deployment, but it took months to set it up here. However, I have deployed it myself several times and it takes no more than a week with a very basic set of business rules. When I deploy it, I set up at least one, or sometimes as many as three, test environments. We have Dev, QA, and UAT, so it's takes about a week to do all of those.

What other advice do I have?

This was a great product at the very beginning and it has only gotten better as they've added capabilities, so I'm a very big fan. I could do a commercial for them. I really do think they're great. It just has the one stumbling block of not allowing for high security, and it's a security product! That's the killer for me; it's a security product, but they stop short when you need the high security capabilities that are right there. This is no-brainer stuff. I could write the code to make it happen in a couple of days. I've even talked with some old Symantec support engineers. A lot of the really good ones abandoned ship when Broadcom took over because they could see the writing on the wall, that it's heading in this oddball direction. It doesn't make sense to me to cut off an avenue that seems potentially very lucrative. Their customer base is security, and Gartner has recommended them so highly for so long, and they're turning their back on that main segment. The fact that they're doing that and there's no flexibility whatsoever is telling me it's time to abandon ship.

Still, I would rate this solution as a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Kulwinder Singh - PeerSpot reviewer
Network Security Associate Manager at Eir evo
Real User
Top 5
Good interface and an easy installation
Pros and Cons
  • "Symantec Endpoint Security Enterprise’s interface is good to use."
  • "Unlike traditional tools, Symantec Endpoint Security Enterprise does not provide trigger alerts based on user behavior-based traffic."

What is our primary use case?

We are only using Symantec Endpoint Security Enterprise for antivirus purposes. We use the solution to scan our machines to ensure that all our machines remain intact from viruses. We are using just the basic functionality of this solution.

What is most valuable?

Symantec Endpoint Security Enterprise’s interface is good to use.

What needs improvement?

Unlike traditional tools, Symantec Endpoint Security Enterprise does not provide trigger alerts based on user behavior-based traffic.

Most organizations panic about the latest threats like ransomware in the IT industry. There should be some special mechanism to find out these threats, and the correlation engine should be very strong to give us complete visibility of what happens. Like other latest products, Symantec Endpoint Security Enterprise must give us end-to-end visibility of what's happening. It should give us some insight into malicious activities and tell us what needs to be done quickly.

For how long have I used the solution?

I have been using Symantec Endpoint Security Enterprise for the past couple of years.

What do I think about the stability of the solution?

Symantec Endpoint Security Enterprise's stability is good.

What do I think about the scalability of the solution?

Symantec Endpoint Security Enterprise is easily scalable. If we need to add more devices, then we need to purchase additional licenses. I use more than 700 machines in my network environment.

How was the initial setup?

Symantec Endpoint Security Enterprise's initial setup is easy. There's not much complication involved in setting up and installing the solution.

What other advice do I have?

We have installed Symantec Endpoint Security Enterprise on a Citrix VDA server.

If someone is starting a business or setting up a new organization, I recommend choosing Symantec Endpoint Security Enterprise.

Overall, I rate Symantec Endpoint Security Enterprise an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Suresh Bora - PeerSpot reviewer
IT Infrastructure Lead at iConnect IT Business Solutions DMCC
Real User
Top 5
A scalable tool that offers protection from attacks and viruses
Pros and Cons
  • "The product's initial setup phase was straightforward."
  • "The scanning area of the product should be made a little faster as it is the only area of concern in the tool where improvements are required."

What is our primary use case?

I use the solution in my company to protect the endpoints of the employees and make sure that they are well-scanned on a timely basis so that protection from attacks, viruses, and other internet attacks can be provided.

What needs improvement?

The scanning area of the product should be made a little faster as it is the only area of concern in the tool where improvements are required.

The product offers its own database. It would be great if Symantec Endpoint Security Enterprise's database could be integrated with the databases from other vendors since it can help provide more visibility to users on the day-to-day or zero-day attacks.

From an improvement perspective, the support offered by the product should be made faster.

For how long have I used the solution?

I have been using Symantec Endpoint Security Enterprise for more than five years.

What do I think about the stability of the solution?

It is a very stable solution. Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

More than 40 people in my company use the product.

The product is extensively used in my company.

My company has plans to increase the number of users of the product. My company also deals with a very good customer base of products, and we deal with a range starting from 100 users to 50,000 users,

How are customer service and support?

I have experience with the solution's technical support. Sometimes, it is difficult to get an engineer to troubleshoot the problems that we face with the product in our company. There are very niche issues related to the product, which the support team takes days to resolve.

I rate the technical support an eight out of ten.

How was the initial setup?

The product's initial setup phase was straightforward.

The solution can be deployed in two or three hours.

The deployment process of the product is straightforward, especially for those who have worked on it for a few months or have a little bit of training related to the solution. The product provides documentation and has a few videos that are available on the internet, which are good enough to help the users deploy the solution in their environment. The product is user-friendly to implement and maintain.

If the product is used on the cloud, then there is no need to follow any deployment process since it is already available on the cloud, but there is a need to download the agent and deploy the tool. For the on-premises version of the product, there is a need to download the software and configure it.

A regular technical engineer should be able to deploy the product.

What about the implementation team?

My company has many system integrators, and so we dealt with the product's installation process with the help of one of our in-house teams.

What's my experience with pricing, setup cost, and licensing?

The product is not very expensive.

What other advice do I have?

The tool has improved our company's endpoint protection, and my company is happy with the security features that the product provides. The reasons in the aforementioned area are why my company has decided to continue with the product to date.

Symantec Endpoint Security Enterprise is used by small businesses as well as enterprise customers for protection. There are many customers who have been using Symantec Endpoint Security Enterprise as their endpoint security solution for years. The tool is also cost-effective, and it does the job of securing the endpoints.

Symantec Endpoint Security Enterprise's important feature for the security posture of my company stems from the fact that the product protects from malware attacks and viruses on a daily basis, especially in areas where the users mainly use USB drives or go to malicious websites and download software products or files. Symantec Endpoint Security Enterprise's antivirus capabilities offer protection to users, as it scans downloaded files or software to see whether they are good files or bad files. Based on the reputation, the tool will delete them or allow them to be downloaded. USBs are blocked in our organization with Symantec Endpoint Security Enterprise, and this is one of the main use cases of the tool. My company has given access only to a few members to be able to use USBs, and it is controlled by a feature known as device control in Symantec Endpoint Security Enterprise.

I rate the product's threat detection and response capabilities an eight out of ten.

The tool is a very well-known and trusted product, and any customer or user can select and use it for internal purposes.

I rate the resource consumption of the tool in our company's infrastructure a ten out of ten.

I rate the overall product a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
PeerSpot user
General Manager at InfoMed Technologies PLC
Reseller
Top 5
Focuses on advanced prevention for traditional endpoints and modern mobile devices and to include attack surface reduction capabilities and detection and response technologies
Pros and Cons
  • "We rely on Symantec Endpoint Security Enterprise to safeguard our computer systems from malware. Occasionally, we have encountered issues related to antivirus or malware, but overall, the application has been instrumental in addressing these concerns."
  • "I don't see any specific areas for improvement. They are knowledgeable about advanced solutions, so no suggestions from my end. Maybe there are minor enhancements, like improving UI features or dashboards, but overall, the product is well-designed. As for additional features, I hope they incorporate Kipops, specifically AI functionality, in the next release of Symantec Endpoint Security Enterprise."

What is our primary use case?

I find Symantec Endpoint Security Enterprise valuable for various reasons. It offers comprehensive protection against malware and network threats, and provides advanced threat protection features. The device protection and network threat prevention aspects are particularly noteworthy.

What is most valuable?

We rely on Symantec Endpoint Security Enterprise to safeguard our computer systems from malware. Occasionally, we have encountered issues related to antivirus or malware, but overall, the application has been instrumental in addressing these concerns.             

What needs improvement?

I don't see any specific areas for improvement. They are knowledgeable about advanced solutions, so no suggestions from my end. Maybe there are minor enhancements, like improving UI features or dashboards, but overall, the product is well-designed. As for additional features, I hope they incorporate Kipops, specifically AI functionality, in the next release of Symantec Endpoint Security Enterprise.

For how long have I used the solution?

I have experience with Symantec Endpoint Security Enterprise.

What do I think about the stability of the solution?

Overall, my impression of the stability of Symantec Endpoint Security Enterprise is very positive, around a seven. It's very stable, and it doesn't impact the workflow negatively. I haven't encountered any significant problems, and the product is designed to be lightweight on user computers, avoiding the need for large installations.

What do I think about the scalability of the solution?

One can purchase licenses based on scalability, depending on the number of devices you have. The starting point is around five licenses, but there's no upper limit. We've never encountered any issues with scalability, continually adding more without reaching a limit. It's a solid ten in terms of scalability.A significant number of our customers, around twelve, are currently using Symantec Endpoint Security Enterprise. They represent a mix of small, medium, and enterprise businesses.

How are customer service and support?

In terms of interaction, they are prompt and supportive during calls, providing effective assistance. 

How would you rate customer service and support?

Positive

How was the initial setup?

It's easy.The deployment time varies based on the number of computers, but on servers, it typically takes around an hour or so. The deployment process involves downloading the Symantec Endpoint Security Enterprise software and installing it. That's essentially all we need to do, and it usually takes about an hour for the process to complete.

What's my experience with pricing, setup cost, and licensing?

It's not the cheapest, but it's reasonably priced, around a five on a scale from one to ten. It's suitable for small, medium, and enterprise businesses and offers competitive pricing. There are no additional costs; it's a renewable purchase, either annually or as needed.

What other advice do I have?

I highly recommend Symantec Endpoint Security Enterprise. Before using it, users need to ensure their hardware meets the minimum requirements specified by the product. Overall, on a scale from one to ten, where one is worse and ten is the best, I would rate this product a solid ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Flag as inappropriate
PeerSpot user
Rodrick Ngwende - PeerSpot reviewer
Presales Enterprise Systems Engineer at Headington Technology Solutions Pvt Ltd
Real User
Top 10
Has good stability and valuable monitoring features
Pros and Cons
  • "It doesn't require an on-premises server to manage it. It allows us to monitor the machine to check if it is up-to-date and not lagging."
  • "There could be a pop-up notification at the users' end whenever the software expires."

What is our primary use case?

Some of our clients don't have on-premise servers within their environment. In this case, the product provides an easier way to deploy antivirus software without the servers. Also, it is quite affordable.

What is most valuable?

The software can be deployed within a hybrid environment. It doesn't require an on-premises server to manage it. It allows us to monitor the machine to check if it is up-to-date and not lagging.

What needs improvement?

There could be a pop-up notification at the users' end whenever the software expires. At the moment, even after it expires, the machine shows it is up-to-date. It becomes challenging to explain to the customers that the licenses need to be renewed.

For how long have I used the solution?

We have been using Symantec Endpoint Security Enterprise for more than ten years. At present, we are using version 14.

What do I think about the stability of the solution?

The product is highly stable. I haven't encountered any stability issues in the past years.

What do I think about the scalability of the solution?

The product is suitable for medium-scale businesses. One of our clients has 90 end-users; the other has 50 and 20 users. I rate the scalability a ten out of ten.

How are customer service and support?

I haven't contacted the product's technical support team directly. We take help from a support vendor, which is quite efficient and helpful.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the initial setup a ten out of ten. The deployment time depends on the internet speed at the client's site, as the installation is cloud-managed.

What's my experience with pricing, setup cost, and licensing?

I rate Symantec Endpoint Security Enterprise's pricing a two out of ten.

What other advice do I have?

I always recommend Symantec Endpoint Security Enterprise to all the customers. It is the best tool. I rate it a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Deployer
Flag as inappropriate
PeerSpot user
Information security engineer at PricewaterhouseCoopers
Real User
Top 20
Offers the ability to craft very specific policies to secure your environment and customize your security functions
Pros and Cons
  • "It is very easy to use. The user interface is friendly."
  • "Symantec's main priority should be enhancing their support, especially local support for different regions."

What is our primary use case?

I've handled a number of cases in my previous company throughout my one-and-a-half years of experience. Mostly, I deal with endpoint policies. For example, clients want to block URLs like Facebook within their organization to prevent employees from using it during working hours. 

I implement policies to block Facebook on laptops, mobile devices, and computer systems. 

Additionally, I've deployed hardware policies to prevent USB usage across an entire organization, stopping anyone from accessing or transmitting data through USB drives.

I work in information security. I'm also involved in vulnerability assessment and penetration testing (VAPT). My duties involve securing the environment as the lead in my department. I handle all aspects of information security, including research and development, and troubleshooting. I'm what you'd call an 'offensive security' person – I conduct penetration testing for clients. So, I work across multiple domains – endpoint security, offensive security, and defensive security. A little bit of everything!

How has it helped my organization?

It's fundamentally an upgraded version of antivirus software, which is a basic necessity for any organization operating in a real-world environment. It helps us overcome real-time threats like APTs (Advanced Persistent Threats). This product comes into play. These products, like Symantec or Kaspersky, are designed to counter real threats.

It's a crucial element these days because cybercrime is constantly increasing. All organizations should deploy at least endpoint security, and ideally solutions like EDR, XDR, intrusion prevention systems, firewalls, and SOC teams as well. But the absolute minimum is robust endpoint security within the network environment.

I've handled multiple problems, including policy configuration, R&D issues, troubleshooting system connectivity to the Endpoint Protection Manager, and so on.

What is most valuable?

Overall, the product is amazing. The best part is the flexibility of the policies. You can craft very specific policies to secure your environment. 

The IPS (Intrusion Prevention System) features are also strong, although I haven't explored them fully. Policies are the standout feature – you can exclude, block, quarantine, delete files... there are numerous options to customize your security with Symantec Endpoint Security.

The integrated firewall feature is impactful. It provides the basics of firewall security, but it won't cover all the advanced scenarios that a dedicated firewall would. 

It provides a basic bunch of security, but if you need comprehensive firewall protection, you'd likely want a specialized firewall solution. On a scale of one to ten, I'd rate the endpoint firewall features as a seven out of ten – good for basic security.

It is very easy to use. The user interface is friendly. If you spend some time with the SEPM (Symantec Endpoint Protection Manager), you can learn it quickly. I was able to learn it within a month or a month and a half; It's all about research and development – the more you work with it, the easier it gets.

What needs improvement?

Symantec's main priority should be enhancing their support, especially local support for different regions.

For how long have I used the solution?

I have been using it for one and a half years. I work on Symantec Endpoint Security Enterprise and Pure Security. 

Additionally, I have some experience with Symantec EDR, but my primary focus is on Symantec Endpoint Security Enterprise and Pure Security. It's a good product from Broadcom, providing excellent endpoint protection services.

What do I think about the stability of the solution?

It's a stable product. Occasionally, there might be issues related to network downtime, but those aren't specific to Symantec Endpoint Security. 

When those issues arise, they're on the network side, not with Broadcom or Symantec.

What do I think about the scalability of the solution?

I'd rate the scalability around seven or seven and a half out of ten. Broadcom provides a good environment for scalability, making management easier, especially if you have the ideal network setup. That's the main reason for my rating.

We have more than 20 clients using Symantec. This includes both SMB (Small and Medium Businesses) and MNC clients.

How are customer service and support?

The customer service and support are decent, but could be better.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Symantec Endpoint Security was the first product I worked with. Since then, I've also gained experience and certifications in Kaspersky Endpoint Security. I have multiple certifications from Broadcom and Symantec, including Endpoint, EDR, SMG (Symantec Messaging Gateway)... It's been a great learning experience.

How was the initial setup?

My experience throughout the Endpoint Security is very good, especially with the deployment.

It's very easy to deploy. Generally, with on-premises solutions, you have to manage the deployment. With the cloud-based Symantec Security, there's nothing to deploy. It's a cloud product that works within the web browser. You just need to download a small Endpoint Security package.

Once deployed, it works easily, and I find it simple to troubleshoot. I learned how to manage it within a month or a month and a half. It's easy to work with, and I'm satisfied with it.

What about the implementation team?

The cloud deployment is simple. You don't need to install anything. It's a portal where users sign in with credentials provided by Broadcom. 

For on-premises deployment, it's different.

On-premises, you have to deploy everything from the start – the server, its configuration, the SEPM (Symantec Endpoint Protection Manager), download packages, and push those packages to all endpoint agents to establish connectivity. It's a bit more complex than the cloud option.

It requires setting up the server, installation, and the other configuration elements.

The deployment time varies depending on the network environment. Sometimes, you can finish within a few hours, or it might take a day and a half or even two days – it really depends. With a strong network, the deployment is faster. A weaker network can cause delays.

What was our ROI?

It's worth the money. With the rise in cybercrime, like APTs (Advanced Persistent Threats), organizations need to find those loopholes and bridge the gaps. Endpoint security is a fundamental layer of protection. It's a worthwhile investment to safeguard your organization's assets, employees, and especially data. As you know, data is incredibly valuable now and in the future. Endpoint security is a crucial baseline of defense, and it's definitely worth it.

What other advice do I have?

I often suggest Symantec Endpoint Security. I've also used Trend Micro, and while it's a good product, I find Symantec's customer support lacking, especially in Pakistan.  

Broadcom, the company behind Symantec, doesn't have a direct presence in Pakistan. This means you'll need to generate tickets and wait for responses, which can be a lengthy process. So, the support aspect can take a long time.

Overall, I would rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Security Enterprise Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2024
Buyer's Guide
Download our free Symantec Endpoint Security Enterprise Report and get advice and tips from experienced pros sharing their opinions.