Try our new research platform with insights from 80,000+ expert users
Senior Manager Network Design at MEEZA, Managed IT Services Provider
Real User
Top 5Leaderboard
Centralized management, product intelligence and is very easy to deploy
Pros and Cons
  • "Symantec have everything – documentation, videos, data sheets."
  • "When it was directly with Symantec, the technical support was perfect. After Broadcom acquired Symantec, the level of technical support dropped."

What is our primary use case?

The use case is end-user laptop protection.

How has it helped my organization?

Customers can use it to protect endpoints, both laptops on the network and off the network. This is the beauty of the tool. Symantec installs an agent on the laptop itself, ensuring protection even when users are offline.

Moreover, the threat detection capabilities of Symantec have evolved to meet emerging security challenges. Symantec has a huge database of threat intelligence solutions. We receive very regular updates. It seems like they're very consistent. This means once an event happens somewhere (from the web or dark web), it's included immediately in its threat intelligence, and every other user will benefit from this update.

What is most valuable?

It has centralized management, product intelligence, is very easy to deploy, regularly updated with the latest virus and threat definitions, and has very good technical support.

Symantec have everything – documentation, videos, data sheets. That should be on the list of positive things.

What needs improvement?

Symantec could improve the learning resources to make the initial deployment smoother. It could become more popular with training because the initial deployment requires some experience. Sometimes, we don't find the necessary experience. They need to make their model more popular.

Buyer's Guide
Symantec Endpoint Security
July 2025
Learn what your peers think about Symantec Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
864,053 professionals have used our research since 2012.

For how long have I used the solution?

We provide it as a service. For more than five years now, since 2019.

What do I think about the stability of the solution?

Overall, I would rate the stability a ten out of ten. It remains stable once deployed. We never touch the setup again. 

What do I think about the scalability of the solution?

It is very scalable. We once deployed it for a client of 5,000 end users. 

How are customer service and support?

When it was directly with Symantec, the technical support was perfect. After Broadcom acquired Symantec, the level of technical support dropped. It wasn't the same as before.

It could be more responsive. They should go back to having responsive and highly knowledgeable teams. They were almost like that, but after the Broadcom acquisition, there were noticeable changes.

How was the initial setup?

It's very straightforward because it uses centralized management. You don't need a very complex infrastructure.

Depending on the environment, it takes us at least five days and, at most, fifteen days.  

It can be deployed both on cloud and on-premises. 

What was our ROI?

The ROI is very good. Once deployed, you don't need a lot of skilled administrators to manage it. It's alert-based, so if you don't have an alert, you don't need to do anything. You don't need someone monitoring the screen 24/7.

What's my experience with pricing, setup cost, and licensing?

The licensing is okay.  Symantec has a very granular licensing model, so you only buy what you need.

It's similar to other competitors. I don't see them as being higher or lower than others in terms of pricing.

Which other solutions did I evaluate?

There are other options, but we haven't fully evaluated them due to our large deployment. We have more than 5,000 users, so we would need a very good reason to change.

What other advice do I have?

First, define your use cases perfectly. Symantec is a license-based product, and if you don't know exactly what your requirements are, you might purchase unnecessary licenses.

Overall, I would rate the solution a nine out of ten. 

Symantec adds a huge security layer to the company. We can protect any endpoint, on or off the network. If someone's working from a coffee shop, for example, they're still protected. It is a huge feature. This reduces risk and improves the company's security posture.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Jawaria Abbas - PeerSpot reviewer
Security Engineer at a computer software company with 201-500 employees
Real User
Top 5
The solution provides good features like application control and host integrity checks
Pros and Cons
  • "The solution's application control feature is very, very powerful."
  • "Users mostly complain that the solution slows down the system whenever something is scanned."

What is most valuable?

The solution's application control feature is very, very powerful. The solution will automatically check the host integrity and quarantine if something is not compliant.

What needs improvement?

Users mostly complain that the solution slows down the system whenever something is scanned. Sometimes, Symantec gets blocked with legitimate applications, and we add the application in the exceptions. Users always complain that agents, which are very heavy for the system, slow down the PC's performance.

For how long have I used the solution?

I have been using Symantec Endpoint Security for seven years.

What do I think about the scalability of the solution?

Around 1,300 to 1,400 users were using the solution in my previous organization.

How are customer service and support?

I am happy with the solution's technical support team.

How was the initial setup?

The solution’s initial setup is easy.

What other advice do I have?

We started with a very old version and eventually upgraded to RU6. Since we had some Windows 7 clients in our organization, we couldn't upgrade to the next versions, RU7 and RU8, because Windows 7 support is not available in those versions. Meanwhile, we started working on upgrading some systems which have specific applications running on them.

My previous organization compared different products and decided to use Symantec Endpoint Security because it was very good back then. Symantec was the first one to highlight the 2021 cyber threat. Back then, not many people were familiar with the concept of EDR.

After comparing different products, we decided to go with Symantec Endpoint Security because our major concern was application control. We didn't want any user to come, use a USB to copy the data, and leave the organization. Since users don't give us time to upgrade the system, we put the host integrity. If a service pack is not installed on the system, the system will get quarantined.

Overall, I rate Symantec Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Symantec Endpoint Security
July 2025
Learn what your peers think about Symantec Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
864,053 professionals have used our research since 2012.
Muhammad Ejaz ul Hassan - PeerSpot reviewer
CEO at RISE Technologies
Real User
Top 5
Mature, simplified management, and complete protection
Pros and Cons
  • "With a single console, you get control over Mac, Windows, iOS, and Android. This control is most valuable."
  • "If there is a suspicious file, it is put into a sandbox where Symantec does an analysis. After the analysis, Symantec marks the file as a risk, but it doesn't blacklist or block the file. If a file is already known to be harmful, I would like them to automatically block or blacklist it to reduce the damage."

How has it helped my organization?

With its behavior forensic, advanced threat hunting, integrated response, and Threat Hunter capabilities, it provides good control over security and improves the security posture.

Symantec is a known name in the market for endpoint and server security. The baseline of their products would always be the same, and with the evolving threats, they are also changing the technology. For example, with ransomware or zero-day threats, you don't have any already-known bad files. So, you don't have a signature for those files. They need to be identified based on behavior. If any file is misbehaving, Symantec Endpoint Security can handle it. This proactive approach or IPS is a part of it. Another example would be that you download a PDF file, and this PDF file has a built-in script. When you open the PDF file, in the background, the script starts, but nobody knows that. If you install Symantec, it will see the behavior of the file. If any file other than the required file is being executed, it will detect that and protect the system from that. Recently, a bank had a breach. There was an attempt to copy a file, which was blocked. With threat analysis, we could see that the system was protected but the bad guy had already passed through or gotten inside the network. 

Their Threat Hunter team helps out to know what exactly happened and the type of breach. For example, you clicked on a link that copied malware on a system. Your system is infected but nobody knows how many systems are affected after you. The Threat Hunter team is very good and professional. They would check its footprint on every system. If you have a breach in your environment, you have to contact them to find out what exactly is happening.

Nowadays, people bring their own devices. Most of the time, you don't know what's installed on these devices, which is the biggest threat to the environment. Symantec provides protection based on the analysis of your application, its behavior, and the type of data being sent and received. Sometimes, when you connect your mobile to any other wifi, such as free wifi or hotspot, if there is anything malicious, it can stop the traffic.

It allows you to choose the policies that you want to implement. There are around 7,000 SCSC policies, and of course, you are not going to enable all of them. You can choose the policies that you want. 

It has various components that help you at various stages: pre-attack, attack, breach, and post-breach. It reduces the attack surface. There is a component for breach assessment, device control, application control, behavior analysis, and isolation. All these are a part of its attack prevention capabilities. It also protects Active Directory. There is a tool called Active Directory Defense to stop an attacker from taking control of a user. It detects credential theft and stops intrusion, which is something no other vendor is currently providing. It also allows you to auto-manage policies, and IPS and IDS are also already there. 

What is most valuable?

It is a complete and the best solution if your use case is small and you need more productivity and more security. With a single console, you get control over Mac, Windows, iOS, and Android. This control is most valuable. 

It provides complete protection with machine learning, behavior learning, and Global Intelligence Network (GIN). The threat intelligence generated by Symantec’s GIN is now a part of the solution. For any file that they find, they get the reference from GIN, and based on the value of their sensors, they are going to say whether it is a bad file or an okay file. This capability is very important.

What needs improvement?

If there is a suspicious file, it is put into a sandbox where Symantec does an analysis. After the analysis, Symantec marks the file as a risk, but it doesn't blacklist or block the file. If a file is already known to be harmful, I would like them to automatically block or blacklist it to reduce the damage. It will stop the attack by at least 50%. Sometimes, administrators do not see the console on a daily basis, and sometimes, they assume that Symantec will block and delete the file, which is not the case. I would like it to block the file so that you won't be able to open the file. 

Another improvement area is reporting. Its reporting is more technical. As a technical person, it gives me 100% value, but if someone from the business staff wants to see what exactly is going on, you cannot give them these reports, and they won't get the value out of it. Currently, the data is not presentable for any C-level person.

For how long have I used the solution?

I have been using this solution for the last four to five years.

What do I think about the stability of the solution?

They have been a leader for the last couple of years. There is no question about its productivity. It is a good name in the market. Every six and seven months, they are adding a new component or feature. If they see any gap in the product, they fix it. 

How are customer service and support?

Their support is good. I would rate them a seven out of ten. Their response time varies. If your case is assigned to the India side, they take extra time. They will ask you for the log files, and the next day, they will do a remote session. Sometimes, the client gets frustrated because this is a security component, and they want to resolve the issue as soon as possible. If the case is assigned to someone on our side and we get a highly qualified person, they can handle it within a day.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I got a chance to work with other products, such as Carbon Black, Palo Alto, and McAfee. They all are very good products. No product is bad because they are coming after so much R&D. They all are investing their time, money, and people to enhance productivity, but Symantec has been there from the start. The way they design their solutions is very important, and now, they have GIN, which is very important.

I once deployed Cylance in a bank. It had endpoint protection and EDR, and two agents were installed on the system. One was for protection and one was for recording the incident on EDR. It would capture so many files, which Symantec doesn't do, and mark them as harmful or not. Based on what I was told, it decided that based on the virus total. When they get the file hash, in the back end, they would run a script, scan it, and then give a report based on the virus total. They don't do any technical evaluation of file structure or file behavior. I found Java files to be a big problem with that solution. Symantec is comparatively a much more mature solution, and their support is also very good. They provide support for the whole product and not just a component.

How was the initial setup?

It offers flexible management and deployment options. You can install it by watching a video on YouTube, but for the implementation design, expertise is required. For example, if you are implementing it in a big bank where you have 5,000 to 6,000 endpoints and multiple branches, you need to have an implementation strategy and see how to take care of the database, replication, and other things. At that time, your expertise is going to be used for designing the solution.

It takes about 30 minutes to implement the server and the policies. The rest of the things are going to be installed by the agent, which is dependent on the network. In the same building, if you have SCCM or another deployment tool, it is a one-hour job, and it can be done by one person.

In terms of maintenance, you have to take care of your server and download the updates on a regular basis. This is only for Symantec Endpoint Protection Manager (SCPM). If you are a cloud site, you don't need that. Symantec will do it. For on-prem, you need a person to log in and do the updates, and there might also be a little bit of maintenance of the database.

What was our ROI?

You get the ROI within the licensing period. It is also in terms of the reputation of an organization. Especially if you are a financial institution, your environment needs to be secure.  Last year, a bank in Nairobi, Kenya had an issue with the system. When I inspected it, five systems were already breached. I didn't find their cybersecurity team competent enough. So, I told their CIO to buy this product and enable all the policies. They don't need to log in daily. When required, they can log in and get all the information. They are very happy with it. The only issue is that when a file is identified as a risk, it is not blocked.

What's my experience with pricing, setup cost, and licensing?

It is normal. If you are an educational institute, they give you a very good discount. If you are coming from the banking side, they may or may not give you a discount. I'm working with seven companies, and normally, they get a 65% to 70% discount on everything.

There are various components. You have to know what exactly you want. If you are just going to protect your endpoint, you won't buy Symantec Endpoint Security Complete. You would buy the Endpoint Enterprise, which is on the lower side. Symantec Endpoint Security Complete is on the higher side because you can also manage your mobiles and other devices. EDR is also a part of it, whereas, with the enterprise version, you don't get EDR. Overall, the price depends on the number of security components you want.

What other advice do I have?

When evaluating a solution, I would advise seeing the simplicity of deployment and usage. Some products are cheap, but the operational cost is much higher, and they are a lot more complex. 

If your organization is small and you have a constraint on your system administrator or security administrator, then the cloud is the best solution for you. If you are a larger bank and you don't want your data to be on the cloud side because most countries don't allow you to share your data on the cloud side, you can install Symantec Endpoint Protection, which is then connected to a Symantec Endpoint SCSC. It will be a hybrid solution. Some components are going to be managed from on-prem and some components are going to be managed from the cloud. Feature-wise, if you're going to the cloud side, you can leverage EDR. Otherwise, you have to install an EDR server on your data center.

I would rate it a 10 out of 10. It is a wonderful product.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
PedroSoares - PeerSpot reviewer
Senior Security Information Analyst at Modal Bank
Real User
Helps us block ports, like TCP and UDP, and we don't need to use Active Directory GPOs to block anything
Pros and Cons
  • "I like the endpoint detection and response. That's the best feature. I also like the fact that we don't need to use a file on the computer, whereas some anti-malware solutions work with a file on the endpoint. Symantec is a very good option compared to solutions from other vendors."
  • "One suggestion I have for both regular and mobile would be to collect all the information about installed software, such as versions, and give that information to the manager to help with software management. That would be a huge advantage for everyone who administers these tools."

What is our primary use case?

We use it for endpoints, to protect all the workstations in our company. Endpoints are just one layer requiring security in our environment, and we use the solution for anti-malware and for endpoint detection and response.

How has it helped my organization?

The best benefit, of course, is the protection against viruses and phishing attacks. In addition, we are using fewer solutions than before for endpoint protection. Symantec is enough for us.

Symantec is important for our organization. We have confidence in it to protect our workstations. We use it for many different types of protection, such as blocking ports, like TCP and UDP. We don't need to use GPOs from Active Directory to block anything or to use Windows files. It's the only solution that we install on our workstations. If we don't have it on a workstation, that is a cause for concern.

What is most valuable?

I like the endpoint detection and response. That's the best feature. I also like the fact that we don't need to use a file on the computer, whereas some anti-malware solutions work with a file on the endpoint. Symantec is a very good option compared to solutions from other vendors.

And when it comes to attack and breach prevention for mobile endpoint devices, Symantec is good. Until today, we haven't had any cases of malware on our smartphones. I suppose that the solution is protecting all the mobiles that we have in our company.

It's also very good, based on the last test I did, at fully exposing the extent of advanced attacks, especially when attackers use stealthy techniques to evade detection. While there was something that it didn't protect against, that was 10 percent of the test, which is not huge when compared with other anti-malware on the market.

What needs improvement?

One suggestion I have for both regular and mobile would be to collect all the information about installed software, such as versions, and give that information to the manager to help with software management. That would be a huge advantage for everyone who administers these tools.

For example, EDR gives me some applications with a version linked to a CVE or a MITRE attack. That's really interesting, But we don't know about other software that is installed and that means we need to install and use other software on the workstation to collect that information. If Symantec could do that, it would help managers improve their security, as they would know all the software installed on each device.

Because Symantec is already installed on a workstation, it would not be difficult for the agent to collect information about the software installed. It wouldn't need to do anything other than collect and share the information. That would be a huge advantage for the administrator. The more information we have about a device, the more secure we can make it. For example, there are types of software that can open a port that an attacker can use. If we know that such software is installed, we could just act before something happens. If Symantec could collect that software information, it would be amazing.

For how long have I used the solution?

I have been using Symantec Endpoint Security for almost three years.

What do I think about the stability of the solution?

It's very stable. I have never experienced an unstable system with Symantec.

What do I think about the scalability of the solution?

On the cloud, scaling is very easy, of course. But on-premises, we have had some difficulties, although these are the normal difficulties that any on-prem software would have. If I was using any other system on-prem I would also need to be thinking about disaster recovery and backup and load balancing.

We have Symantec deployed on all the company's workstations, on about 1,400 devices. We have also installed it on about 400 Windows Servers. And we are testing it on two Linux servers as a proof of concept, to see if we will install it on all our Linux servers.

How are customer service and support?

We have contacted their technicians to help us with issues. The last one was very good. He tried to help us with different kinds of troubleshooting, as it was very important to find a solution.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have used CrowdStrike, Deep Security from Trend Micro, and Kaspersky. I have also tested Sophos and Check Point Security.

Although in both companies where I have used Symantec it was already there when I started, it has positive evaluations in industry reviews of many anti-malware tools and a good price as well. It provides a good solution at a good price. I expect those are the reasons that these companies chose it.

How was the initial setup?

At this moment, I'm responsible for changing it from the on-premises to the cloud tenant.

We are working with a company, a reseller here in Brazil, that is helping us with some troubleshooting and some of the more complex things. After we tried many scripts, we found one that works really easily. But importing some things to the cloud version is not so good. For example, we exported device control from the on-premises version and imported it to the cloud version and it didn't work. So we will probably need to do it manually. This isn't great for us, because we have many devices and we will need to put them on the cloud one by one. But in general, it's not bad.

In terms of maintenance, on-prem we have to keep an eye on some features because some of our internal vulnerability tests have found that some patches had some CVEs and we had to do some updating. But that was on the management side of the solution that we use to control the devices and agents, not the agent itself. We haven't needed to worry about the maintenance of the agents.

What about the implementation team?

Our experience with our current reseller has been really good. They are good guys with good knowledge of the tools. They have helped us a lot. This reseller is a new one for us. We used another that was very bad, with poor response times.

The new reseller has also helped with the data loss protection solution that we have installed, and with our Web Security Services, which is another software package we use.

What's my experience with pricing, setup cost, and licensing?

The price of Symantec is very good compared to other vendors. I had access to information about pricing when we were renewing. I don't know if the renewal was cheaper than when contracting it the first time, but the renewal price was better than many other vendors' first-time prices.

Which other solutions did I evaluate?

I formed a good impression of Symantec Endpoint Security when we used a penetration tool on it and on other anti-malware solutions as part of a proof of concept. Symantec was one of the best in that penetration test and that was a surprise for me because I thought it would not be that good. But it gave us really good results in the penetration test.

I have used different solutions, but I prefer Symantec's cloud solution when compared with, for example, CrowdStrike.

What other advice do I have?

My advice would be to start using the EDR as soon as possible to have a good view of your environment.

The management functions in the cloud are better than they were in the past with Symantec's on-premises version, which was not good. The management functionality in that version was terrible. Although it was still very good for protection, the management interface was not good. Now, with the tenant in the cloud, it's better than it was.

We just renewed our license for Symantec a month ago, and we are changing our implementation from on-premises to the cloud platform. As part of that process, we will implement the solution's threat defense for Active Directory, but we still don't have it working. So I can't say, at this moment, if Active Directory is already protected against any type of this attack. But we know SES has that feature.

With the EDR solution, it has helped save us time when it comes to responding to threats, but with only the endpoint solution, I can't see that being the case.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Desktop Engineer
Real User
Secures PCs and mobile devices, and alerts you when a site is not trusted or blocked
Pros and Cons
  • "The mobile application is valuable. You are able to see the reports of intrusions and the like on mobile devices. That is one of the coolest aspects."
  • "We communicate with our local partners and they give us the license key. Then, we have to go to the portal and apply it, but sometimes it doesn't work. We then have to create a new administrative account and migrate all our endpoints. That is the only major issue we have been battling with."

What is our primary use case?

I'm an admin in an IT consulting company and we have different companies that use Symantec Endpoint Security Enterprise.

How has it helped my organization?

Symantec provides a lot of security for the end user. For example, if I'm going to a website that is not trusted, Symantec will alert me that it's not trusted or it will even block it. It's endpoint security that always gives you alerts about the dos and don'ts before you even get into danger. Some antiviruses will only alert you once you are in danger. With Symantec, you get the alert before you even click on or visit a dangerous site. The detection processes are very good and they have a good notification process to tell you if whatever you are opening or working on is not good for the PC.

I have the solution on my phone and that makes it quite secure. It blocks all ads and malware. Before Symantec, I used to get a lot of ads, especially if I was doing research on the internet. Since I started using Symantec on my phone, it has blocked all of them. And it is connected to my main account on the PC, so it gives me a combined report on whatever I'm doing and whichever sites I've visited.

For us, as an MSP, Symantec is the best for breach prevention. We have been using it for almost two years now and we haven't had any major attacks or ransomware. We are always protected. Previously, before we got to Symantec, one of our clients was attacked by ransomware, but since we deployed Symantec on all our users' endpoints, we haven't had any issues.

In the long run, it has made the security side of our company more solid. Now, we don't battle with viruses and malware. It has helped with our company's growth. Symantec has given us a great sense of assurance and protection. We know that all the devices and endpoints are well secured and that there won't be any major attacks or any damage to them.

What is most valuable?

The mobile application is valuable. You are able to see the reports of intrusions and the like on mobile devices. That is one of the coolest aspects.

Also, they recently upgraded the solution to provide a graphical interface that gives you an overview of the detections and whatever has been blocked. It gives you a pie chart with a breakdown of whoever is trying to access things.

In addition, it's always running and it doesn't consume a lot of memory, which would slow a PC down.

For how long have I used the solution?

I have been using Symantec for almost two years. I do the admin part of it for Windows and mobile phones, including installations and reports.

What do I think about the stability of the solution?

It's very reliable. It's very steady and doesn't give us issues.

What do I think about the scalability of the solution?

The scalability is also 100 percent. Its ability to grow with the organization is positive. It's something that our company wants to use in the long term.

How are customer service and support?

We have used their technical support a few times because we have had challenges with licensing issues. 

You have to go to the support site and log a ticket. They will assign it to an agent and then the agent will call and assist you with the issue. They have always been helpful whenever we have contacted them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using Trend Micro. We switched to Symantec because the intrusion level is very low and the alerting system is very good. Symantec gives you an alert whenever you are doing something that is not right. You don't even need a techie to tell you not to do this or that.

How was the initial setup?

The setup is very easy, especially when done by email. You just add the end-users information on Symantec and they get an invite via email. Once they get the link they click on it. That downloads the installation file and installs it for them. Our IT team of four people work on it together.

We get the key from a local partner and we apply it on our portal. From there we push the installation files to the users and install them. Then we do the reporting system.

In terms of maintenance, it's mostly cloud-based. Updates are done automatically.

What about the implementation team?

We do it ourselves.

What was our ROI?

We have seen ROI. It has saved us a lot of money.

What's my experience with pricing, setup cost, and licensing?

The pricing is good, very moderate, and the licensing is also good. It gives you more room to install a lot of endpoints and it even gives you the opportunity to install it on your mobile phone without any extra cost.

The one issue we have is that whenever we buy a license, it takes us to a new tenant. We communicate with our local partners and they give us the license key. Then, we have to go to the portal and apply it, but sometimes it doesn't work. We then have to create a new administrative account and migrate all our endpoints. That is the only major issue we have been battling with. Apart from that, it's fine.

Which other solutions did I evaluate?

We already had our eyes set on Symantec because it was something that some of our clients had been using.

I always tell my colleagues in the IT space that Symantec is one of the best antivirus solutions that we have used. Most of our clients, before we approach them, use different solutions so we do a test. We put a virus on their PC to see if their antivirus is able to detect it, and we find that it does not detect that there is a virus or an intrusion on the device. Once we install Symantec, it blocks everything and immediately detects that there is malware or an intrusion on the PC that needs attention.

Symantec is the best when it comes to other antiviruses and endpoint solutions in the global market.

What other advice do I have?

Symantec Endpoint Protection is something I would recommend. It's one of the best.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Desktop Support Engineer at Dixit Infotech Services Pvt Ltd
Reseller
The solution has made our threat response faster and more secure
Pros and Cons
  • "I like the malware threat control policy and USB blocker. In Symantec Manager, we use multiple available features, so we created firewall policies to prevent any malware attack from the network or device controls."
  • "The virus definitions could be updated more frequently."

What is our primary use case?

We use Endpoint Security for security and malware protection. Currently, we have 17 customers using Symantec, and each has different policies. Some customers only use security and malware, but customers use the USB block. The agent controls around 80,000 agents we manage in Symantec Endpoint Protection.

Our customers help to create multiple policies during the implementation. Every day, users request that we revise the content policy. If a customer observes any unusual user access, I modify the policy to lock everything down so users cannot move any documents. It is effective for controlling our security. We are using signature-based protection against viruses, Trojan horses, spyware, and other types of malware. That log is stored locally. We collect it for further analysis.

How has it helped my organization?

Endpoint Security has helped us manage threats and malware. We saw the benefits immediately. It made our threat response faster and more secure. We find the hash value and create an immediate run policy. We send the policy to all machines, so the virus attack values are not allowed to create more damage or progress further.  

In the event of an attack, we immediately call our backend support team, and they give our backend team agents some steps or guidelines. We implemented a procedure throughout our organization to recover affected files. We create the hash value for the affected side to stop the damage and prevent the attack from affecting every machine.

We verify the hash value and signature updates from Symantec and we search for multiple global virus updates. We have articles from Symantec on use cases for reference, and we create a hash value based on that to protect our environment. 

We collect the logs from Symantec Manager weekly, including the malware, IPS, and device control logs. On the basic level, we can do some fine-tuning to ensure Windows and all the security patches are up to date. Then, we have to protect against any files unnecessarily accessing websites. All sites are restricted. Finally, we observe if any endpoints are still receiving malware attacks in the blocked log and locked resources from that particular machine. 

What is most valuable?

I like the malware threat control policy and USB blocker. In Symantec Manager, we use multiple available features, so we created firewall policies to prevent any malware attack from the network or device controls.

The intrusion prevention features allow us to block ransomware according to URL reputation. The latest version is 14.3 RU2, which blocks ransomware attacks by default. We have configured customer notifications for client users when the IPS detects suspicious activities.

What needs improvement?

The virus definitions could be updated more frequently. 

For how long have I used the solution?

We have been using Symantec for five years.

What do I think about the stability of the solution?

Symantec is stable. 

What do I think about the scalability of the solution?

Symantec is scalable. 

How are customer service and support?

Symantec support is excellent.

Which solution did I use previously and why did I switch?

We previously used Trend Micro. We switched to Symantec because it offers better security and prevention. We also get immediate support from the backend team, and data prevention to keep the endpoints safe.

How was the initial setup?

Symantec is easy to set up, and it only takes about 30 minutes for a basic implementation. Once the console is ready, we need to configure the solution per the customer's requests for policies like USB blocking and application restrictions. If the customer doesn't need any custom policies, the default implementation takes 30 minutes to one hour.

What's my experience with pricing, setup cost, and licensing?

The price of Symantec is reasonable compared to other solutions. 

What other advice do I have?

I rate Symantec Endpoint Security a 10 out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Project Manager at Dreams Technology
Real User
Top 20
A stable solution that can be used for endpoint protection, antivirus, firewall, and policy creation
Pros and Cons
  • "The most valuable features of Symantec Endpoint Security are endpoint protection, antivirus, firewall, and policy creation."
  • "The one thing I don't like about Symantec Endpoint Security is the amount of resources it uses."

What is most valuable?

Symantec Endpoint Security is a comprehensive solution that provides all the packages in one product. The most valuable features of Symantec Endpoint Security are endpoint protection, antivirus, firewall, and policy creation.

What needs improvement?

The one thing I don't like about Symantec Endpoint Security is the amount of resources it uses.

For how long have I used the solution?

I have been using Symantec Endpoint Security for ten years.

What do I think about the stability of the solution?

I rate Symantec Endpoint Security an eight out of ten for stability.

What do I think about the scalability of the solution?

More than 500 users are using this solution in our organization.

I rate Symantec Endpoint Security an eight out of ten for scalability.

How was the initial setup?

I rate Symantec Endpoint Security seven to eight out of ten for the ease of its initial setup.

What about the implementation team?

We implemented the solution through an in-house team. Two to three people can deploy Symantec Endpoint Security in a couple of minutes.

What was our ROI?

We have seen a return on investment with Symantec Endpoint Security.

What's my experience with pricing, setup cost, and licensing?

Symantec Endpoint Security is a moderately priced solution. On a scale from one to ten, where one is cheap, and ten is expensive, I rate the solution's pricing a five out of ten.

What other advice do I have?

I am working with the latest version of Symantec Endpoint Security. One person is enough for the solution’s maintenance.

Overall, I rate Symantec Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Director at Tandon Electronics
Reseller
You can manage the antivirus definitions, upgrades, remote scanning, etc., from one console
Pros and Cons
  • "The best thing about Symantec is its ability to control our endpoints from a single point. You can manage the antivirus definitions, upgrades, remote scanning, etc., from one console."
  • "If a machine is infected by ransomware, it's hard to recover the data. We don't have any data on the client, so we're not overly concerned about that. Still, it would be nice to have this feature if there are any future problems."

What is our primary use case?

Our client uses Endpoint Security at a school for antivirus protection. For example, if someone plugs in a USB on a classroom computer, Endpoint Security protects the network from infection. We have around 35 classrooms and eight teachers per class, so that's about 280 people.

The school does not use Endpoint Security to its full potential. The use case is basic. For example, it isn't being used to block stealth techniques. Sophos Firewall handles those kinds of attacks. Active Directory isn't used in the classroom, so the ability to block an AD takeover isn't being used. 

We haven't eliminated any other security solutions by adopting Endpoint Security, but we are trying to consolidate our solutions by installing a new FortiGate firewall and client licenses of FortiClient.

How has it helped my organization?

Endpoint Security provides the school with fundamental protection against viruses and other malware. It only covers traditional endpoints, not mobile devices, but we've never had any outbreaks. 

What is most valuable?

The best thing about Symantec is its ability to control our endpoints from a single point. You can manage the antivirus definitions, upgrades, remote scanning, etc., from one console. 

What needs improvement?

In four years, we had no reason to switch solutions, but lately, we've found that Symantec is slowing down the machines. They are looking to change solutions. I would like to stop the Endpoint Security Client's scan when the device boots. It slows the machine a lot. The scan should only run when the machine is idle. The scan often happens when the machine is at its peak load. 

I would also like Symantec to add ransomware protection. If a machine is infected by ransomware, it's hard to recover the data. We don't have any data on the client, so we're not overly concerned about that. Still, it would be nice to have this feature if there are any future problems. 

For how long have I used the solution?

My client has been using Endpoint Security for two or three years.

What do I think about the stability of the solution?

Endpoint Security is stable. 

What do I think about the scalability of the solution?

Endpoint Security is a scalable tool. 

How are customer service and support?

I rate Symantec support a nine out of ten. I only had to contact them once in ten years, and the support was excellent. They solved the problem in ten minutes.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We're looking at other solutions. We mainly want something that doesn't experience performance degradation during scans or updates. 

How was the initial setup?

I started to work with this client two years after implementation. I have been managing the solution for a year and a half. I provide them with renewals and updates when necessary. It doesn't require much maintenance. I didn't have to visit the premises this year.

What's my experience with pricing, setup cost, and licensing?

The price of Symantec is on the higher end. They face some competition from a company called Quick Heal, which is much cheaper than Endpoint Security. They offer three years of protection at just 900 rupees.

What other advice do I have?

I rate Symantec Endpoint Security an eight out of ten. My first piece of advice is not to deploy Endpoint Security on traditional machines because it'll slow it down. India is a price-sensitive market. Many companies won't pay attention to the speed of a hard drive. They'll only look at the size. They would rather go for a 500 GB hard drive, even if it is not required, rather than a 256 GB SSD. 

If you want to deploy something over and above your operating system's capabilities, you need to have a powerful machine to handle that. Performance is mainly an issue on devices using traditional drives. The performance doesn't deteriorate by more than two percent on an SSD drive, whereas it is more than 15 to 20 percent on an average drive.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Symantec Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.