Try our new research platform with insights from 80,000+ expert users
Desktop Support Engineer at Dixit Infotech Services Pvt Ltd
Reseller
Oct 30, 2022
The solution has made our threat response faster and more secure
Pros and Cons
  • "I like the malware threat control policy and USB blocker. In Symantec Manager, we use multiple available features, so we created firewall policies to prevent any malware attack from the network or device controls."
  • "Endpoint Security has helped us manage threats and malware; we saw the benefits immediately, and it made our threat response faster and more secure."
  • "The virus definitions could be updated more frequently."
  • "The virus definitions could be updated more frequently."

What is our primary use case?

We use Endpoint Security for security and malware protection. Currently, we have 17 customers using Symantec, and each has different policies. Some customers only use security and malware, but customers use the USB block. The agent controls around 80,000 agents we manage in Symantec Endpoint Protection.

Our customers help to create multiple policies during the implementation. Every day, users request that we revise the content policy. If a customer observes any unusual user access, I modify the policy to lock everything down so users cannot move any documents. It is effective for controlling our security. We are using signature-based protection against viruses, Trojan horses, spyware, and other types of malware. That log is stored locally. We collect it for further analysis.

How has it helped my organization?

Endpoint Security has helped us manage threats and malware. We saw the benefits immediately. It made our threat response faster and more secure. We find the hash value and create an immediate run policy. We send the policy to all machines, so the virus attack values are not allowed to create more damage or progress further.  

In the event of an attack, we immediately call our backend support team, and they give our backend team agents some steps or guidelines. We implemented a procedure throughout our organization to recover affected files. We create the hash value for the affected side to stop the damage and prevent the attack from affecting every machine.

We verify the hash value and signature updates from Symantec and we search for multiple global virus updates. We have articles from Symantec on use cases for reference, and we create a hash value based on that to protect our environment. 

We collect the logs from Symantec Manager weekly, including the malware, IPS, and device control logs. On the basic level, we can do some fine-tuning to ensure Windows and all the security patches are up to date. Then, we have to protect against any files unnecessarily accessing websites. All sites are restricted. Finally, we observe if any endpoints are still receiving malware attacks in the blocked log and locked resources from that particular machine. 

What is most valuable?

I like the malware threat control policy and USB blocker. In Symantec Manager, we use multiple available features, so we created firewall policies to prevent any malware attack from the network or device controls.

The intrusion prevention features allow us to block ransomware according to URL reputation. The latest version is 14.3 RU2, which blocks ransomware attacks by default. We have configured customer notifications for client users when the IPS detects suspicious activities.

What needs improvement?

The virus definitions could be updated more frequently. 

Buyer's Guide
Symantec Endpoint Security
March 2026
Learn what your peers think about Symantec Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.

For how long have I used the solution?

We have been using Symantec for five years.

What do I think about the stability of the solution?

Symantec is stable. 

What do I think about the scalability of the solution?

Symantec is scalable. 

How are customer service and support?

Symantec support is excellent.

Which solution did I use previously and why did I switch?

We previously used Trend Micro. We switched to Symantec because it offers better security and prevention. We also get immediate support from the backend team, and data prevention to keep the endpoints safe.

How was the initial setup?

Symantec is easy to set up, and it only takes about 30 minutes for a basic implementation. Once the console is ready, we need to configure the solution per the customer's requests for policies like USB blocking and application restrictions. If the customer doesn't need any custom policies, the default implementation takes 30 minutes to one hour.

What's my experience with pricing, setup cost, and licensing?

The price of Symantec is reasonable compared to other solutions. 

What other advice do I have?

I rate Symantec Endpoint Security a 10 out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Saurabh Patel - PeerSpot reviewer
Technical Support Executive at Adit Microsys Pvt Ltd
Real User
Jul 19, 2022
Doesn't utilize lots of resources, provides excellent protection, and is highly scalable
Pros and Cons
  • "We are using it on 1,600 computers. All the systems and servers are protected with the Symantec solution. Our environment has an uptime of 99.9% because we never had any attack or issue related to viruses. There is zero downtime."
  • "Our environment has an uptime of 99.9% because we never had any attack or issue related to viruses."
  • "Its interface needs improvement. Its interface is very old, and it needs a new look. Other solutions, such as Sophos and BitDefender, have a better and more modern interface, whereas Symantec has had the same interface for a while. There has been no enhancement in the interface. They should update and provide a better interface in 2022 for a better user experience for their customers."
  • "Since the Broadcom takeover, we have been facing many issues with support. In the last three years, we have not received proper support from them."

What is our primary use case?

We are using Symantec Security for the server and the client. For the server, we are using Symantec Data Center Security (DCS), and for the client, we are using Symantec Endpoint Security.

We work with all deployment models. We have cloud and on-premises deployments, and we also have hybrid deployments. The cloud provider varies based on the customer, but mostly, our customers have AWS and Azure.

How has it helped my organization?

We are using it on 1,600 computers. All the systems and servers are protected with the Symantec solution. Our environment has an uptime of 99.9% because we never had any attack or issue related to viruses. There is zero downtime.

It works very smoothly. There is no high utilization of the hardware.

What is most valuable?

EDR and ATP features are most valuable.

What needs improvement?

Its interface needs improvement. Its interface is very old, and it needs a new look. Other solutions, such as Sophos and BitDefender, have a better and more modern interface, whereas Symantec has had the same interface for a while. There has been no enhancement in the interface. They should update and provide a better interface in 2022 for a better user experience for their customers.

Currently, Symantec's EDR functionality is expensive, and it is an add-on, whereas other devices have built-in EDR functionality. It would be beneficial for customers if Symantec does the same.

Their support also needs to be improved.

For how long have I used the solution?

I have been using this solution for 11 years.

What do I think about the stability of the solution?

It is average in terms of stability. It works fine, but when we do the upgrades, there are stability issues.

What do I think about the scalability of the solution?

Its scalability is very good. We are able to scale up to 10,000 users, and it is working fine. There are no issues with it. 

We are working with government institutions and corporations in various industries. We are also working with educational institutes. It is being used in all sectors. 

We don't have any plans to increase its usage as of now.

How are customer service and support?

We have been a Symantec partner for a long time. Since the Broadcom takeover, we have been facing many issues with support. In the last three years, we have not received proper support from them. We have had the worst experience with their support. They don’t understand the issue. I explain the problem, and after two or three days, they again come back asking for the log. I would rate them a five out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We didn't use any other solution previously. We have been using only Symantec. It is the best solution for us and our customers.

How was the initial setup?

I'm involved in its implementation from the start to the end, which includes project discussions, deployment, and handover. I work with my colleagues and provide guidance on what to perform, how to perform, and how to configure policies.

The deployment depends on the environment of a customer. Some customers have a small environment with 100 to 200 users. In such a case, the deployment is simple, and there’s no complexity. If a customer has 5,000 to 10,000 users, and they are working from different locations, requiring server configuration at different locations across the world, it gets complex. We have done successful implementation in complex as well as simple scenarios. 

The deployment duration varies based on the number of users. Usually, one to two days are enough. The number of people required for deployment also varies based on the customer environment.

What about the implementation team?

We create a document for implementation, and when we are handling a large implementation with 5,000 users, we deploy the 100 or 200 from our side, and then we guide and train the customer's engineer who takes care of the remaining deployments.

For 5,000 users, 5 to 10 people are enough to handle the deployment and maintenance. They all have different roles. For example, one of them handles the policies, and one of them takes care of the implementation. Similarly, one of them works with the updates. They take care of all the functions.

Which other solutions did I evaluate?

We do evaluate other solutions when a customer asks for a comparison with another solution, such as Sophos. We then need to do a PoC in the customer environment.

What other advice do I have?

I would strongly recommend this product. It is better than all other antivirus products. It is a brilliant product when it comes to functions or features. There is no doubt about its antivirus capability. It is far better than other products, but they need to focus on its UI.

Overall, it is a very good product. I would rate it an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Symantec Endpoint Security
March 2026
Learn what your peers think about Symantec Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.
Senior IT Security Officer at Lion International Bank
Real User
Jul 19, 2022
Lightweight, requires little maintenance, and scans for malware proactively
Pros and Cons
  • "The application and device control functionality is good. We are able to see which applications are installed using the product management dashboard."
  • "Once it is configured correctly, there is little chance of it failing, which means that we have more of our technical staff available to work on other problems that occur."
  • "It would be helpful if this product provided patch management functionality."
  • "Compared to Kaspersky, the reporting features are not rich."

What is our primary use case?

My primary use case is malware protection. I also use it for device control, application control, and more. We are a financial institution.

How has it helped my organization?

The stability of this product has improved the way our organization functions. There is little maintenance, and it doesn't take long to install or uninstall. Once it is configured correctly, there is little chance of it failing.

This means that we have more of our technical staff available to work on other problems that occur.

What is most valuable?

The most valuable feature is the proactive malware scanning capability.

When you are performing simple tasks, it is not as demanding on resources as compared to other security products. This is an aspect that I like.

The application and device control functionality is good. We are able to see which applications are installed using the product management dashboard. This gives us the ability to monitor workstations, including which applications they have in which tabs.

There are extensions available, such as the Browser extension, to deal with specific types of attacks. This helps to protect against hackers. I have tested it with samples and it protects the system well.

The interface is simple to use.

What needs improvement?

One issue that comes to mind is that there is no way of specifying categories that the firewall should block. It is able to block specific URLs but other solutions, such as Kaspersky, allow you to block access by specifying a category.

It would be helpful if this product provided patch management functionality.

Compared to Kaspersky, the reporting features are not rich. Overall, the reporting capability needs to be improved.

For how long have I used the solution?

I have been working with Symantec Endpoint Security for between 12 and 18 months.

What do I think about the stability of the solution?

This is a very stable product. It is the feature that I like most about the product because when we were using other ones, we had failures. With this solution, there is no frequent failure of the components.

For example, in other products that we've used, the virus definitions didn't update and systems were compromised because of it.

What do I think about the scalability of the solution?

We have approximately 3,000 users that are protected by this solution. We add branches and more computers weekly, and we don't have problems doing so.

We were able to easily integrate with Active Directory using the Symantec Manager, so I would say it's very scalable.

As we add more branches, our usage of the product will continue to increase.

How are customer service and support?

We have not been in direct contact with Symantec technical support.

The training and documentation that they provide are helpful. There is a good amount of documentation that helped to provide us with a complete picture of the product. It's nice, neat, and easy to understand.

Which solution did I use previously and why did I switch?

Prior to Symantec, we used a solution by Kaspersky.

We use other anti-virus products and this one is less resource intensive and more stable than the others. It is also simpler to use.

Symantec Web Security Service (WSS) has some good features that I wish were in this product. Unfortunately, it is another subscription.

How was the initial setup?

It does not take long to install this solution.

Unfortunately, the order that we followed was not recommended. We just deployed and then obtained subscriptions after that. This is not a recommended approach for deployment. However, we have a good partner and a good support team.

Due to our limited bandwidth, we had to install manually rather than use the web-based deployment. This meant that it took us longer because we had to visit each of the physical workstations. In total, it took approximately two months to deploy.

What about the implementation team?

We deployed the solution ourselves. There were seven or eight people io the team and different staff members were given different duties. All of them are system administrators.

We have three people that handle the maintenance. They monitor the dashboard for possible compromises, and our specialists have to use the device protection and application controls.

There are also tasks related to reporting issues that arise during monitoring, including those concerning possible attacks or infections. One of the managers in our IT staff is responsible for updating the definitions that we get from Symantec.

There was an incident where we had problems with a password and we had difficulty recovering it. We contacted our local partner and I think they contacted Symantec. After that, we recovered the password. That was the only maintenance-related problem that we had.

What's my experience with pricing, setup cost, and licensing?

The pricing was one of the factors that led us to choose this product.

That said, I was not the decision maker. I simply proposed it to our manager.

Which other solutions did I evaluate?

When our subscription to Kaspersky ended, we were tasked with comparing features between different solutions. The three options we considered were Symantec, Kaspersky, and Sophos.

One of the things that we liked about Symantec is the low resource utilization. I am not the person who completed the analysis but I know that the fact it is lightweight was one factor.

We liked the functionality that Sophos provided but the deployment scenario functionality was not useful for the workstations in our environment. It involved deploying the dashboard to workstations in the cloud, which is not our preferred approach.

Kaspersky has richer reporting capabilities. This is an area that could be enhanced in our Symantec solution.

What other advice do I have?

We deployed the product one and a half years ago, and we received training to configure and maintain it. It was recommended that we complete our training in terms of policies, which is something that we also did. Once that was finished, we experienced the stability and good features that the product provides.

This is a product that I have recommended for use in another company. I have been told that after they adopted it, they were pleased with the fact it consumes fewer resources than their previous solutions. They manage it from the cloud.

Currently, I am referring another company to this product and my understanding is that they're going to implement it.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Nicolo De Jesus - PeerSpot reviewer
Security Operations Manager at a energy/utilities company with 1,001-5,000 employees
Real User
Jul 18, 2022
It's a feature-rich solution with behavioral analysis, but the support could be faster and more specialized
Pros and Cons
  • "Symantec's detection capabilities are strong. It involves run protection and behavioral analysis."
  • "From the moment we deployed Symantec, we haven't had any incidents coming from an endpoint."
  • "We had an issue with the Broadcom migration. We had some problems with product support, and the deployment is tricky because it's an on-premises technology. Deploying any on-premises security solution is hard because you have to distribute the software."
  • "We have encountered some major bugs, which cause DSOD on all our machines during updates."

What is our primary use case?

Symantec provides an anti-malware solution for our infrastructure, including a host firewall, behavioral analysis, and intrusion prevention. It's an essential compliance component of an enterprise.

We have domestic and offshore branch offices, data centers, and headquarters. We initially deployed it to 2,500 workstations and eventually expanded to 3,500.

How has it helped my organization?

Symantec detects malicious software in our environment and provides intrusion prevention. We see the benefits immediately after deployment. Our whole platform benefited from Endpoint Security.

What is most valuable?

Symantec's detection capabilities are strong. It involves run protection and behavioral analysis.

What needs improvement?

We had an issue with the Broadcom migration. We had some problems with product support, and the deployment is tricky because it's an on-premises technology. Deploying any on-premises security solution is hard because you have to distribute the software. 

There are also some issues with false positives and minor product issues in terms of usability. It comes back to the support team. If we have product issues, then it should be relatively easy for them to resolve the matter. 

For how long have I used the solution?

We started using Symantec in 2015 or early 2016. We still use the solution, but we plan to decommission it by the year's end.

What do I think about the stability of the solution?

Symantec is relatively stable, but it's an on-premises solution, so we need to spend more time on version upgrades and patches. We have encountered some major bugs, which cause DSOD on all our machines during updates.

What do I think about the scalability of the solution?

We haven't tried scaling up because we maintain a stable number of users, but it's fairly easy to add some users to Symantec. It's just like migration.

How are customer service and support?

I rate Symantec support six out of ten. They need more specialized support engineers with advanced knowledge of Endpoint Security. We have several people with experience using the product, so we know the basics already. Also, the resolution speed isn't acceptable.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We used McAfee VirusScan Enterprise in the past. We transferred to Symantec primarily because our team has prior experience with Symantec. We also considered its Gartner rating. I believe Symantec is in the first or second spot in the endpoint protection category.

How was the initial setup?

We did the deployment and testing ourselves. The deployment wasn't as easy as we would like. The environment and network are complex. That's why we need to consider different types of deployment. We use our software configuration management and also some standalone solutions. We sometimes use DMZ for manual installation. Those were the pain points of the deployment. It's not one source of deployment that we use differently.

It took around three months to completely deploy Symantec and replace McAfee.
Our deployment team was a combination of IT and security operations. A few asset owners were included, as well. After deployment, maintenance is minimal. 

What was our ROI?

I don't have any data on ROI, but we get what we need. From the moment we deployed Symantec, we haven't had any incidents coming from an endpoint.

What's my experience with pricing, setup cost, and licensing?

I was not involved in the negotiations, but I believe the price was within the range we expect for endpoint protection.

Which other solutions did I evaluate?

We also considered Trend Micro and Carbon Black. Symantec's sales team won by lowering the price and adding some features in the package like web security services and Symantec EDR.

What other advice do I have?

I rate Symantec Endpoint Security seven out of ten. I would recommend this product for securing endpoints. Hopefully, their support will improve. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Project Manager at Dreams Technology
Real User
Nov 29, 2023
A stable solution that can be used for endpoint protection, antivirus, firewall, and policy creation
Pros and Cons
  • "The most valuable features of Symantec Endpoint Security are endpoint protection, antivirus, firewall, and policy creation."
  • "The one thing I don't like about Symantec Endpoint Security is the amount of resources it uses."

What is most valuable?

Symantec Endpoint Security is a comprehensive solution that provides all the packages in one product. The most valuable features of Symantec Endpoint Security are endpoint protection, antivirus, firewall, and policy creation.

What needs improvement?

The one thing I don't like about Symantec Endpoint Security is the amount of resources it uses.

For how long have I used the solution?

I have been using Symantec Endpoint Security for ten years.

What do I think about the stability of the solution?

I rate Symantec Endpoint Security an eight out of ten for stability.

What do I think about the scalability of the solution?

More than 500 users are using this solution in our organization.

I rate Symantec Endpoint Security an eight out of ten for scalability.

How was the initial setup?

I rate Symantec Endpoint Security seven to eight out of ten for the ease of its initial setup.

What about the implementation team?

We implemented the solution through an in-house team. Two to three people can deploy Symantec Endpoint Security in a couple of minutes.

What was our ROI?

We have seen a return on investment with Symantec Endpoint Security.

What's my experience with pricing, setup cost, and licensing?

Symantec Endpoint Security is a moderately priced solution. On a scale from one to ten, where one is cheap, and ten is expensive, I rate the solution's pricing a five out of ten.

What other advice do I have?

I am working with the latest version of Symantec Endpoint Security. One person is enough for the solution’s maintenance.

Overall, I rate Symantec Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Information Technology Specialist at Wonderla Holidays Ltd
Real User
Aug 24, 2022
With a single product, it gives us a big picture of our response and remediation processes
Pros and Cons
  • "If there is exposure, we need to investigate the source of the attack, e.g., whether it came from the network or externally. We view the firewall logs, and if there has been exposure, then we use the Application Isolation feature. When there is an attack with on-prem, that system will go into isolation mode, removing connectivity to other internal systems. We also restrict the WLAN part to avoid that system broadcasting to other networks."
  • "Protecting the company data is key. This solution gives a clearer picture of your endpoint, security, and network."
  • "The device can be outdated. More enhancement of network and discovery would help already great features."
  • "The device can be outdated."

What is our primary use case?

We use it to secure our endpoint, especially with employees working from home.

Our company provides amusement park guest hospitality. This solution helps us with our daily operations, managing the amount of traffic in the network coming from the Internet as well as application updates and passwords. 

How has it helped my organization?

It lets us control users and their actions when browsing.

Every month, we do an analysis. This allows our systems to be the most effective with all the changes that need to be done. It gives us a dashboard where we can view four or five key components, like malware protection, exploit protection, network intrusion, behavior analysis, and additions to the firewall. We also do daily, weekly, or monthly analyses based on events. This helps us have a clearer picture of our organization, what is wrong with a security event, and where you need to really focus to prioritize events. For example, if you have a network intrusion on the firewall, this gives a detailed view of your network where you can focus on the right solution, and prioritizing events.

We are using the solution to mitigate security breaches. We are constantly monitoring the endpoint interface dashboard. If there is a breach, it gets isolated. We see those on the report and event logs. We then apply the Application Control feature to take remedial actions.

If there is exposure, we need to investigate the source of the attack, e.g., whether it came from the network or externally. We view the firewall logs, and if there has been exposure, then we use the Application Isolation feature. When there is an attack with on-prem, that system will go into isolation mode, removing connectivity to other internal systems. We also restrict the WLAN part to avoid that system broadcasting to other networks.

It gives us a big picture of our response and remediation processes with one product, which is very good.

What is most valuable?

The detection and response are quite good. We have a few templated policies that we have created for our entire organization. We have added groups to ensure that if an attack or breach happens, then it can be isolated from our network.

We use Application Control, Application Isolation, Web Traffic Redirection (WTR), and Network Integrity. These ensure that traffic is flowing. 

What needs improvement?

The device can be outdated. More enhancement of network and discovery would help already great features.

For how long have I used the solution?

The company has been using it for almost five years.

What do I think about the stability of the solution?

We haven't had any issues when updating it.

What do I think about the scalability of the solution?

The scalability meets our company's requirements of on-prem and cloud. Therefore, I would rate its scalability as nine out of 10.

How are customer service and support?

We have not yet used the Threat Hunter Team.

I would rate the technical support as nine out of 10. Most things are resolved within a day. Some things have taken a week because they needed to assess the system and what went wrong. Critical assessment of root causes takes about two to three days.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have around four to five applications. For example, we are using Oracle Fusion Middleware and ERP in-house for our operations. 

We have also used Sophos, where it took a little time to put policies in place. It is quite complicated and not that user-friendly. We had a bad experience with them.

Symantec Endpoint Security is better because it has other features, like Application Control and Application Isolation, that can be utilized. It gives us complete control of the endpoint, so we can customize our workflow to control security.

What about the implementation team?

We have used Symantec Professional Services for updates and helping to get services properly installed.

What was our ROI?

Protecting the company data is key. This solution gives a clearer picture of your endpoint, security, and network. These three things are very important for us, which is why using Symantec Endpoint Security is a win-win for us. 

Our detection and response times are very high. Whenever something happens, such as an attack, we are immediately prioritizing it via the dashboard. 

Which other solutions did I evaluate?

When we go for a product review, we normally do a PoC to understand how the application will scale our innovation before adding it into our pipeline. 

Other solutions have the detection and response feature.

What other advice do I have?

We are currently doing an assessment for VPN parameters, making it more secure. We are checking out that enhancement right now.

We have not integrated our Active Directory (AD) with this solution. We are still evaluating this. Our AD is currently not centralized. Once it is centralized, we will connect it to Endpoint Security.

We do a PoC whenever a new feature is released. They provide training, which helps us to be on the same page.

I would rate them as 10 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
PeerSpot user
Cyber Security Manager at a tech services company with 10,001+ employees
Real User
Jul 19, 2022
Provides good control over external devices, and has good reliability, dashboard view, and reporting
Pros and Cons
  • "The dashboard view and reporting are valuable. It is stable and easy to integrate, and it provides custom options."
  • "Our clients have certainly seen an ROI; they have been using the solution for a long time and they don't want to switch from one solution to another, and that's why we recommend the most stable ones to them."
  • "Nowadays, threats are changing, and they are moving more towards script control and zero-day attacks. So, we would like to have more control similar to an EDR solution. Symantec Endpoint Protection has certainly come a long way as a traditional antivirus, but because the threats are changing, we would like to have more EDR features so that we have a detailed view of the source from where the infection entered the environment and whether it has tried to connect any other endpoint. It should provide such a detailed view for investigation. It should protect against zero-day threats, etc. These are the key enhancements that can make it a complete solution for any enterprise. Currently, we have seen organizations going for two solutions: antivirus and EDR. With both these capabilities, it would be a complete package."
  • "Nowadays, threats are changing, and they are moving more towards script control and zero-day attacks, so we would like to have more control similar to an EDR solution."

What is our primary use case?

We have used Symantec for several scenarios depending on a client's requirements. We have used the Symantec solution for host integrity, device control, and communication policies. It has the host integration part where we get the custom option to add certain scripts.

Most of the clients have been using it on-prem, but we are now looking into the cloud or SaaS environment because it would be much easier to manage the infrastructure. Our clients have Amazon AWS and Microsoft Azure.

How has it helped my organization?

Policies are very important and valuable for us. We have to ensure the security of the client environment. We have to ensure that there is no tampering, and restrictions are applied to the devices when one uses third-party devices such as storage and pen drives. It has the flexibility to integrate with other devices.

It is helpful in identifying the rogue devices in the environment where we don't have any agents deployed. We can identify them through Symantec. We have also heard that with cloud Symantec, we can do remote deployment through the console itself.

What is most valuable?

The dashboard view and reporting are valuable. It is stable and easy to integrate, and it provides custom options.

The agent is lightweight, and the response to the known infections with regular updates from Symantec is also valuable.

What needs improvement?

Nowadays, threats are changing, and they are moving more towards script control and zero-day attacks. So, we would like to have more control similar to an EDR solution. Symantec Endpoint Protection has certainly come a long way as a traditional antivirus, but because the threats are changing, we would like to have more EDR features so that we have a detailed view of the source from where the infection entered the environment and whether it has tried to connect any other endpoint. It should provide such a detailed view for investigation. It should protect against zero-day threats, etc. These are the key enhancements that can make it a complete solution for any enterprise. Currently, we have seen organizations going for two solutions: antivirus and EDR. With both these capabilities, it would be a complete package.

For how long have I used the solution?

I have been supporting various clients for six to seven years.

What do I think about the stability of the solution?

It is stable, and that's why I recommend Symantec, especially when it comes to the server environment.

We follow the N-1 process. Whenever there is a new version, we don't upgrade immediately because there can be potential risks. We upgrade to a new version immediately only if we get the recommendation from the vendor or they have fixed any vulnerability or issue that was reported. Otherwise, we follow the N-1 version approach for upgrades.

What do I think about the scalability of the solution?

I have not seen any challenges with the scalability of the solution. I have worked with multiple clients. One of our clients has about 30,000 end users. They are located in eight to nine countries and have about 15 different remote locations.

We have plans to increase the usage of the product, but it all comes down to client requirements. It depends on their environment, its size, and how we want to further enhance that.

How are customer service and support?

Generally, we get a response, and it works, but we have seen some delays or very generic responses. If there is a quarantined file and we need information about what kind of data is there in that file, it takes a lot of time. We sometimes have to escalate to the next level for getting a proper and timely response because it's our client's data that is in quarantine. I would rate them an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have worked with multiple solutions, such as McAfee, Cortex, and CrowdStrike. McAfee has several components, and if any component stops, it impacts the compliance status and puts everything at risk because the definition will not be distributed. Symantec has an edge there because it does not have too many components. Only with the GUP server, we can distribute the definition in remote locations, which makes it easier. It also provides a view of all the GUP servers in the console.

EDR is a different solution. It provides complete visibility and footprint of zero-day and other threats based on the behavior. Symantec also provides that, but it needs more enhancement on the investigation part.

How was the initial setup?

Based on what I have seen and the feedback I have received, its deployment is straightforward. It takes almost a week because it goes through various stages, such as planning, designing, and deployment. It also depends on a client's environment.

The implementation strategy varies, and it depends on a client's environment, such as whether they are a huge organization or whether they have multiple remote locations.

After the deployment, the next stage is doing the configuration, which takes a little while because it involves engaging different departments of a client and doing segregation and restructuring.

It doesn't take more than four to six months for the technology to mature in the client environment. Immediately after deployment, we start making changes to tune the policies based on a client's requirements and define the exceptions. It takes four to six months to have a stable environment.

What about the implementation team?

We have a separate team that does the deployment, but I do share some recommendations depending upon the client environment. After the deployment, that team hands it over to my team for operations, and then we make the changes. So, they do the basic deployment, and we then take over and make the solution mature.

Generally, its deployment does not require more than two people. At the initial stage, they collect and gather information from various sources and proceed with the deployment, and then it takes some time to do the configuration. So, two people are good enough for initial deployment, but when it comes to rolling out the agent to the entire landscape, it takes time. You have to engage various people from different departments. The people involved in its deployment and configuration are administrators and engineers.

It usually doesn’t require much maintenance. We do our regular health checks to see whether the definitions are getting updated or not and whether their replications are working or not. Its maintenance is a one-man job, but the operational activities of the organization generally require two to three people, but the number can vary based on the size of the environment.

What was our ROI?

Our clients have certainly seen an ROI. They have been using the solution for a long time. They don't want to switch from one solution to another, and that's why we recommend the most stable ones to them.

What's my experience with pricing, setup cost, and licensing?

Pricing is handled by a separate team. Whenever a new client asks for a recommendation, we provide it, but they deal directly with Symantec or other vendors for the pricing.

What other advice do I have?

You should first understand a client's environment in terms of:

  • What does the client environment look like?
  • What is the size of the environment?
  • What are the features they are looking for?
  • What is the criticality of their environment?

All these aspects are important. At times, we have seen that clients just ask for the best solution, but they don't have a vision of what would make a solution best for them and what are they expecting from it. They should summarize their requirements, and accordingly, you can propose how Symantec can meet their requirements.

Overall, I would rate it a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Arvind Tiwari - PeerSpot reviewer
Deputy General Manager at CMS
Real User
Jul 19, 2022
Helpful for preventing global threats, easy to deploy, and reliable
Pros and Cons
  • "All Symantec Endpoint Protection (SEP) features, such as anti-malware, zero-day attack protection, and IPS features, are valuable."
  • "It has helped me in providing authentication mechanisms, restricting devices, and blocking global threats."
  • "It should support the next-generation IPS. Currently, it supports only IPS."
  • "Zero-day threat and device management or device control can be better."

What is our primary use case?

It is used for detecting and blocking web attacks. 

How has it helped my organization?

It has helped me in providing authentication mechanisms, restricting devices, and blocking global threats. There is about 10% to 15% improvement.

What is most valuable?

All Symantec Endpoint Protection (SEP) features, such as anti-malware, zero-day attack protection, and IPS features, are valuable.

What needs improvement?

Zero-day threat and device management or device control can be better. The patch implementation or patch management can also be better because sometimes, they are issuing or deploying patches in old versions.

It should support the next-generation IPS. Currently, it supports only IPS.

For how long have I used the solution?

I have been using this solution since 2010.

What do I think about the stability of the solution?

We haven't had any issues with SEP. We have been using it for quite a long time, and it has been stable. It is reliable. We are getting upgrade patches. 

We are also using other Symantec solutions, such as Blue Coat, and we have had issues with them but not with SEP.

What do I think about the scalability of the solution?

It can be scaled up with EDR and XDR extensions. We have deployed it at multiple locations, and we have plans to increase its usage.

How are customer service and support?

Their technical support is fine. I didn't find any issues with that. I would rate them a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to use Trend Micro Quick Scan. I switched because we were getting some attacks, and Trend Micro was not able to detect them.

How was the initial setup?

It was straightforward. We had around 500 systems, and it took about a week. About three to four people were involved in its deployment. Their roles were engineer, team lead, and admin.

What about the implementation team?

We had a consultant from Symantec for its implementation. In terms of maintenance, it doesn’t require that much maintenance, but it requires patch updates on a regular basis. I take care of its maintenance.

What's my experience with pricing, setup cost, and licensing?

The pricing is as per the environment. If all the features are there, there will be a cost for them. There were no additional costs for me. Support and other things were included in the pricing.

Which other solutions did I evaluate?

We did a PoC of McAfee, Trend Micro, and other solutions in our environment. Symantec was better. So, we went for it.

What other advice do I have?

I would advise using all of its features, such as IPS. These features are very good. I'm using a lot of solutions from Symantec. I am using SEP, and I am also using Blue Coat devices. They provided us with the entire solution design.

I would rate Symantec Endpoint Security a nine out of ten. It is a nice product.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Symantec Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.