Coming October 25: PeerSpot Awards will be announced! Learn more
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 21

What is your primary use case for Symantec Data Center Security?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

PeerSpot user
5 Answers
Cyber Security Technical Engineer at a tech services company with 1-10 employees
Real User
Top 5Leaderboard
15 April 21

We use Symantec Data Center Security for SEP — Symantec Endpoint Protection.

IT Security Specialist at a tech services company with 201-500 employees
Real User
Top 5
22 October 20

Our primary use case of this solution was for checking some program file changes. We are customers of Symantec and I'm an IT security specialist.

Sagar_Shah - PeerSpot reviewer
Project Manager IT at a computer software company with 1,001-5,000 employees
Real User
27 May 20

This product makes up part of our security solution that we offer to customers for use in data centers and remote sites. As many people are now working from home, they use this solution so that they can work remotely to their data centers and still keep operations centralized. They need to work flexibly, not only from a geolocation point of view but geographically.

PratapBirwatkar - PeerSpot reviewer
Group Head - Information Security at a energy/utilities company with 1,001-5,000 employees
Real User
26 January 20

Symantec Data Center Security is part of our overall security solution that includes anti-virus, anti-spam, and anti-malware protection.

Managing Director at a tech services company with 51-200 employees
Real User
16 May 19

We have a public zone that is a mix of intranet and public service. We have to ensure that none of the hosts are compromised and that nothing impacts the integrity of the servers. This is our primary use case. Next, we have to protect data that is stored inside of Docker containers. In developing features, they are outside to an extent, so these have to be brought up in a secured form. This means that we had to create split architectures. Also, we needed something that allowed us to integrate the identity mapping and ensure a certificate-based review. The advantage in the field is that they have a template and a certificate broker. The broker wraps the application around that certificate, which can be put into the firewall security policy. For example, if one of the programmers comes out with a new code review, which is not wrapped on our stack, then I will not allow him to put that into the code. It first has to be checked into the repository, signed, and then put back into the system. The advantage to this is that the integrity of the person who created it, and the person who modifies it, are all approved as part of the audit entry. Because it is worked on by a lot of people, and there are millions of lines of code that are changed using this mechanism, we need to know who made what change. The code review team is integrating, but they have to rely on the integrity of the system. So, the snapshot mechanism and the ability to integrate that along with the Docker capabilities is something that is very important to us. We have also used the Firewall and IPS components, as well as the capability for monitoring the integrity of files.

Related Questions
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
Oct 22, 2020
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
See 2 answers
Sagar_Shah - PeerSpot reviewer
Project Manager IT at a computer software company with 1,001-5,000 employees
27 May 20
Compared to some other solutions, such as CrowdStrike, Symantec is more expensive.
IT Security Specialist at a tech services company with 201-500 employees
22 October 20
As far as I know licensing costs are quite reasonable.
Ariel Lindenfeld - PeerSpot reviewer
Director of Content at PeerSpot (formerly IT Central Station)
Jun 09, 2020
Let the community know what you think. Share your opinions now!
2 out of 4 answers
Principal Systems Engineer at Broadcom Corporation
08 January 20
Identity info security.
Director of Product Management at Unbound Tech
09 February 20
Among various security measures that are important to place an enterprise workload in the cloud I choose to point out on the measure which will be your last barrier between data breach and information leak and assurance that no matter what happens your organization data is safe. I mean the data encryption and the most important part is the keys used to encrypt the data. As long you keep the encryption keys under IT control and at your trusted digital vault outside the cloud your security strategy is aligned.
Download Free Report
Download our free Cloud and Data Center Security Report and find out what your peers are saying about Broadcom, Trend Micro, VMware, and more! Updated: August 2022.
633,184 professionals have used our research since 2012.