Coming October 25: PeerSpot Awards will be announced! Learn more
2020-01-29T11:22:41Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 22

What is your primary use case for Symantec Messaging Gateway?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

7
PeerSpot user
7 Answers
Pedro Chidumo - PeerSpot reviewer
Systems Administrator at a financial services firm with 1,001-5,000 employees
Real User
Top 5Leaderboard
2021-05-13T17:47:35Z
13 May 21

We use it for content filtering and malware protection.

JM
IT Analyst at a healthcare company with 10,001+ employees
Real User
Top 10
2021-04-14T08:11:24Z
14 April 21

We use it as a perimeter gateway where it scans for spam. We use all the features and configure all the features, like malware and content filtering. But most of the requests come for content filtering, where we need filters based on some specific words or subjects or based on the reports that come from government agencies.

Farrukh Dawoodani - PeerSpot reviewer
Technical Consultant & Programme Manager at a tech services company with 51-200 employees
Consultant
Top 10
2020-12-11T06:45:00Z
11 December 20

We use the solution for its advanced virus protection, phishing and other features.

Alex Wu - PeerSpot reviewer
Sr. IT Manager at a pharma/biotech company with 201-500 employees
Real User
2020-09-23T06:10:01Z
23 September 20

We primarily use it as an email gateway for security. We use it for blocking spam.

RS
Senior System Administrator at Pulsar Knowledge Centre Pvt. Ltd.
Real User
2020-08-11T06:17:34Z
11 August 20

We primarily use this solution to encrypt outgoing emails to the recipient. That is why I bought the solution from Symantec Messaging Gateway.

Girish Vijay - PeerSpot reviewer
Deputy Manager IT at Carl Bechem Lubricants India Pvt Ltd
Real User
Top 20
2020-07-26T08:19:05Z
26 July 20

Our primary use case is the protection of email. We are linked to Microsoft Office 365 and all of our emails, inbound or outbound, are processed through Symantec.

Learn what your peers think about Symantec Messaging Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
634,550 professionals have used our research since 2012.
SurajNair - PeerSpot reviewer
Information Technology/ Cyber Security and Data Privacy Consultant at Protiviti
MSP
2020-01-29T11:22:41Z
29 January 20

We are a consulting company and this is one of the solutions that we have implemented for our clients. One of our clients is in the automobile industry and we implemented the entire suite that consisted of email security, network traffic security, and end-user security including the setting of permissions and restrictions. We were managing then entire security landscape for more than 100,000 users.

Related Questions
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
May 13, 2021
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 4 answers
Girish Vijay - PeerSpot reviewer
Deputy Manager IT at Carl Bechem Lubricants India Pvt Ltd
26 July 20
A subscription for technical support costs extra.
Alex Wu - PeerSpot reviewer
Sr. IT Manager at a pharma/biotech company with 201-500 employees
23 September 20
If you would like to enable Symantec's Content Encryption, it's considered an extra feature. You need to buy it separately. I personally just have the anti-spam, antivirus and Premium Content Controller. These features are at no additional cost. New users just need to be aware that certain premium features will need to be purchased.
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
Jul 20, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 6 answers
Girish Vijay - PeerSpot reviewer
Deputy Manager IT at Carl Bechem Lubricants India Pvt Ltd
26 July 20
A subscription for technical support costs extra.
Alex Wu - PeerSpot reviewer
Sr. IT Manager at a pharma/biotech company with 201-500 employees
23 September 20
If you would like to enable Symantec's Content Encryption, it's considered an extra feature. You need to buy it separately. I personally just have the anti-spam, antivirus and Premium Content Controller. These features are at no additional cost. New users just need to be aware that certain premium features will need to be purchased.
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Content at PeerSpot (formerly IT Central Station)
Aug 21, 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote! If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brief voter registration form, review the list of nominees and vote. Get your colleagues to vote, too! ...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Jul 05, 2022
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.  Check them out! Trending See what your peers are discussing at the moment! What were your main pain points during the SIEM product purchase process? What...
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 08, 2022
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
See 1 comment
Stuart Berman - PeerSpot reviewer
CTO at a tech company with 11-50 employees
08 April 22
I agree with many of these observations.  A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.  As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.  Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.  Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
Alex Vakulov - PeerSpot reviewer
Editor at a tech company with 11-50 employees
Sep 28, 2021
Phishing is the starting point of most cyberattacks. When sending malicious messages or creating a clone site, attackers use psychological techniques and social engineering tools, so protecting against such campaigns is not an easy task for information security professionals. To protect against phishing attacks, you can use different tools built into browsers and mail servers, as well as “ov...
Hugh - PeerSpot reviewer
Enterprise Technology Analyst at Journal of Cyber Policy
May 11, 2021
On Saturday, May 8, 2021, major media outlets reported that Colonial Pipeline, whose fuel pipeline network supplies gasoline, jet fuel, and other petroleum necessities to over 50 million Americans, had suffered a ransomware attack and shut down its pipeline as a precaution. The disruption in supply sent gasoline prices rising over the weekend, with financial markets on edge in anticipation of e...
See 1 comment
ceo477927 - PeerSpot reviewer
CEO at a tech vendor with 51-200 employees
11 May 21
These attacks are inevitable and organizations need to plan for fast and secure recovery.  It's no longer necessary to take days or weeks to reimage hundreds or endpoints. Solutions are available that can restore systems to pre-attack condition in minutes.
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Content at PeerSpot (formerly IT Central Station)
Aug 21, 2022
PeerSpot User's Choice Award 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technol...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Jul 05, 2022
Community Spotlight #17
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summ...
Download Free Report
Download our free Symantec Messaging Gateway Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
634,550 professionals have used our research since 2012.