4 out of 5.0, Reviewed Aug 11, 2016
Overall satisfy with the product.
look at more advance solutions and move away from more traditional AV.
it does what it says but to memory consuming on end point devices.
high level of memory and CPU.
better due diligent.
I would look at more integrated solutions.
4 out of 5.0, Reviewed Jul 25, 2016
Installing, setting up and configuring their product was pretty much straight forward.
Comparative early research is key.
Straight forward documentation on the multiple ways the product can be installed
No dislikes at the current time
I really didn't notice anything from that perspective, as I said it was pretty much straight forward.
Early research is key.
3 out of 5.0, Reviewed Jul 17, 2016
Product not as flexible as we need, but overall it gets the job done. Just needs more maintenance and babysitting than we would like.
definition updates require quite a bit of babysitting to ensure GUPs (group update providers) get and distribute the updates.
Look more closely at other AV solutions.
4 out of 5.0, Reviewed Jul 14, 2016
Due to the size of the initial deployment with definitions, sites/stores with bandwidth constraints took longer to get up and running. We have to plan for these deployment scenarios differently than sites with a bandwidth pipe that was larger. We are pleased with the product so far and it has detected and removed threats that were resident on workstations/servers.
Perform adequate testing against dummy workstations to ensure that the policy is doing exactly what you expect it to do before moving to production. Once it is in production, it generally is difficult to modify the policy without user/business consent.
It is easy to manage, update and report on various endpoints and run various tasks.
The folder structure for SEP should not have the exact version within the name; it should be generic in nature.
I would pinpoint the sites that have bandwidth constraints and save them for last. For those sites I would work closely with the local support team to deploy the packages differently so it does not take up their whole pipe.
The Symantec KB site is my focal point before I reach out to support. This way I can reference the KB article in the ticket to show I have already tried what they may request I try. This keeps the support case moving along.
We feed the logs into our SIEM via syslog and it was a smooth process just as other syslog sources. This allows us to being all of the logs together from various sources to track events.
5 out of 5.0, Reviewed Jun 15, 2016
Little fallout. Good support. Easy deployment.
Update to current version asap.
Easy to deploy.
Does not stop all malware.
Tell us about known issues.
Quick and effective.
Automated deployment with little fallout.
4 out of 5.0, Reviewed Jun 13, 2016
Experienced issues with some zero-day exploits periodically, however, the toolset is very reliable and user-friendly. Locking down the endpoint configuration is a great feature.
Reliable proven products.
Stronger protection from zero day exploits.
4 out of 5.0, Reviewed Jun 13, 2016
Have not experienced any significant security issues
Test against unknown vulnerabilities to see how the software handles amorphous situations
It is a great gate keeper
Spam mail still gets in...
create a wider sandbox to play in
Incorporate a roadmap with various outcome based scenarios
4 out of 5.0, Reviewed Apr 5, 2016
A comprehensive endpoint protection solution with a strong user community, great on-line resources and good tech support.
Be willing to invest a lot of time upfront learning how to mannage the product.
Sharp learning curve.
4 out of 5.0, Reviewed Mar 10, 2016
Can sometimes not be user intuitive.