135 Reviews and Ratings
45 Reviews and Ratings
I think Kaspersky is well suited for large and small companies. Larger companies can take advantage of the KSC (Kaspersky Security Center) servers to help manage a large network. The KSC has many good features to help monitor the health of the organization. It does a good job with updating and deploying remotely. It has inventory features, and can even deploy non-Kaspersky software packages uploaded to the center. KSC can become a source of good information about [your] network that can be seen at a glance. IT departments are normally smaller than they need to be. KSC helps with larger and smaller companies because of this. A small company would appreciate the amount of information and management that can be done through KSC without needing extra help. If the company is small enough that they don't have servers on-site, there is a cloud version. I have not used that to know how it differs from the local KSC.Incentivized
Email, web browser, and data storage areas will fulfill the security of mobile devices very well. It provides multiple methods of data filtering and classification to ensure important data can be well protected. Unfortunately, it does not support you to make regex-based definitions. for this reason, you need to work on the rules a lot. Another disadvantage is that it cannot monitor Linux systems.Incentivized
The Security Center is laid out very well and makes it easy to install and manage the client endpoint protection on servers and workstations.The way security policies are defined and managed is very easy to understand.The client programs seem to be lighter and smaller on the client systems than others I have used in the past. Using fewer resources is always an advantage.Incentivized
Protection against Data Leakage via the USB channel on endpoints.Protection against Data Leakage via email channel on endpointsProtection against Data Leakage over the Web channel on endpoints.Flexible and configurable for various types of content inspection.Incentivized
The PC imaging tools are difficult to set up and useDevice Encryption tools are getting better, but are difficult to manage.The policies are powerful, but could be broken up. More help can be provided in what the policy element does within the policy setupIncentivized
Policy tweaking and customizations can be very complex and take a lot of effort and time.API integration is difficult and requires specialized support. Finding an experienced professional can be difficult.Incentivized
The product is stable and accurate in detecting security threats. There are very few or no false positives in detecting security threats or unusual behavior and has very sharp heuristics. The product does the job very well including saving us money in getting 3rd party patch management tools as the business is already using Microsoft System Center Configuration Manager which is Microsoft product specific and the product patches these third party products e.g Adobe Flash PlayerIncentivized
The integration with a known solution is not good (Cisco ISE), product (10.x) does not automate remediation, however security is great and detects security threats with accuracy including heuristics, very few or no false positivesIncentivized
I've used the on-premise server. I've only experienced one time that we couldn't open the console, and that was a server issue. It seems to be a dependable solution. It's there, and it's stable.Incentivized
Users don't notice any slowdown with the antivirus running on their systems. There have been issues when the systems have missed a scheduled scan, and it was checked to run at [a] first available time, they will start a full scan at startup. This has caused some lag. Normally there are also some issues with the workstation, but it is something to note.Incentivized
I give the maximum grade because we have no complaints; we never had any failure, serious error, and serious threat to the company. All of its features work very well. The great advantage of having a product supported by an industry-leading security company is that regularly updated security protocols will protect the system against all emerging threats.Incentivized
Symantec DLP works good for our very simple and low complexity use cases and I would highly recommend it for them. However, I can't speak to highly complex or advanced use cases that might arise in certain industries like finance. I would recommend that if you are seeking an Enterprise DLP solution that you absolutely must explore this product as one of the leaders in the space - not doing so would be negligent in my opinion.Incentivized
Make sure to provide awareness campaigns on changes that will be implemented and WHY the business is doing it and the benefits reaped. Benefits reaped is very important for the justification of why things have to change and emphasizing the importance of security. This will reduce user disgruntlement and total bitterness on use of their workstation or laptopIncentivized
Kaspersky is a leader in endpoint protection, but its ties to potential adversaries are unsettling. Kaspersky has a great threat research team and quickly identifies malicious software and its signature. Its web-based protection is also top notch. This is a great product but as with everything has its place.Incentivized
Symantec DLP is the best. Put it in a head to head competition and it will win. However it can be a bit more expensive than other products so don't compare on price, compare on quality of product.
You can create groups and create different policies for each group. You can customize many parts of the software before it is deployed. You can create different tasks and schedules based on the groups. It is customizable.Incentivized
It reduced the incidents of infections and so reduced the efforts needed by the IT department to mitigate problems.It made it difficult to manage the security of our growing mobile user base due to infrequent contact with our on-premise management server.Incentivized
Found data that should have been protected or moved to a different locationHelped us understand what type of data is leaving the environment