Symantec Email Security.cloud on the highest level possible
February 13, 2020

Symantec Email Security.cloud on the highest level possible

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Symantec Email Security.cloud

We have been using this Symantec Email Security.cloud solution for a years, and we have never thought of changing it. It has been delivering consistently perfect service and security to us.
When it comes to the email service- stability is a critical part, and we have rarely seen an issue caused by this service.
Also, the security part is excellent, as our 500+ users have not seen emails in their mailboxes for years.
So we are pleased with the solution and will stay as a happy customer in the future.
  • Filters spam and malware on the highest possible level
  • Provides stable service
  • If other customers get banned by some third party spam filter, you might be hit as you use shared servers/IPs.
  • User support not always get your point from the first time.
  • It has secured our email channel for a years.
  • The costs are affordable.
In very tricky cases, it takes time to explain it to the support personnel as they don't get your problem from the first couple of emails.

Do you think Symantec Email Security.cloud delivers good value for the price?

Yes

Are you happy with Symantec Email Security.cloud's feature set?

Yes

Did Symantec Email Security.cloud live up to sales and marketing promises?

Yes

Did implementation of Symantec Email Security.cloud go as expected?

Yes

Would you buy Symantec Email Security.cloud again?

Yes

If you don't want to have any spam or malware in your mailbox, Symantec Email Security.cloud is the solution to choose. Also, if you need to have some security features, like DLP, it has them embedded!
We have also been using reporting a lot to see how many emails have been sent, where they delivered, and so on.

Symantec Email Security.cloud Feature Ratings

Anti-malware
10
Customizability
10
Data Loss Protection
9
Threat Detection
10
End-to-End Encryption
10
Management Tools
10