Symantec Endpoint Protection Is the One To Beat
July 01, 2019

Symantec Endpoint Protection Is the One To Beat

Paul Li | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Symantec Endpoint Protection

I personally use Symantec Endpoint Protection on a number of computers. I trust this software to detect and prevent viruses from successfully attacking my Windows based operating system.
  • Symantec Endpoint Protection starts up automatically on its own every time I power on my computer to log into Windows.
  • Symantec Endpoint Protection quietly runs in the background without interrupting my work monitoring all possible forms of attack via my internet connection.
  • When Symantec Endpoint Protection app detects a virus on a web page/site I've logged onto, I would immediately be prompted with a notice of a possible virus attack. The notice will continue to appear on the screen until I've dealt with the problem.
  • When I temporarily disable Symantec Endpoint Protection and I go to re-enable it it takes a bit of time before the program switches to be enabled again.
  • Symantec Endpoint Protection's graphic user interface is rather flat and can use a 3d make-over.
  • Symantec Endpoint Protection greatly provides me with huge time savings from having to reformat my computer every time it gets infected.
  • Symantec Endpoint Protection keeps me from remaining on websites where I can be potentially hacked.
Symantec Endpoint Protection stacks up well against its competitors. It's priced very competitively. It's easy to install. Most important of all it catches viruses and prevents them from attacking one's computer.
Symantec Endpoint Protection is well suited to give especially novice Windows users protection from virus attacks. Since attacks can occur at a click of a button by visiting websites that can infect the end users computer, Symantec Endpoint Protection is the app to use to resolve this issue.

Symantec Endpoint Security Feature Ratings

Anti-Exploit Technology
7
Endpoint Detection and Response (EDR)
8
Centralized Management
Not Rated
Hybrid Deployment Support
Not Rated
Infection Remediation
7
Vulnerability Management
7
Malware Detection
7