SEP, the security we all need
December 31, 2019

SEP, the security we all need

Carlos Martinez | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) is being used in our corporation specific areas, such as IT Security and IT Infrastructure and distributed in all workstations as a means of protection. At the moment no commercial problems have been identified with the acquisition of this product, as the service channels have managed to meet the needs.
  • The SEP tool is considered one of our most powerful solutions for the protection of our devices.
  • The centralization of our administration is one of its best exploited benefits.
  • There are some difficulties in devices that do not have enough resources.
  • The end-user cannot gain visibility on what is happening on their device.
  • Cases of infection and intrusion have been completely mitigated.
  • It has managed to completely control the vulnerabilities that users unconsciously entered through external devices.
Our experience with the support provided by the channel that gives us the solution has been effective, with solutions and suggestions toward the good uses that should be given to the tool. Support is permanent and has all the necessary provisions.

Do you think Symantec Endpoint Security delivers good value for the price?

Yes

Are you happy with Symantec Endpoint Security's feature set?

Yes

Did Symantec Endpoint Security live up to sales and marketing promises?

Yes

Did implementation of Symantec Endpoint Security go as expected?

Yes

Would you buy Symantec Endpoint Security again?

Yes

It has given us very good results in controlled environments with equipment that has superior capabilities, and is effective to protect equipment that is exposed in open environments. The support is centralized, allowing dynamic management. The results in low-performance teams often do not have the expected results.

Symantec Endpoint Security Feature Ratings

Anti-Exploit Technology
10
Endpoint Detection and Response (EDR)
9
Centralized Management
10
Hybrid Deployment Support
9
Infection Remediation
10
Vulnerability Management
10
Malware Detection
10