Easy to use and set up, makes telecommuting much easier
June 13, 2019

Easy to use and set up, makes telecommuting much easier

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Symantec VIP

Symantec VIP is the main tool we use when are trying to access networks or server files on a non-company network. Our company has many web-based platforms for us to access the tools we need, such as the main ecosystem, our timecard system, and our human resource programs. To be able to access these programs, we use Symantec VIP's two-step verification process for added security.
  • The 2-step verification process is easy to use.
  • The app is easy to install and set up with IT.
  • Symantec VIP ensures the right person is accessing the data.
  • The numbers refresh after 10-20 seconds, so it would be nicer to have a longer time frame for people to enter the information.
  • The ability to manually add more devices without the need of IT would be beneficial.
  • Currently, there is a limit of 4-5 per VIP devices. It would be nice to have more for those who have multiple devices for work.
  • It's efficient and easy to use.
  • It's helped prevent strangers from accessing company resources.
  • It's easy to install and has made working remotely much easier to do.
  • Okta Adaptive Multi-Factor Authentication (MFA) and Azure Multi-Factor Authentication (Discontinued)
Symantec VIP is too easy to use for our company. IT sets it up for us and we simply have to request for them to add new devices each time. It is an app and the numbers refresh fairly quickly. Overall, it is a painless integration and simple enough that all the employees can use it without a problem.
Pivotal Tracker, AutoCAD, Condeco Meeting Room Booking
Symantec VIP does its job well, with few flaws. It does what it is supposed to do as a second-step verification process for logins. It adds extra security for our company with more than 10,000 employees, so it keeps us in check in making sure the correct people are actually the ones accessing company resources outside of the network.