"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. You just have to open it. If you can do that in a secure sandbox environment, that's an invaluable feature. What you would do otherwise would be very risky and tedious."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The solution's integration capabilities are excellent. It's one of the best features."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"The most valuable feature of this solution is the protection itself, which works well for us."
"The potential threat protection feature is the most valuable. In the event that one of my computers is not on the network and gets a virus, ESET Endpoint Security quickly detects the malware, and in most cases, it removes the virus. It also has the ability to remotely shut down the computer. I like the remote control part the most."
"The solution has a very good endpoint feature."
"I find the main valuable feature to be the antivirus, it is very effective with removing viruses."
"The pricing is good."
"I would say that this solution has the best support team in this kind of Endpoint protection product."
"It's a very user-friendly product."
"It has a clean and clear interface."
"It's good for large organizations. It's able to handle a lot of users."
"I like the additional features that come with it. The firewall feature and the encryption feature that they throw in are good as well. Another thing that I like about Symantec is that it runs on different platforms, not just on Windows."
"Easy to use solution."
"Symantec is very user-friendly, the interface and functions are very simple for everyone to understand. Additionally, it's a very robust system."
"The solution detects malware very well."
"The solution offers very good security features and is comparable to Sophos."
"The solution, especially in older versions, is quite stable."
"Its response time is the most valuable. It is very quick."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal."
"I would like to see integration with Cisco Analytics."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"The detection could be better in ESET Endpoint Security. Sometimes it takes time to detect threats and might be because it's not holding all the memory. There are some features that have to mature. More features might be available in the higher-end product."
"The integration capabilities might be lacking a bit."
"They should have better support for different languages and auto-upgrading."
"Data Leak Protection is is what we are searching for at the moment. It is not included with ESET."
"I am a MAC user and my asset cybersecurity is continuously displaying warnings that I am not using their firewall."
"There are other features you can add on to help make the security stronger, however, they should offer better security even on a basic level."
"The solution could be more user-friendly."
"In the future, a cloud version of the solution would be great."
"The whitelisting feature does not work as expected."
"The solution could improve by having a better graphical interface."
"Must push to EXE files to the endpoints."
"We are not satisfied with the technical support."
"The support from Symantec has been poor in my experience. They did not have the knowledge to help us with the issues we were facing."
"Future releases should ideally be cheaper."
"This solution is resource-heavy."
"Difficult to set up on older systems."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
Protect against Ransomware
Block Targeted Attacks
Prevent Data Breaches
Detect Advanced Persistent Threats
Stop Fileless attacks
Unmatched Endpoint Safety for Your OrganizationAs an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions.
ESET Endpoint Security is ranked 17th in Endpoint Protection for Business (EPP) with 26 reviews while Symantec End-User Endpoint Security is ranked 6th in Endpoint Protection for Business (EPP) with 59 reviews. ESET Endpoint Security is rated 8.2, while Symantec End-User Endpoint Security is rated 7.2. The top reviewer of ESET Endpoint Security writes "Good at detecting potentially dangerous websites, but the alerts can be confusing at times". On the other hand, the top reviewer of Symantec End-User Endpoint Security writes "Lacks next-generation behaviour-based detection, offers terrible technical support, and not as robust as competitors". ESET Endpoint Security is most compared with Microsoft Defender for Endpoint, SentinelOne, CrowdStrike Falcon, Sophos Intercept X and Kaspersky Endpoint Security for Business, whereas Symantec End-User Endpoint Security is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Trend Micro Deep Security, CrowdStrike Falcon and Cybereason Endpoint Detection & Response. See our ESET Endpoint Security vs. Symantec End-User Endpoint Security report.
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.