Think about rolling out version XYZ to an environment with hundreds of thousands of hosts. By the time you finish, you will be lagging behind at least two versions, given the frenetic release of new product versions by Symantec. I understand that they work to offer the new solution brought by their latest acquisition, but confess that it’s a bit frustrating that your deployment is already obsolete by the time you finish. Even if your network is not that massive, I find it appaling that major releases come out in such periods of time.
The management console is another thing that might give you headaches some times, mainly because some caching issues (for example, if you re-image a desktop, its “ghost” will appear as outdated, and you might spend a couple of hours trying to locate the machine on your network.
Another thing that can drag you to an extent is the fact that the management console (well, at least the version I have) is not able to tell you if a certain desktop has the firewall enabled or not.If you are going through PCI DSS and your QSA asks for that information, you might be left with our hands tied. All you can say is that the endpoint firewall is enabled across the board, but not necessarily identify what devices had it or not.
The product as a whole is recommended. Apart from all the cons illustrated here, as well as other factors you might consider such as price, local support and the package offered by the vendor, I certainly recommend the adoption of Symantec AV by your enterprise. It is a honest solution, and whilst not perfect, it certainly does the job.
What about you? What’s your experience with endpoint protection solutions (McAfee, Trend Micro, etc)? Do the security community a favor and share your thoughts by commenting below! 🙂
PS: this article is not sponsored by any vendor whatsoever, nor reflects the opinion of the company I work for. It is the pure reflection of my experience with the product.
Its also worth mentioning that by implementing it you won’t necessarily have the same good/bad experiences I had. Hence, your opinion about the product in the comments section is much appreciated!
If you liked this post, do not forget to read the polemic 6 Reasons Why You Should NOT Work With Information Security, and the post dedicated to Information Security Interview Questions.
Pages: 1 2