Compare FireEye Network Security vs. Symantec Advanced Threat Protection

FireEye Network Security is ranked 5th in Advanced Threat Protection with 11 reviews while Symantec Advanced Threat Protection is ranked 8th in Advanced Threat Protection with 5 reviews. FireEye Network Security is rated 7.8, while Symantec Advanced Threat Protection is rated 7.8. The top reviewer of FireEye Network Security writes "It has significantly decreased our mean time in being able to identify and detect malicious threats". On the other hand, the top reviewer of Symantec Advanced Threat Protection writes "Offers elaborate detection features and provides information linked to each of the attacked computers". FireEye Network Security is most compared with Palo Alto Networks WildFire, Cisco Stealthwatch and Symantec Advanced Threat Protection, whereas Symantec Advanced Threat Protection is most compared with FireEye Network Security, Palo Alto Networks WildFire and Check Point SandBlast. See our FireEye Network Security vs. Symantec Advanced Threat Protection report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about FireEye Network Security vs. Symantec Advanced Threat Protection and other solutions. Updated: January 2020.
399,540 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution.The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money.Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams.The most valuable feature is the view into the application.Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us.The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks.Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening.

Read more »

All of the solution's features are quite valuable for us. We especially like the threat protection it provides.The most valuable feature is Click-time URL protection.They manage to solve detection quite nicely. There is some rather elaborate detection compared to other providers.Technical support is very responsive. You just have to open a ticket. They respond in a timely manner. Their response is good. I'm satisfied.It has certainly helped out our audit efforts because we each stay compliant in terms of various security standards.

Read more »

Cons
It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment.As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web).Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard.A better depth of view, being able to see deeper into the management process, is what I'd like to see.Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier.I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports.The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right.It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning.

Read more »

The cloud platform needs to have improvement in terms of the user interface and the different capabilities it has available. It needs to match the other leading next-gen EDR products that are available in the market. That's the reason why we are stepping away from Symantec. Their cloud environment is just generally lacking in comparison to others.There are limits with respect to blocking files by hash value or blocking IP addresses, and these limits should be removed.It's a strange situation where the infrastructure of the consumer or customer is behind some kind of firewall and they have always used some kind of customized proxy. In this situation, the ATP has a very tough time to pass the information to the cloud and back. To fix, it requires a more elaborate and complex configuration for that particular case.The administration interface needs a lot of improvement. It should be UI based, and simple. They need to improve it. It's pretty much not that friendly compared to what we were using as Bitdefender before. It's okay but is improving, actually.An improvement could be made on the reporting because then it would be easier to collect information and submit it for compliance.

Read more »

Pricing and Cost Advice
When I compare this solution to its competitors in the market, I find that it is a little expensive.FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market.We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold.There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product.The pricing is a little high.Pricing and licensing are reasonable compared to competitors.

Read more »

The pricing of this solution is inexpensive and affordable.

Read more »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
399,540 professionals have used our research since 2012.
Ranking
Views
9,559
Comparisons
6,840
Reviews
10
Average Words per Review
384
Avg. Rating
7.7
Views
3,125
Comparisons
2,319
Reviews
5
Average Words per Review
551
Avg. Rating
7.8
Top Comparisons
Also Known As
FireEye
Learn
FireEye
Symantec
Overview

FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.

Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantec’s massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. You can deploy a new installation of Symantec Advanced Threat Protection and start to discover suspicious activity in under an hour. Using the proven technology in Symantec Insight reputation based detection, Symantec SONAR behavioral analysis with the new Symantec Cynic sandbox and file analysis platform, Symantec Advanced Threat Protection provides better detection and prioritization than other vendors, allowing security analysts to “zero in” on just those specific security events of importance.

Offer
Learn more about FireEye Network Security
Learn more about Symantec Advanced Threat Protection
Sample Customers
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave SystemsECI
Top Industries
REVIEWERS
Financial Services Firm36%
University18%
Manufacturing Company18%
Comms Service Provider9%
VISITORS READING REVIEWS
Software R&D Company31%
Financial Services Firm12%
Comms Service Provider12%
Media Company9%
No Data Available
Find out what your peers are saying about FireEye Network Security vs. Symantec Advanced Threat Protection and other solutions. Updated: January 2020.
399,540 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.