$("#pro-aspect-container .snippet-list").append('
RG<\/span><\/div><\/div>
reviewer1177653<\/span><\/a><\/div>
Sr. Professional Services Engineer at a computer software company with 11-50 employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Nov 17, 2020<\/div><\/div>
The firewall, IPS and device control are useful at protecting the environment. <\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Saddam<\/div>
Saddam Lateef<\/span><\/a><\/div>
Information Security Admin at a retailer with 201-500 employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 19, 2020<\/div><\/div>
It is a solid antivirus security product.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
ML<\/span><\/div><\/div>
reviewer1521729<\/span><\/a><\/div>
IT Director at a comms service provider with 10,001+ employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Mar 17, 2021<\/div><\/div>
The product has been quite stable.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
MI<\/span><\/div><\/div>
Marbella Ibarra<\/span><\/a><\/div>
CEO at CT AMERICA<\/div><\/div><\/div><\/div>
May 29, 2021<\/div><\/div>
The solution, especially in older versions, is quite stable.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Olajide<\/div>
Olajide Olusegun<\/span><\/a><\/div>
Network Team Lead at Atlas Security<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Apr 27, 2023<\/div><\/div>
Symantec Endpoint Security is easy to use, fast, and good for small and medium-sized businesses.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
DW<\/span><\/div><\/div>
reviewer1364142<\/span><\/a><\/div>
Senior Network Engineer at a government with 10,001+ employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 9, 2020<\/div><\/div>
The most valuable feature is the automated updating feature.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
SA<\/span><\/div><\/div>
Syed Akram<\/span><\/a><\/div>
Information Technology Specialist at Wonderla Holidays Ltd<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Aug 15, 2022<\/div><\/div>
If there is exposure, we need to investigate the source of the attack, e.g., whether it came from the network or externally. We view the firewall logs, and if there has been exposure, then we use the Application Isolation feature. When there is an attack with on-prem, that system will go into isolation mode, removing connectivity to other internal systems. We also restrict the WLAN part to avoid that system broadcasting to other networks.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>