Symantec Proxy Primary Use Case

Ganesh Khutwad - PeerSpot reviewer
Software Engineer at Rich Products

Some SharePoint sites are accessible, while others are not. It is possible that some URLs have been redirected. To check this, we need to check the Symantec database to determine if there is any confidential, educational, or financial information or if there are any symptoms of threats such as ransomware like RED. Based on this, we need to reclassify the URL. If it is reclassified, we can allow that particular URL into the environment.

View full review »
Mel Stevenson - PeerSpot reviewer
Security Consultant at DXC Technology

We use the product for malware filtering, content filtering, and reporting.

View full review »
Vikram Dhane - PeerSpot reviewer
Senior Manager Cloud Network and Security at a financial services firm with 10,001+ employees

I have deployed the solution on three of the major cloud providers, GCP, Amazon AWS, and Microsoft Azure.

View full review »
Buyer's Guide
Symantec Proxy
March 2024
Learn what your peers think about Symantec Proxy. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.
Mauzzam Shaikh - PeerSpot reviewer
Senior Technical Consultant at Meta Infotech Pvt Ltd

We use the policies of Symantec Proxy, particularly firewalls, ATP, isolation, and sandboxing, which are available in both cloud and on-premise deployments of the solution.

View full review »
PL
General Manager & founder at a engineering company with 11-50 employees

The solution is a proxy for our users to get onto the internet, and it does actually work. It does block users if they don't have access to those URLs. It's just that it's a very cumbersome solution and there's no real authentication to the user before the user tries to get out onto the internet. So there are quite a few problems with WSS, hence our reason to switch over to something different.

View full review »
Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank

The solution helps with content monitoring, authentication, and cache. 

View full review »
RS
Consultant at a financial services firm with 10,001+ employees

For use cases, I have created an integration with Active Directory for authentication and privilege-based access control. It enables us to manage bandwidth for users based on their privilege levels. For example, if a user wants to use a certain application or resource, we can provide access based on their privileges.

Our second use case was to ensure that the corporate network is only accessible by authorized users to prevent unauthorized access to private emails and other confidential information. It was a domain-wide access use case.

Our third use case was to block unwanted and malicious websites. We tried to achieve this through integration with other security solutions, but it was not successful. Also, we faced an issue with Cislope forwarding, as it is not supported in Symantec Proxy. Therefore, we used a reporter server to forward the Cislope to the C.S.I.M. system.

View full review »
Vinit_Shah - PeerSpot reviewer
Senior Technology Consultant at Malomatia

We are using Symantec Proxy for outbound traffic URL filtering, and antivirus scanning of whatever package is going through the proxy system. It's fulfilling all our requirements.

View full review »
Muhammad Salahuddin - PeerSpot reviewer
Unit Head - Network and Security Solutions at FPM Solutions

What we did is we replaced the TMG from Blue Coat, and we deployed the cloud solution to have URL filtering through cloud. When a user starts to work from home, they shift towards the cloud. Whenever they come to the office, they use the Proxy, on-prem solution. It's to secure their users and restrict them within the company policies to ensure they use specific websites or URL categories.

View full review »
SH
Senior Information Security Engineer at SOCIALEYEZ

We are resellers and we implement this solution for our clients.

View full review »
PC
Systems Administrator at a financial services firm with 1,001-5,000 employees

We use it for browsing and for updates to our system. We use it for remote access and for meetings as well now.

View full review »
SR
Senior System Administrator at a computer software company with 1,001-5,000 employees

We are resellers and we provide solutions to our customers.

We use Symantec Proxy for a forward proxy.

View full review »
TO
Security Product Manager at a tech services company with 201-500 employees

We use Symantec Proxy to provide users with internet access, to allow the service to receive updates from the internet, and to block malicious websites.

View full review »
RC
Cyber Security Engineer at a comms service provider with 51-200 employees

We are an integrator and we have configured Symantec Proxy to be used in a bank as a proxy.

View full review »
BG
Information Technology Sub-Sector at a government with 5,001-10,000 employees

We use it for web security and content filtering. We are using Symantec ProxySG.

View full review »
Buyer's Guide
Symantec Proxy
March 2024
Learn what your peers think about Symantec Proxy. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.