Solved

End Point Protection

Posted on 2013-12-15
4
327 Views
Last Modified: 2013-12-21
I'm working on a new deployment and I'm trying to figure out which product will give me everything I need in a single solution, right now symantec seems like the obvious solution, but kasperty also seems like another good solution.

I will have remote users, laptop users, servers of many flavors.

Both seem to offer IPS/Anti Virus/Anti Spam etc

This is for an enterprise env that should service roughly 1000 users
0
Comment
Question by:QuestionsGuy
4 Comments
 
LVL 9

Accepted Solution

by:
guswebb earned 500 total points
ID: 39720197
Endpoint Protection is a good product and something I have used in its various previous guises for over 10 years. I'm not familiar Kaspersky but Symantec Endpoint Protections is certainly adequate for what you are looking for. I expect your decision may simply come down to cost as feature sets from the main providers will be almost identical.
0
 
LVL 90

Expert Comment

by:John Hurst
ID: 39720209
My clients all use Symantec Endpoint Protection. You need the very newest version (12.1.4) for Windows 8.1.

Properly set up, it does not use much resource and is never in the way of people (unless they happen to be loose nuts behind the keyboard getting viruses).

Also, any AV product is a rear-guard action and people still need to use common sense.

... Thinkpads_User
0
 
LVL 6

Expert Comment

by:insidetech
ID: 39720237
You will probably get as many different answers as the experts responding.

Personally... I used to favor the End Point by Symantec, but if you are still looking I recommend Webroot. (Http://www.webroot.com)
Hands down superior product, faster, smarter smaller footprint and less arrogant company!
0
 

Author Comment

by:QuestionsGuy
ID: 39721272
Does Webroot cover everything end point does with a local central server?
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a …
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now