Symantec Endpoint Application Control

Symantec Endpoint application control is a leading global provider of storage, security and system management, data protection services, recovery and back up services, and device protection. The company operates in three major business segments, namely, Consumer Security, Enterprise Security, and Information Management. Moreover, the company sells and markets its offerings to individuals, SMEs, and large enterprises. Symantec Endpoint application control help end users secure their data against unauthorized data breach and information loss. Symantec caters to a wide range of industry verticals such as healthcare, retail, government, BFSI, education, and automotive among others. The company has its presence in over 50 countries, including regions such as North America, Europe, APJC, and MEA. symantec CORPORATION: company snapshot Source: Company Website, Annual Reports, and SEC Filings

USP : Symantec is one of the premium providers in the application control market and caters to a large customer base. With the growing trends of IoT and rapid rise in the number of connected devices, the company has changed its focus from protecting endpoints to effectively protecting and managing digital information in endpoint devices, which has become one of the prime necessities of today. Symantec’s investment in its channel partners is helping the company in driving customer satisfaction. Their go-to-market strategy includes direct sales as well as indirect sales resources which support their partner ecosystem. The company firmly adheres to the business strategy of having strong relationships with its partners in the market by forming alliances and partnerships with a number of OEMs towards enhancing its products. They partnered with Giesecke & Devrient (G&D), a global leader in mobile security, to collaborate on the development of protected security applications on smartphones and tablets. Symantec also expanded its incident response services to North America, the U.K., and select APAC regions to leverage comprehensive threat intelligence which would help the organization to predict and respond to cyber-threats. This helped the company to double its customer engagement over the last quarter. Besides this, the company is focused toward global Research and Development (R&D) strategy to drive innovations. For this, the company spent USD 1.14 billion in 2015 on in R&D to develop new technologies and product enhancements.

BUYERS
VENDORS
EXPERTS
4.4
ANALYSTS
 

SYMANTEC CORPORATION detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
4.60
3.80
3.80
Scalability
5.00
4.65
4.35
Product Features and Functionality
4.40
4.40
3.50
Delivery
4.05
4.25
4.25
Breadth and Depth of Product Offering
3.70
2.95
2.70
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

SYMANTEC CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    9 Participants

  • Niche Quadrant

    All-Asia-Pacific

    10 Participants

  • Niche Quadrant

    All-Europe

    10 Participants

STRENGTHS
  • Product Maturity / Application Control features
    Advanced Persistent Threat (APT) Protection
  • Product Maturity / Application Control features
    Application Detection and Usage Control
  • Product Maturity / Application Control features
    Application Reputation Scoring
  • Product Maturity / Application Control features
    Policy Management
  • Product Maturity / Type of access points
    Desktop/Laptop
  • Product Maturity / Type of access points
    Mobile/Tablet
  • Product Maturity / Type of access points
    Removable Devices
  • Product Maturity / Type of access points
    Servers
  • Product Maturity / Type of access points
    Virtual Machines
  • Product Maturity / Mode of delivery
    Delivery - Directly
  • Product Maturity / Support services
    On-Site Support
  • Product Maturity / Support services
    Remote Support
  • Product Maturity / Application Control techniques
    Whitelisting
  • Product Maturity / Deployment model
    Hosted / On-Cloud
  • Product Maturity / Application Control features
    Advanced Memory Protection
  • Product Maturity / Application Control techniques
    Blacklisting
  • Product Maturity / Application Control features
    Threat Detection
  • Product Maturity / Application Control features
    Visibility and Reporting
  • Product Maturity / Support and Services
    Customer redressal mechanism
  • Product Maturity / Mode of delivery
    Delivery - Through Partners / Third-Party Vendors
WEAKNESSES
  • Product Maturity / Type of access points
    Point of Sale (PoS) Systems
  • Product Maturity / Deployment model
    On-Premise
  • Product Maturity / Application Control features
    Compliance Management
  • Product Maturity / Pre-sales support
    Dedicated Account Manager (DAM)
  • Product Maturity / Add-on products
    Backup and Recovery
  • Product Maturity / Application Control techniques
    Greylisting
  • Product Maturity / Add-on products
    Identity Management
  • Product Maturity / Add-on products
    Patch Management
  • Product Maturity / OS/Platforms supported
    Linux OS
  • Product Maturity / OS/Platforms supported
    Mac OS
  • Product Maturity / OS/Platforms supported
    Windows 10
  • Product Maturity / OS/Platforms supported
    Windows 7
  • Product Maturity / OS/Platforms supported
    Windows 8
  • Product Maturity / OS/Platforms supported
    Windows Server 2003
  • Product Maturity / OS/Platforms supported
    Windows Server 2008
  • Product Maturity / OS/Platforms supported
    Windows Server 2012
  • Product Maturity / OS/Platforms supported
    Windows Vista
  • Product Maturity / OS/Platforms supported
    Windows XP
  • Product Maturity / Services Offered
    Compliance & Risk Management
  • Product Maturity / Services Offered
    Consulting Services
See More

Have you EVER used SYMANTEC CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Application Control features
  • Product Features and Functionality
    Type of access points
  • Type of Support services
    Technical Support
  • End-users catered
    IT Administrators
  • Type of access points
    Virtual Machines
  • End-users catered
    Information Security Specialists
  • Services Offered
    Vulnerability Assessment
  • Application Control features
    Advanced Memory Protection
  • Application Control features
    Visibility and Reporting
  • Pre-sales support
    Software Requirement Specification (SRS)

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com