Our analysts compared Jamf Protect vs Symantec Endpoint Security Complete based on data from our 400+ point analysis of Endpoint Security Software, user reviews and our own crowdsourced data from our free software selection platform.
Analyst Rating
User Sentiment
among all Endpoint Security Software
Jamf Protect has a 'excellent' User Satisfaction Rating of 92% when considering 50 user reviews from 2 recognized software review sites.
Symantec Endpoint Security Complete has a 'great' User Satisfaction Rating of 87% when considering 2627 user reviews from 3 recognized software review sites.
Jamf Protect stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.
SelectHub research analysts have evaluated Symantec Endpoint Security Complete and concluded it earns best-in-class honors for Exploit Prevention and Integrations and Extensibility.
How well does Jamf Protect your Apple fleet from threats? User reviews from the past year reveal a product that shines in its specialized niche. They applaud its tight integration with Jamf Pro, making deployment and daily management a breeze, unlike some competitors that feel clunky and cumbersome. This seamlessness is critical for organizations already invested in the Jamf ecosystem, as it streamlines workflows and reduces administrative headaches. Users consistently highlight Jamf Protect's robust security features as a key strength. They praise its effectiveness in detecting and mitigating Mac-specific threats, ensuring compliance, and providing detailed reporting. For instance, one user lauded the software's ability to "catch things we miss" and maintain consistent compliance standards. This targeted approach to macOS security is a major differentiator, setting it apart from generic endpoint security solutions that may not address Apple-specific vulnerabilities as effectively. However, no software is without its flaws. Some users find the user interface less intuitive than competing products, requiring more frequent interaction with customer support for advanced configurations. Additionally, a few users express a desire for more frequent antivirus definition updates to keep pace with the evolving threat landscape. While these drawbacks are noted, they don't overshadow the overall positive sentiment. In conclusion, Jamf Protect emerges as a strong contender for organizations heavily reliant on Apple devices. Its seamless integration with Jamf Pro, robust Mac-centric security features, and overall ease of use make it a compelling choice. While the user interface and update frequency could benefit from some refinement, these are minor drawbacks compared to the peace of mind it offers in securing Apple environments.
User reviews for Symantec Endpoint Security Complete reflect a mix of strengths and weaknesses. Users consistently praise its robust threat protection capabilities, including effective malware and phishing attack detection. The user-friendly interface and centralized cloud-based management are commonly appreciated, making it accessible and convenient for administrators. The solution's quick threat detection and response, along with seamless integration between endpoint and email security, receive positive feedback for enhancing overall security. On the downside, some users find the product to be resource-intensive, potentially affecting system performance on older devices. Complex initial configuration and potential compatibility issues with third-party software are reported challenges. Cost is cited as a drawback for smaller organizations with limited budgets. While the automation features are well-received, the product may occasionally generate false positives, requiring manual intervention. Users generally view Symantec Endpoint Security Complete favorably when compared to similar products, particularly due to its comprehensive threat protection and integration capabilities. However, some mention limitations in mobile device support and the need for careful policy adjustment to avoid impacting user experience. The product's commitment to compliance support and 24/7 threat monitoring and support also contribute positively to user satisfaction.
WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...