Intercept X Endpoint and Symantec Endpoint Security Complete are compared across several key areas in endpoint security. While Intercept X is noted for its proactive protection capabilities, Symantec has an edge with its expansive threat intelligence and malware protection.
Features: Intercept X Endpoint offers advanced threat protection, deep learning capabilities, and exploit prevention. Symantec Endpoint Security Complete provides comprehensive threat intelligence, integrated threat defense, and extensive malware protection.
Room for Improvement: Intercept X could enhance its reporting capabilities, user accessibility, and response time. Symantec could improve its performance speed, reduce false positives, and simplify the user interface.
Ease of Deployment and Customer Service: Intercept X Endpoint is known for its smooth deployment process and effective customer service. Symantec Endpoint Security Complete also offers easy deployment, though it has a slightly more complex initial setup. Customer service for both products is highly rated, with Intercept X having a marginal advantage.
Pricing and ROI: Intercept X Endpoint is seen as cost-effective with a strong ROI due to efficient threat mitigation. Symantec Endpoint Security Complete, while more expensive, shows good ROI attributed to its extensive feature set. Symantec’s higher pricing is justified by its comprehensive security features.
Technical support from Sophos is rated as nine out of ten, which represents high quality.
There are issues with onboarding technical engineers to resolve problems, which causes delays.
I don't know the current situation with Broadcom, however, it was good when I was involved.
The tool's scalability is good, and I would rate it an eight out of ten.
In terms of stability, I would rate Intercept X Endpoint an eight out of ten.
Intercept X Endpoint sometimes slows down machines due to high CPU utilization and significant RAM consumption during scanning.
I would inquire why it is not sold directly to end users.
They could improve the user interface.
The pricing of Intercept X Endpoint is a bit high.
I would describe it as economical, but not much cheaper than other solutions.
The stronger the AI/ML in an endpoint, the better the protection against unknown threats.
Intercept X Endpoint has been stable, and I appreciate the centralized management and the reporting feature.
I have both the antivirus and EDR features constantly, allowing my team's customers to conduct detailed analyses of where attacks have occurred or if any malicious files are present, which devices or files have been targeted.
Sophos Intercept X Endpoint is a comprehensive cybersecurity solution that combines the power of artificial intelligence (AI) with Sophos' deep expertise in cybersecurity to provide unmatched protection against sophisticated cyber threats, including ransomware, malware, exploits, and zero-day vulnerabilities. Sophos Intercept X Endpoint stands out for its innovative approach to endpoint security, leveraging advanced technologies and expert services to provide comprehensive protection. Its focus on prevention, detection, and response, combined with ease of use and scalability, makes it a preferred choice for organizations looking to strengthen their cybersecurity defenses.
Harness the Power of a Deep Learning Neural Network
Achieve unmatched endpoint threat prevention. Intercept X uses deep learning, an advanced form of machine learning to detect both known and unknown malware without relying on signatures.
Deep learning makes Intercept X smarter, more scalable, and more effective against never-seen-before threats. Intercept X leverages deep learning to outperform endpoint security solutions that use traditional machine learning or signature-based detection alone.
Stop Ransomware in Its Tracks
Block ransomware attacks before they wreak havoc on your organization. Intercept X with XDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across your network. It prevents both file-based and master boot record ransomware.
Any files that were encrypted are rolled back to a safe state, meaning your employees can continue working uninterrupted, with minimal impact to business continuity. You get detailed post-cleanup information, so you can see where the threat got in, what it touched, and when it was blocked.
Intelligent Endpoint Detection and Response (EDR)
The first EDR designed for security analysts and IT administrators
Intercept X Advanced with EDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.
Extended Detection and Response (XDR)
Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Managed Detection and Response
Symantec Endpoint Security (SES) Complete delivers comprehensive protection for all your traditional and mobile devices across the entire attack chain. Symantec endpoint innovations include behavioral isolation, Active Directory security, and Threat Hunter technologies to protect your endpoints against sophisticated threats and targeted attacks. For higher return-on-investment and lower total cost of ownership, this single-agent solution supports on-premises, hybrid, and cloud-based deployments.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.