Compare NinjaOne and Symantec End-user Endpoint Security

At a Glance
NinjaOne
NinjaOne
Star Rating
(3,704)4.7 out of 5
Market Segments
Mid-Market (49.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about NinjaOne
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Star Rating
(551)4.4 out of 5
Market Segments
Enterprise (43.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Symantec End-user Endpoint Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that NinjaOne excels in user experience, with many praising its intuitive interface and ease of installation. Users appreciate the fast connection and the ability to run scripts without needing to log onto endpoints, making daily tasks more efficient.
  • Users say that Symantec End-user Endpoint Security provides robust protection with advanced threat detection methods, including AI and behavioral analysis. This multi-layered approach is particularly valued for its effectiveness against malware and zero-day threats, ensuring a strong defense for enterprises.
  • Reviewers mention that NinjaOne's feature set is continuously evolving, with users enjoying the regular updates and improvements. The ability to generate detailed usage reports for project meetings is highlighted as a significant advantage, aiding in asset management and client communications.
  • According to verified reviews, Symantec's centralized management capabilities are a strong point, with users finding policy creation and visibility straightforward. This ease of management is crucial for organizations looking to maintain security across various endpoints.
  • G2 reviewers highlight that NinjaOne's support quality is consistently rated highly, with users noting the responsiveness and helpfulness of the support team. This level of service contributes to a smoother experience, especially for mid-market companies that may require more hands-on assistance.
  • Users express concerns about Symantec's implementation process, with some noting that it can be more complex compared to NinjaOne. While it offers strong protection, the setup and configuration may pose challenges for teams looking for a quick deployment.
Pricing
Entry-Level Pricing
NinjaOne
No pricing available
Symantec End-user Endpoint Security
No pricing available
Free Trial
NinjaOne
Free Trial is available
Symantec End-user Endpoint Security
No trial information available
Ratings
Meets Requirements
9.0
3,514
9.1
481
Ease of Use
9.1
3,551
8.9
487
Ease of Setup
9.1
3,329
8.4
161
Ease of Admin
9.1
3,055
8.3
155
Quality of Support
9.1
3,373
8.7
468
Has the product been a good partner in doing business?
9.4
2,988
8.4
147
Product Direction (% positive)
9.7
3,471
9.0
479
Features by Category
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
7.9
780
Not enough data
Administration
8.2
657
Not enough data
8.7
690
Not enough data
8.2
689
Not enough data
Service Desk
8.1
684
Not enough data
7.9
655
Not enough data
7.7
634
Not enough data
Management
8.3
622
Not enough data
9.0
628
Not enough data
8.7
604
Not enough data
8.8
607
Not enough data
8.4
585
Not enough data
Functionality
7.6
620
Not enough data
8.5
613
Not enough data
8.9
644
Not enough data
8.9
660
Not enough data
Agentic AI - IT Service Management (ITSM) Tools
6.9
173
Not enough data
6.8
171
Not enough data
6.9
169
Not enough data
6.7
170
Not enough data
6.7
169
Not enough data
6.7
167
Not enough data
6.8
166
Not enough data
8.1
362
Not enough data
Compatibility
8.8
331
Not enough data
8.1
291
Not enough data
8.3
301
Not enough data
8.2
279
Not enough data
Management
Feature Not Available
Not enough data
8.3
290
Not enough data
8.6
291
Not enough data
8.8
320
Not enough data
9.2
328
Not enough data
Compliance
8.7
291
Not enough data
8.4
278
Not enough data
Feature Not Available
Not enough data
Agentic AI - Server Backup
7.3
65
Not enough data
7.2
63
Not enough data
7.6
64
Not enough data
7.4
63
Not enough data
7.2
63
Not enough data
7.4
64
Not enough data
8.1
409
Not enough data
Functionality
Feature Not Available
Not enough data
8.7
339
Not enough data
9.0
366
Not enough data
8.5
345
Not enough data
Feature Not Available
Not enough data
Compatibility
8.8
350
Not enough data
8.6
342
Not enough data
8.3
327
Not enough data
Management
8.2
327
Not enough data
8.8
330
Not enough data
8.7
331
Not enough data
Agentic AI - Online Backup
7.6
75
Not enough data
7.3
72
Not enough data
7.3
73
Not enough data
7.3
71
Not enough data
7.4
72
Not enough data
7.3
72
Not enough data
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
8.0
2,360
Not enough data
Inventory Management - Remote Monitoring & Management (RMM)
9.3
2164
|
Verified
Not enough data
8.7
564
Not enough data
8.1
449
Not enough data
Monitoring and Management
9.3
2141
|
Verified
Not enough data
8.4
1868
Not enough data
8.7
1985
|
Verified
Not enough data
9.0
2168
|
Verified
Not enough data
8.3
475
Not enough data
IT Operations & Workflow - Remote Monitoring & Management (RMM)
8.5
469
Not enough data
Service Management
9.2
2074
|
Verified
Not enough data
8.1
451
Not enough data
7.3
484
Not enough data
Agentic AI - Remote Monitoring & Management (RMM)
7.3
480
Not enough data
7.0
462
Not enough data
7.2
464
Not enough data
6.9
453
Not enough data
6.8
453
Not enough data
6.9
454
Not enough data
7.0
450
Not enough data
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
7.9
451
Not enough data
Scope
8.7
413
Not enough data
8.8
428
Not enough data
Security
8.5
422
Not enough data
8.3
389
Not enough data
7.4
381
Not enough data
Management
8.8
411
Not enough data
8.7
409
Not enough data
8.7
398
Not enough data
8.7
400
Not enough data
7.8
371
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
7.3
168
Not enough data
7.1
167
Not enough data
7.3
167
Not enough data
7.1
164
Not enough data
7.0
164
Not enough data
7.2
166
Not enough data
7.1
167
Not enough data
7.5
729
Not enough data
Functionality
8.8
670
Not enough data
8.9
697
Not enough data
8.0
614
Not enough data
8.8
609
Not enough data
Monitoring - Network Monitoring
7.5
247
Not enough data
7.8
250
Not enough data
8.3
262
Not enough data
Management
8.2
569
Not enough data
8.2
583
Not enough data
7.6
536
Not enough data
Analytics - Network Monitoring
7.0
238
Not enough data
6.9
236
Not enough data
Security - Network Monitoring
7.7
241
Not enough data
7.2
238
Not enough data
7.1
238
Not enough data
Network Performance - Network Monitoring
6.9
239
Not enough data
7.4
243
Not enough data
AI Automation - Network Monitoring
6.4
228
Not enough data
6.3
228
Not enough data
6.4
227
Not enough data
Agentic AI - Network Monitoring
6.6
124
Not enough data
6.5
122
Not enough data
6.7
125
Not enough data
6.6
121
Not enough data
6.4
120
Not enough data
6.6
121
Not enough data
6.4
122
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.0
169
Administration
Not enough data
9.2
155
Not enough data
9.1
155
Not enough data
8.9
156
Not enough data
8.8
154
Not enough data
9.2
157
Functionality
Not enough data
9.0
157
Not enough data
9.1
160
Not enough data
9.0
160
Not enough data
9.2
162
Analysis
Not enough data
8.8
155
Not enough data
9.1
155
Not enough data
8.9
157
8.0
591
Not enough data
Monitoring
9.3
560
|
Verified
Not enough data
9.2
557
|
Verified
Not enough data
8.5
506
|
Verified
Not enough data
7.1
197
Not enough data
Management Tools
8.2
497
Not enough data
8.6
507
|
Verified
Not enough data
8.5
487
|
Verified
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Agentic AI - Incident Management
7.5
95
Not enough data
7.4
94
Not enough data
7.7
93
Not enough data
7.2
93
Not enough data
7.2
93
Not enough data
7.3
92
Not enough data
7.5
91
Not enough data
7.9
1,224
Not enough data
Asset Inventory
9.0
1152
Not enough data
8.8
1138
Not enough data
7.7
1019
Not enough data
Feature Not Available
Not enough data
8.2
1055
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Agentic AI - IT Asset Management
7.4
228
Not enough data
7.2
223
Not enough data
7.4
220
Not enough data
7.1
217
Not enough data
7.1
216
Not enough data
7.1
221
Not enough data
7.0
218
Not enough data
Management
9.1
1116
Not enough data
8.7
1038
Not enough data
8.1
996
Not enough data
8.2
1048
Not enough data
8.4
1,798
Not enough data
Administration
9.2
1628
Not enough data
8.7
1553
Not enough data
7.8
1416
Not enough data
9.2
1633
Not enough data
8.9
1497
Not enough data
8.8
1546
Not enough data
Maintenance
9.2
1619
Not enough data
7.7
1326
Not enough data
Communication
7.9
1396
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.2
1300
Not enough data
Security
8.3
1345
Not enough data
8.4
1377
Not enough data
Device Support
7.6
1352
Not enough data
8.4
1429
Not enough data
8.4
1412
Not enough data
Performance
8.2
1500
Not enough data
7.9
344
Not enough data
Functionality
8.8
324
Not enough data
7.9
291
Not enough data
8.1
296
Not enough data
8.6
313
Not enough data
Performance
8.7
317
Not enough data
8.5
302
Not enough data
Feature Not Available
Not enough data
8.6
304
Not enough data
Agentic AI - PC Backup
7.1
88
Not enough data
7.1
88
Not enough data
6.9
87
Not enough data
7.0
87
Not enough data
Not enough data
6.0
8
Generative AI
Not enough data
6.0
8
Not enough data
6.0
8
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
7.2
6
Generative AI
Feature Not Available
7.2
6
8.5
238
Not enough data
Management and Discovery - IT Documentation
8.3
221
Not enough data
8.3
219
Not enough data
8.7
221
Not enough data
Operations - IT Documentation
8.4
221
Not enough data
8.8
228
Not enough data
8.4
223
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
7.8
96
Not enough data
Generative AI - Autonomous Endpoint Management
7.0
64
Not enough data
7.2
65
Not enough data
7.1
63
Not enough data
Monitoring and Management - Autonomous Endpoint Management
8.7
92
Not enough data
8.1
72
Not enough data
7.8
67
Not enough data
8.8
83
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
8.1
547
Not enough data
Platform - Mobile Device Management (MDM)
8.5
442
Not enough data
Operating System
9.2
528
Not enough data
8.1
502
Not enough data
8.3
478
Not enough data
Management
8.5
486
Not enough data
8.2
448
Not enough data
8.2
445
Not enough data
8.1
437
Not enough data
8.3
449
Not enough data
Security
8.5
457
Not enough data
8.6
465
Not enough data
Agentic AI - Mobile Device Management (MDM)
7.7
143
Not enough data
7.6
140
Not enough data
7.8
142
Not enough data
7.7
139
Not enough data
7.6
137
Not enough data
7.6
139
Not enough data
7.6
136
Not enough data
Not enough data
Not enough data
Knowledge Base
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Content
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Communication
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
7.9
857
Not enough data
Analysis
8.1
727
Not enough data
Platform
7.8
699
Not enough data
9.1
785
Not enough data
8.2
680
Not enough data
8.5
737
Not enough data
8.3
707
Not enough data
Security
8.7
741
Not enough data
9.2
812
Not enough data
7.6
673
Not enough data
8.7
711
Not enough data
8.2
681
Not enough data
Agentic AI - Enterprise IT Management
7.4
163
Not enough data
7.2
153
Not enough data
7.3
156
Not enough data
7.0
152
Not enough data
7.0
151
Not enough data
6.9
151
Not enough data
7.0
150
Not enough data
Categories
Categories
Shared Categories
NinjaOne
NinjaOne
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
NinjaOne and Symantec End-user Endpoint Security are categorized as Endpoint Management
Reviews
Reviewers' Company Size
NinjaOne
NinjaOne
Small-Business(50 or fewer emp.)
43.4%
Mid-Market(51-1000 emp.)
49.7%
Enterprise(> 1000 emp.)
6.9%
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Small-Business(50 or fewer emp.)
26.3%
Mid-Market(51-1000 emp.)
30.4%
Enterprise(> 1000 emp.)
43.3%
Reviewers' Industry
NinjaOne
NinjaOne
Information Technology and Services
26.7%
Computer & Network Security
13.0%
Hospital & Health Care
4.0%
Manufacturing
3.7%
Computer Software
2.9%
Other
49.6%
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Information Technology and Services
22.0%
Events Services
7.2%
Marketing and Advertising
6.0%
Financial Services
5.4%
Computer Software
5.3%
Other
54.1%
Alternatives
NinjaOne
NinjaOne Alternatives
Atera
Atera
Add Atera
TeamViewer
TeamViewer
Add TeamViewer
N-able N-central
N-able N-central
Add N-able N-central
LogMeIn Resolve
LogMeIn Resolve
Add LogMeIn Resolve
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security Alternatives
ThreatDown
ThreatDown
Add ThreatDown
Webroot Business Endpoint Protection
Webroot
Add Webroot Business Endpoint Protection
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
FortiClient
FortiClient
Add FortiClient
Discussions
NinjaOne
NinjaOne Discussions
Do I need a WSUS Server to enable patch management on Windows devices?
6 Comments
Jenny T.
JT
You can use WSUS to completely manage the distribution of Microsoft Update updates to https://basketballstars2.com computers on your network. Read more
How do I make a script to block all users on a PC from executive .MSI / .exe files?
2 Comments
Pani R.
PR
Make them regular users. Do not make their accounts administrators.Read more
Do you provide the same level of functionality for MacOS as you do for Windows?
2 Comments
Brian A.
BA
Hey Sam, We are an all Mac firm (as we work on Macs ourselves) and I can confirm they do support Macs well. Now, because of the Apple environment, they...Read more
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security Discussions
How are the virus definitions done, how can it be so fast
1 Comment
Jose B.
JB
Rapid release update are released every hourRead more
What are the New Features in Symantec Endpoint Protection 14.2?
1 Comment
Official Response from Symantec End-user Endpoint Security
The new features in Symantec Endpoint Protection 14.2 include: • Content Analysis Integration – submit suspicious files for multilayered inspection,...Read more
Where can I download the Trial Version?
1 Comment
Official Response from Symantec End-user Endpoint Security
You can try the leading solution in endpoint protection by downloading a free 60-day trial today here:...Read more