# Symantec End-user Endpoint Security vs ThreatDown Comparison
---
## AI Generated Summary
- **G2 reviewers report** that ThreatDown excels in overall user satisfaction, boasting a significantly higher G2 Score compared to Symantec End-user Endpoint Security. Users appreciate its comprehensive suite of features, including Email Security and DNS Filtering, which are essential for modern cybersecurity needs.
- **Users say** that the implementation process for ThreatDown is notably smooth, with many highlighting the OneView dashboard as a standout feature. This tool allows users to easily monitor the status of multiple endpoints, making management across various clients straightforward and efficient.
- **Reviewers mention** that Symantec End-user Endpoint Security is well-regarded for its user-friendly interface and strong customer support. Many users find the GUI easy to navigate, and they appreciate the straightforward policy creation and integration with other systems like SIEM.
- **According to verified reviews** , ThreatDown&#39;s customer support is frequently praised, with users noting that it is responsive and helpful. This level of support is crucial for businesses managing multiple clients, as it ensures that any issues can be quickly addressed.
- **G2 reviewers highlight** that while Symantec End-user Endpoint Security is a trusted name in antivirus solutions, it faces challenges in user satisfaction metrics compared to ThreatDown. Users have pointed out that it can be less intuitive in certain configurations, which may hinder some organizations from fully leveraging its capabilities.
- **Users report** that both products offer solid compliance and security features, but ThreatDown&#39;s proactive approach to product development and its ability to adapt to changing security landscapes give it an edge. Reviewers appreciate how ThreatDown continuously evolves its offerings to meet emerging threats.



| | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Star Rating** | 4.4 out of 5 | 4.6 out of 5 | 
| **Total Reviews** | 553 | 1,083 | 
| **Largest Market Segment** | Enterprise (43.1% of reviews) | Small-Business (47.2% of reviews) | 
| **Entry Level Price** | No pricing available | Starting at $345.00 5 Device Per Year | 

---
## Top Pros & Cons

### Symantec End-user Endpoint Security

Pros:
- Threat Detection (4 reviews)
- Security (3 reviews)

Cons:
- Slow Performance (3 reviews)
- High CPU Usage (2 reviews)

### ThreatDown

Pros:
- Ease of Use (99 reviews)
- Features (68 reviews)

Cons:
- Poor Customer Support (23 reviews)
- Lack of Clarity (22 reviews)

---
## Ratings Comparison
| Rating | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
  | **Meets Requirements** | 9.1 (482 reviews) | 9.2 (969 reviews) | 
  | **Ease of Use** | 8.9 (488 reviews) | 9.2 (975 reviews) | 
  | **Ease of Setup** | 8.4 (162 reviews) | 9.2 (737 reviews) | 
  | **Ease of Admin** | 8.3 (155 reviews) | 9.1 (705 reviews) | 
  | **Quality of Support** | 8.7 (469 reviews) | 8.8 (866 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.4 (147 reviews) | 9.2 (684 reviews) | 
  | **Product Direction (% positive)** | 9.0 (480 reviews) | 8.9 (958 reviews) | 

---
## Pricing

### Symantec End-user Endpoint Security

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### ThreatDown

#### Entry-Level Pricing

Plan: Core Next-Gen AV

Price: Starting at $345.00 5 Device Per Year

Description: AI-powered protection that stops threats before they get in.

Key Features:
- Incident Response
- Central management console
- Next-Gen AV

[Browse all 4 editions](https://www.g2.com/products/threatdown/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | 9.0/10 | 170 |
| **ThreatDown** | 8.9/10 | 293 |

#### Administration

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Compliance** | 9.2 (155 reviews) | 9.1 (232 reviews) | 
| **Web Control** | 9.1 (155 reviews) | 8.8 (238 reviews) | 
| **Application Control** | 8.9 (156 reviews) | 8.9 (221 reviews) | 
| **Asset Management** | 8.8 (154 reviews) | 8.5 (204 reviews) | 
| **Device Control** | 9.2 (157 reviews) | 8.8 (224 reviews) | 

#### Functionality

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **System Isolation** | 9.0 (157 reviews) | 8.9 (213 reviews) | 
| **Firewall** | 9.1 (161 reviews) | 8.9 (215 reviews) | 
| **Endpoint Intelligence** | 9.0 (160 reviews) | 9.0 (247 reviews) | 
| **Malware Detection** | 9.1 (163 reviews) | 9.6 (262 reviews) | 

#### Analysis

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Automated Remediation** | 8.8 (155 reviews) | 9.0 (236 reviews) | 
| **Incident Reports** | 9.1 (155 reviews) | 8.9 (240 reviews) | 
| **Behavioral Analysis** | 8.9 (157 reviews) | 8.9 (222 reviews) | 

### Managed Detection and Response (MDR)

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | N/A | N/A |
| **ThreatDown** | 8.7/10 | 130 |

#### Platform Features

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **24/7 support** | Not enough data | 9.1 (124 reviews) | 
| **Proactive report alerts** | Not enough data | 9.2 (123 reviews) | 
| **Application  control** | Not enough data | 8.9 (118 reviews) | 
| **Proactive threat hunting** | Not enough data | 9.2 (122 reviews) | 
| **Rapid response time** | Not enough data | 9.3 (123 reviews) | 
| **Customizeable reports** | Not enough data | 8.7 (120 reviews) | 
| **Managed Services** | Not enough data | 9.5 (11 reviews) | 

#### Automation Capabilities

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Automated remediation** | Not enough data | 9.1 (121 reviews) | 
| **Automated investigation** | Not enough data | 9.1 (121 reviews) | 
| **AI Agents** | Not enough data | 5.3 (5 reviews) | 

### Antivirus

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | 6.0/10 | 8 |
| **ThreatDown** | 6.9/10 | 170 |

#### Generative AI

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **AI Text Generation** | 6.0 (8 reviews) | 6.8 (170 reviews) | 
| **AI Text Summarization** | 6.0 (8 reviews) | 6.9 (156 reviews) | 

### Endpoint Management

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | N/A | N/A |
| **ThreatDown** | 7.4/10 | 115 |

#### Generative AI

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **AI Text Summarization** | Not enough data | 7.4 (115 reviews) | 

### Endpoint Detection &amp; Response (EDR)

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | N/A | N/A |
| **ThreatDown** | 9.7/10 | 13 |

#### Services - Endpoint Detection &amp; Response (EDR) 

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Managed Services** | Not enough data | 9.7 (13 reviews) | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **Symantec End-user Endpoint Security** | N/A | N/A |
| **ThreatDown** | N/A | N/A |

#### System Control

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Device Control** | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | 

#### Security Management

| Feature | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (2):** [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Antivirus Software](https://www.g2.com/categories/antivirus)


**Unique to ThreatDown (3):** [Managed Detection and Response (MDR)  Software](https://www.g2.com/categories/managed-detection-and-response-mdr), [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Endpoint Management Software](https://www.g2.com/categories/endpoint-management)


---
## Reviewer Demographics

### By Company Size

| Segment | Symantec End-user Endpoint Security | ThreatDown | 
|---|---|---|
| **Small-Business** | 26.4% | 47.2% | 
| **Mid-Market** | 30.5% | 41.0% | 
| **Enterprise** | 43.1% | 11.8% | 

### By Industry

#### Symantec End-user Endpoint Security

- **Information Technology and Services:** 21.9%
- **Events Services:** 7.2%
- **Marketing and Advertising:** 6.0%
- **Financial Services:** 5.4%
- **Computer Software:** 5.2%
- **Telecommunications:** 3.9%
- **Retail:** 3.3%
- **Banking:** 2.5%
- **Hospital &amp; Health Care:** 1.9%
- **Computer &amp; Network Security:** 1.7%
- **Other:** 40.8%

#### ThreatDown

- **Information Technology and Services:** 12.9%
- **Computer &amp; Network Security:** 7.0%
- **Construction:** 4.6%
- **Computer Software:** 4.4%
- **Education Management:** 4.0%
- **Hospital &amp; Health Care:** 3.8%
- **Non-Profit Organization Management:** 3.4%
- **Higher Education:** 3.3%
- **Primary/Secondary Education:** 3.0%
- **Financial Services:** 2.8%
- **Other:** 51.0%

---
## Alternatives

### Alternatives to Symantec End-user Endpoint Security

- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (971 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.6/5 stars (408 reviews)
- [FortiClient](https://www.g2.com/products/forticlient/reviews) — 4.4/5 stars (274 reviews)
- [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews) — 4.5/5 stars (284 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Avast Small Business Cybersecurity](https://www.g2.com/products/avast-small-business-cybersecurity/reviews) — 4.4/5 stars (102 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [WatchGuard Endpoint Security](https://www.g2.com/products/watchguard-endpoint-security/reviews) — 4.4/5 stars (123 reviews)

### Alternatives to ThreatDown

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.6/5 stars (408 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (971 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [FortiClient](https://www.g2.com/products/forticlient/reviews) — 4.4/5 stars (274 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [Huntress Managed EDR](https://www.g2.com/products/huntress-managed-edr/reviews) — 4.9/5 stars (883 reviews)
- [WatchGuard Endpoint Security](https://www.g2.com/products/watchguard-endpoint-security/reviews) — 4.4/5 stars (123 reviews)

---
## Top Discussions

### Symantec End-user Endpoint Security

- Title: [Is Symantec Endpoint Protection good?](https://www.g2.com/discussions/is-symantec-endpoint-protection-good) — 1 comment
  > **Top comment:** "not good, it is great solution"
- Title: [How are the virus definitions done, how can it be so fast](https://www.g2.com/discussions/11893-how-are-the-virus-definitions-done-how-can-it-be-so-fast) — 1 comment, 1 upvote
  > **Top comment:** "Rapid release update are released every hour"
- Title: [What are the top competitive advantages?](https://www.g2.com/discussions/competitive-advantages) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "• SEP’s record of consistently providing the best protection (based on 3rd-party tests).
     o Gartner MQ for EPP 2018 – highest in execution and furthest..."
- Title: [What were the new features for Symantec Endpoint Protection 14.1?](https://www.g2.com/discussions/new-features-in-symantec-endpoint-protection-14-1) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "• Intensive Protection - Provides customers the ability to dial up and down the intensity of the protection engines to gain enhanced visibility into..."
- Title: [What is Symantec Endpoint Protection Hardening - Application Isolation?](https://www.g2.com/discussions/sep-hardening-application-isolation) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Application Isolation is an add-on to SEP 14 and uses the same agent to provide comprehensive application defense:

• Analyze and auto-classify risk levels..."

### ThreatDown

- Title: [Is Malwarebytes enough for your computer to be 100% secure?](https://www.g2.com/discussions/14696-is-malwarebytes-enough-for-your-computer-to-be-100-secure) — 5 comments, 1 upvote
  > **Top comment:** "Malwarebytes is not a virus scanner, a PC cleaner, nor is it a defragger. So it can not by itself keep your computer 100% secure, however Maywarebytes is one..."
- Title: [Using Malwarebytes EDR in a midsize company needs extra investment for web filter?](https://www.g2.com/discussions/using-malwarebytes-edr-in-a-midsize-company-needs-extra-investment-for-web-filter) — 4 comments, 1 upvote
  > **Top comment:** "No, MB catches sites that have malware on it and will block the site. "
- Title: [What is malwarebytes tray application?](https://www.g2.com/discussions/10146-what-is-malwarebytes-tray-application) — 4 comments, 1 upvote
  > **Top comment:** "You should see the Malwarebytes icon by the date/time in the upper right corner of your MacBook device.  You can right click to see options.  You can also go..."
- Title: [What additional products can Small Businesses benefit from with Malwarebytes as a Company?](https://www.g2.com/discussions/14733-what-additional-products-can-small-businesses-benefit-from-with-malwarebytes-as-a-company) — 3 comments, 1 upvote
  > **Top comment:** "I would advise you to visit below link, you will notice Currently Endpoint Protection comes with Cloud Support.
https://support.malwarebytes.com/

For any..."
- Title: [Best way to migrate the on-prem console to the cloud based environment ?](https://www.g2.com/discussions/13322-best-way-to-migrate-the-on-prem-console-to-the-cloud-based-environment) — 3 comments, 1 upvote
  > **Top comment:** "If you use the Discovery and Deployment tool there is a Migrate to Cloud option. Hope this helps and isn&#39;t too late."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/symantec-end-user-endpoint-security-vs-threatdown)

