Symantec Endpoint Protection


Score     93.19%

Buy Now

How are TSA Scores determined?

The Software Authority strives to be different! Our results are based on factual data and you will never see a non-certified product that you never heard of being rated highly for the sole purpose of pushing sales like we often see on other review sites.

With increasing computer processor speeds being able to handle heavy workloads and improving performance significantly, TSA Scores are focused more on how well a security product protects your system from malware, viruses, and threats as opposed to how much system impact does this security product have. Reality is, if you obtain a nasty Ransomware virus as an example, does having a product that uses limited computer resources matter if you can no longer access your computer?

The TSA Score is determined by analyzing the latest review data from multiple independent testing laboratories, other reputable third party review sites and our many years of experience in the security software industry. The results from these sources are then inputted into a proprietary formula that determines the final TSA Score.

Independent Lab Results


Symantec Endpoint Protection

Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.
Stronger, faster, lighter

Symantec Endpoint Protection 14 reduces bandwidth usage and definition file sizes by 70 percent over previous versions.

Our proprietary real-time cloud lookup enables faster scanning times.

Supports machine learning, exploit prevention, Endpoint Detection and Response (EDR), and antimalware, from one single agent.

Reduce total cost of ownership and IT resources via automated updates.

Respond and protect at scale

Integrates seamlessly with Symantec Blue Coat ProxySG web gateway and other security controls via programmable APIs to respond smartly at the endpoint.

See and manage all your endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems.

Ensure the most current protection with self-updating endpoint agents and extended LiveUpdate Administrator capabilities to support security patching.

175 million endpoints at your service

Symantec’s global intelligence network of 175 million endpoints and our advanced machine learning technologies allow you to detect threats more accurately.

Advanced machine learning done right: Stop unknown threats with advanced machine learning AI to deliver maximum protection at the endpoint with minimal false positives.

Wrap your endpoints in multi-layered protection—artificial intelligence in the cloud, combined with critical endpoint technologies creates the most threat-resistant endpoint security in the world.

Block zero-day attacks that prey on memory-based vulnerabilities in many popular applications with memory exploit mitigation.

Integrated cyber defense stops tomorrow’s advanced threats as well as today’s

Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection is our lightest and the strongest endpoint protection on the market.


System Requirements

System Requirements

Client Workstation and Server System Requirements

Windows Operating Systems

Windows Vista (32-bit, 64-bit)

Windows 7 (32-bit, 64-bit, RTM and SP1)

Windows 7 Embedded Standard

Windows 8 (32-bit, 64-bit)

Windows 8 Embedded (32 bit)

Windows 8.1

Windows 10**

Windows Server 2003 (32-bit, 64-bit, R2 or SP1 or later)

Windows Server 2008 (32-bit, 64-bit, including R2)

Windows Server 2012 (64-bit, including R2)

Windows Small Business Server 2011 (64-bit)

Windows Essential Business Server 2008 (64-bit)

Windows Server 2016

Macintosh Operating Systems

Mac OS X 10.9, 10.10, 10.11, Mac OS 10.12

Linux Operating Systems (32-bit and 64-bit versions)

Red Hat Enterprise Linux

SuSE Linux Enterprise (server/desktop)

Novell Open Enterprise Server

Oracle Linux





Virtual Environments

Windows Azure

Amazon WorkSpaces

VMware WS 5.0, GSX 3.2, ESX 2.5 or later

VMWare ESXi 4.1 – 5.5

VMware ESX 6.0

Microsoft Virtual Server 2005

Microsoft Enterprise Desktop Virtualization (MED-V)

Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V

Citrix XenServer 5.6 or later

Virtual Box by Oracle

Hardware Requirements

1GHz CPU or higher

512 MB of RAM (1 GB recommended)

1.5 GB of free space on the hard disk

Mac Hardware Requirements

64 – Bit Intel Core 2 Duo or later

2 GB of RAM

500 MB of free space on the hard disk

Linux Hardware Requirements

Intel Pentium 4 (2 GHz CPU or higher)

1 GB of RAM

7 GB of free space on the hard disk

Panda-234 Panda Adaptive Defense 360 Gold Award Winner

Avast-234 Avast Endpoint Protection Silver Award Winner

AVG-234 AVG AntiVirus Business Bronze Award Winner