Symantec Endpoint Security vs Acronis Cyber Protect Cloud
by Gralio Feb 11, 2025
Symantec Endpoint Security offers robust endpoint protection but may be resource intensive. Acronis Cyber Protect Cloud provides a more integrated solution with backup and recovery but might have a simpler endpoint security feature set.
At Gralio.ai we help to simplify your decision-making process by offering detailed, side-by-side
software comparisons like this one, to help you confidently choose the tool that aligns with your
business goals.
This comparison was created by analysing 1928 reviews and 60
websites, saving 11 hours, 12 minutes of reading.
Symantec Endpoint Security is not related to the provided information about Passwhere, a geographical password management system. Symantec Endpoint Security is a comprehensive security suite aimed at protecting businesses from cyberthreats. It safeguards computers and servers from viruses, malware, and other online risks. This is achieved through various features like antivirus, firewall, and intrusion detection working together to offer robust protection.
Acronis Cyber Protect Cloud is a comprehensive security solution for businesses of all sizes. It offers an all-in-one platform that combines backup and recovery, anti-malware, and endpoint protection. This means your data is safeguarded, your systems are defended against viruses and other threats, and your devices are managed from a central location. Acronis Cyber Protect Cloud stands out for its integration of these features, simplifying your security management and increasing efficiency. The software promises to simplify your IT operations while providing robust protection for your valuable data and systems.
Summary
Main difference
Symantec Endpoint Security is a traditional endpoint security suite focusing on device-level protection against malware and threats, while Acronis Cyber Protect Cloud offers a broader approach integrating backup and recovery with its security features.
Relative strengths of Symantec Endpoint Security (compared to Acronis Cyber Protect Cloud)
Stronger focus on endpoint protection with advanced features like anti-exploit and real-time scanning.
Easier deployment with Active Directory integration.
Established reputation and wide range of security features.
Relative weaknesses of Symantec Endpoint Security (compared to Acronis Cyber Protect Cloud)
Can be resource-intensive, impacting system performance.
More complex user interface.
Potential support challenges due to Broadcom acquisition.
Who should use Symantec Endpoint Security VS. Acronis Cyber Protect Cloud
Symantec Endpoint Security offers comprehensive endpoint protection ideal for businesses prioritizing robust security. Users praise its effectiveness against threats and centralized management. However, some find it resource-intensive and challenging to uninstall. Consider this if your business needs strong security but be prepared to manage potential performance impact.
Acronis Cyber Protect Cloud offers unified data protection and cybersecurity for businesses of all sizes. Users praise its easy implementation and centralized management. However, some report slow loading times and limited AD integration. Best for organizations needing a combined backup, recovery, anti-malware, and endpoint protection solution.
Ideal for small, medium, and large enterprises, especially those with established IT infrastructure.
Strong fit for regulated industries like healthcare, finance, government, and education requiring robust security.
Ideal for small, medium, and enterprise businesses seeking streamlined security.
Strong fit for software, IT, and telecom companies; suitable for various other sectors.
Symantec Endpoint Security and Acronis Cyber Protect Cloud features
Supported
Partially supported
Not supported
Type in the name of the feature or in your own words tell us what you need
Cloud storage
Not supported
Symantec Endpoint Security does not appear to support cloud storage backups.
Supported
Acronis Cyber Protect Cloud supports storing backups on various cloud storage services, including Azure and S3.
Citrix support
Not supported
Citrix virtual machine backup and restore is not supported.
Limited AD integration and inability to backup AD instances.
Mobile app limitations and lack of advanced tier features.
Symantec Endpoint Security and Acronis Cyber Protect Cloud Ratings
G2
4.4/5
(428)
Capterra
4.4/5
(522)
Glassdoor
3.3/5
(5224)
G2
4.7/5
(979)
Glassdoor
4.8/5
(3)
Company health
Employee growth
15% decrease in the last year
8% decrease in the last year
Web traffic
7% decrease in the last quarter
3% increase in the last quarter
Financing
November 2017 - $100B
June 2022 - $658M
How do Symantec's endpoint threat detection capabilities compare to Acronis' integrated anti-malware?
Symantec Endpoint Security offers a more traditional endpoint threat detection suite, including real-time scanning, anti-exploit protection, and a dedicated endpoint status dashboard. While Acronis Cyber Protect Cloud integrates anti-malware functionality, it's presented as part of a broader platform emphasizing backup and recovery, suggesting Symantec's solution may provide more specialized and in-depth endpoint threat detection capabilities.
Which product offers easier management for combined backup and security features?
Acronis Cyber Protect Cloud offers easier management for combined backup and security features. Its all-in-one platform integrates backup and recovery, anti-malware, and endpoint protection into a single solution, managed from a central location. While Symantec Endpoint Security provides robust security features, it does not natively include backup and recovery, requiring separate solutions and potentially complicating management.
What are the advantages of Symantec Endpoint Security?
Symantec Endpoint Security offers robust, real-time protection against various threats, including viruses, malware, and ransomware. It's easily deployed, especially within Active Directory environments, and features a centralized management console for streamlined monitoring and updates. Automatic virus definition updates ensure continuous protection. It also includes a wide range of security features beyond antivirus, such as firewall and intrusion prevention.
What are the disadvantages of Symantec Endpoint Security?
Symantec Endpoint Security has been criticized for high system resource usage, leading to performance slowdowns. Users also report difficulties uninstalling the software, occasional false positives, and a complex web console interface. Finally, the acquisition by Broadcom has introduced support issues and confusing user portals.
Alternatives to Symantec Endpoint Security and Acronis Cyber Protect Cloud
Symantec Endpoint Security, now known as Passwhere, is a unique, geographically-based password management system. Instead of memorizing complex passwords, users choose memorable locations on a map. These locations generate secure, unique passwords not stored on any server, enhancing security by keeping passwords entirely client-side. This method aims to simplify password management for individuals and organizations while minimizing the risk of compromise.
Coro Cybersecurity is a comprehensive, all-in-one cybersecurity platform designed specifically for midsized companies. It offers a range of security features including email and data protection, endpoint security, and cloud app security, all managed from a single, user-friendly dashboard. Coro utilizes artificial intelligence to automate threat detection and remediation, simplifying cybersecurity management for businesses without dedicated IT teams.
Symantec Management Center and Reporting is not the correct product in this instance. The information you have provided references Passwhere, a geographical password management system.
Passwhere focuses on secure password generation and recollection using geographical locations instead of traditional passwords. It allows users to generate strong passwords based on chosen locations on Earth. No passwords are stored on servers, enhancing security. The product caters to both individual users and organizations.
ESET PROTECT Complete is a comprehensive cybersecurity solution for businesses of all sizes. It protects your computers, servers, and mobile devices, as well as your email and cloud applications. This is achieved through a combination of antivirus, anti-malware, anti-spam, firewall, and other security features. ESET PROTECT Complete is managed from a single, easy-to-use console, and it can be deployed on-premises or in the cloud. Its goal is to prevent threats like ransomware and data breaches before they can cause damage. It stands out with its multilayered protection approach, using artificial intelligence and machine learning to stay ahead of threats.
Trend Micro Smart Protection Suite is a cybersecurity solution for businesses of all sizes. It offers different packages to protect devices, email, and web activity from threats. The suite includes features like antivirus, web filtering, data loss prevention, and threat detection. It also offers centralized management, making it easier for IT teams to control security across the company. Trend Micro is recognized as a leader in endpoint security by industry analysts.
CrowdStrike Falcon protects your computer systems from cyberattacks. It's a cloud-based system, so there's no bulky software to install and manage yourself. CrowdStrike is known for being user-friendly and fast, using artificial intelligence to stop threats. Many companies, big and small, trust CrowdStrike to keep their data safe.
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.
How are we doing?
Is this information helpful to you? Is there anything we are missing?