Maybe not so much, as a number of vulnerabilities have been uncovered across those product lines. The researchers at Google's "Project Zero" state that "these vulnerabilities are as bad as it gets" since they require no user interaction and affect the default configuration while running at the highest privilege levels. Due to the configuration of the Symantec filter driver that intercepts system input/output, an attacker can simply email a file or a link to a victim in order to gain access to the system. The victim doesn't need to open the file nor click on the link; no user interaction is necessary.
All versions of Symantec/Norton product lines have been affected due to the Symantec engine flaw, both home and enterprise versions, on most operating systems (Windows, in which the kernel can be corrupted, along with UNIX variants such as Linux and OSX).
Symantec has jumped on it and has written - and continues to update - remedies for these potentially catastrophic vulnerabilities, although to date no exploits have been reported. On the other hand, owners of compromised systems hit by such an exploit might well have simply trashed their old systems and reimaged their data from backup.
In any case, people who use Norton legacy products such as Norton Security, Norton 360, etc. should have received, or will receive, the patches via the "liveupdate" subfeature in the various applications, no matter the platform OS.
Users of Symantec Endpoint Protection, Email Security, Protection Engine, etc. may need to do some work, as some of the products cannot be automatically updated (which may be platform-dependent). In these cases, Symantec has published advisories regarding their decomposer engine issue.