Symantec EndPoint Protection

More Views

Quick overview:

Securing the cloud generation

Availability   : In stock

Product no  : 2QQQOZF0-EI1EC

Price             : Contact to Sales

Details

OVERVIEW

To protect against today’s sophisticated threat landscape, customers need to stop threats regardless of how their endpoints are attacked. Accomplishing this requires certain capabilities:

• Advanced technologies to detect unknown threats and prevent zero-day attacks including ransomware

• Memory exploit prevention for popular applications and operating systems

• Access to the richest global threat intelligence to protect against threats in real-time

• Orchestrated response to stop threats quickly

• Proven protection across all devices without compromising performance

Symantec Endpoint Protection14 is designed to address today’s threat landscape with a comprehensive approach that spans the attack chain and provides defense in depth. By utilizing the world’s largest civilian threat intelligence network, Symantec Endpoint Protection 14 can effectively stop advanced threats with next generation technologies that apply advanced machine-learning, file reputation analysis, and real-time behavioral monitoring. In addition to essential prevention technologies that are equally important to an organization's overall protection. With a single management console and lightweight agent that can integrate with other products in the security infrastructure to quickly respond to threats, Symantec Endpoint Protection 14 provides protection at the endpoint without compromising

Details

FEATURES

Comprehensive Protection across the Attack Chain

A combination of next generation and essential technologies stop advanced threats and rapidly mutating malware regardless of how they attack your endpoint - all in a high-performance, lightweight agent.

Incursion:

Network Intrusion Prevention, URL, and Firewall Policies: Symantec’s network threat protection technology analyzes incoming and outgoing traffic and blocks threats while they travel through the network before hitting endpoints. Rules-based firewall and browser protection are available to protect against web-based attacks. In general, with strong network protection, over half of threats can be detected before delivery to the endpoint.

• Application Behavioral Control: Controls file and registry access and how processes are allowed to run.

Unrivaled Security

Stops targeted attacks and advanced persistent threats with intelligent security and layered protection

• Symantec Endpoint Protection leverages the world's largest civilian threat intelligence network to deliver advanced protection at the endpoint. This network consists of telemetry data coming from 175 million endpoints and 57 million attack sensors in 175 countries, providing unique visibility into the latest security threats.

• Derived from this intelligence network, our unique Insight™ technology identifies file reputation by analyzing key file attributes such as how often a file has been downloaded, how long a file has been there, and where it is being downloaded from. This information allows us to block more threats and defend against new, mutating malware.

• SONAR™ technology, also powered by this intelligence network, monitors application behavior in real-time and stops targeted attacks and zero-day threats

• Network Threat Protection analyzes incoming data streams and blocks threats while they travel through the network before hitting endpoints

• Symantec™ Endpoint Protection detects and removes threats more accurately2, repeatedly scoring an AAA rating, the highest score, by Dennis Labs Real World A/V Test • The latest version is integrated with Symantec Advanced Threat Protection (ATP) designed to detect, respond and block targeted attacks faster. The integration offers the ability to communicate directly with Symantec Endpoint Protection clients, flagging and reporting any anomalous activity to ATP

• The latest version is integrated with Symantec Advanced Threat Protection (ATP) designed to detect, respond and block targeted attacks faster. The integration offers the ability to communicate directly with Symantec Endpoint Protection clients, flagging and reporting any anomalous activity to ATP

Blazing Performance

Performance so fast your users won't know it is there

• Insight™ reputation technology accurately identifies file reputation so only at-risk files are scanned, effectively eliminating up to 70 percent of scan overhead compared to traditional solutions

Symantec™ Endpoint Protection outperforms all products in its class in terms of scan speed and total performance impact3

• Optimizes content delivery for faster distribution and lower storage requirements. Virus definition sets require 90% less disk space on Symantec™ Endpoint Protection Manager.

• Supports embedded systems and Virtual Desktop Infrastructures (VDI) with smaller client size for reduced memory footprint

Smarter Management Single management console across physical and virtual platforms with granular policy control

• Delivers intelligent security technologies and policy lockdown features in a single

• Delivers intelligent security technologies and policy lockdown features in a single high-performance agent with a single management console across Windows, Mac, Linux, virtual machines, and embedded systems

• Provides granular policy control with the flexibility to customize policies depending on users and their location

• Supports remote deployment and client management for both Windows® and Mac® systems making it easier to keep remote endpoints up-to-date

• Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use dashboard

• Reduces network overhead and decreases the time it takes to get updates by allowing one client to send updates to another (Group Update Provider). This also facilitates more effective updates in remote locations.

• Delivers intelligent security technologies and policy lockdown features in a single high-performance agent with a single management console across Windows® , Mac® , Linux® , virtual machines, and embedded systems

• Provides granular policy control with the flexibility to customize policies depending on users and their location

• Supports remote deployment and client management for both Windows® and Mac® systems making it easier to keep remote endpoints up-to-date

• Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use dashboard

• Reduces network overhead and decreases the time it takes to get updates by allowing one client to send updates to another (Group Update Provider). This also facilitates more effective updates in remote locations.

Five Layers of Protection

Symantec™ Endpoint Protection provides five layers of protection in one high-performance agent all managed through a single console.

1) Network: Symantec’s network threat protection technology analyzes incoming data and blocks threats while they travel through the network before hitting endpoints. Rules-based firewall and browser protection are also included to protect against web-based attacks.

2) File: Signature-based antivirus and advanced file heuristics look for and eradicate malware on a system to protect against viruses, worms, Trojans, spyware, bots, adware, and rootkits

3) Reputation: Symantec’s unique Insight™ correlates tens of billions of linkages between users, files, and websites to detect rapidly mutating threats. By analyzing key file attributes, Insight™ can accurately identify whether a file is good or bad and assign a reputation score, effectively protecting against targeted attacks while reducing scan overhead by up to 70 percent.

4) Behavior: SONAR™ leverages artificial intelligence to provide zero-day protection. It effectively stops new and unknown threats by monitoring nearly 1,400 file behaviors while they execute in real-time to determine file risk.

5) Repair: Power Eraser™ aggressively scans infected endpoints to locate advanced persistent threats and remove tenacious malware. Remote support enables the administrator to trigger the Power Eraser scan and remedy the infection remotely from the Symantec™ Endpoint Protection management console.

Extended Policy Control Features

In addition to core protection technologies, Symantec™ Endpoint Protection also provides granular policy controls, including:

1) Application Control: Allows you to control file and registry access and how processes are allowed to run. It also includes advanced system lockdown features, only allowing whitelisted applications (known to be good) to run, or blocking blacklisted applications (known to be bad) from running.

2) External Media Control: Allows you to restrict access to select hardware and control what types of devices can upload or download information.External media control can be combined with application control to offer more flexible control policies.

3) Host Integrity Checking & Policy Enforcement: Ensures endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet your requirements

Optimization for Virtual Environments

Symantec™ Endpoint Protection protects your high-density virtual environment while maintaining performance levels superior to agentless solutions and providing end-to-end security visibility.

1) VMware vShield™ Integration: Allows higher virtual machine (VM) density and reduces I/O and CPU usage

2) Virtual Image Exception: Whitelists files from a standard virtual machine image to optimize scanning

3) Resource Leveling: Randomizes scan and update schedules to prevent resource utilization spikes

4) Shared Insight™ Cache: Scans files once, shares the results of clients, and de-duplicates file scanning to reduce bandwidth and latency

5) Virtual Client Tagging: Automatically detects and reports whether the client is running in a virtual environment, making it easier to set different policies for virtual machines

6) Offline Image Scanning: Finds threats in offline VM images

7) Scan Throttling for Virtualization: Detects disk load and reduces scan speed to prevent utilization spikes

Details

BENEFITS

Advanced Capabilities Deliver High-Performance

Although Symantec Endpoint Protection includes a wide breadth of technologies, it has been optimized so as not to slow down the network or the user; and consistently performs at the top of third party tests in terms of performance.

• Intelligent Threat Cloud's rapid scan capabilities using advanced techniques such as pipelining, trust propagation, and batched queries has made it unnecessary to download all signature definitions to the endpoint to maintain a high level of effectiveness. Therefore, only the newest threat information is downloaded, reducing the size of signature definition files by up to 70%, which in turn reduces bandwidth usage.

• With the additional effectiveness provided by Advanced Machine Learning on the endpoint not only has the frequency of downloads been reduced, but there is a minimum of disruption due to false positives to impact productivity

 • The single lightweight agent combines technologies and capabilities normally only obtained through multiple agents: machine learning, exploit mitigation, Endpoint Detection and Response (EDR), and antimalware. This presents the organization with the opportunity to reduce the number of managed agents on their endpoints for possible performance increases; while reducing the burden on IT and lowering total cost of ownership.

Easy Integration for an Orchestrated Response at the Endpoint

Symantec Endpoint Protection includes a single console and agent that offers protection across operating systems, platforms and businesses of any size.

Power Eraser: An aggressive tool, which can be triggered remotely, to address advanced persistent threats and remedy tenacious malware.

Host Integrity: Ensures endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet your requirements. Use with threat detection products to orchestrate a response to quarantine an infected endpoint to quickly stop the spread of infection until you can remediate or reimage the endpoint.

System Lockdown: Allow whitelisted applications (known to be good) to run, or block blacklisted applications (known to be bad) from running. Symantec Advanced Threat Protection (ATP) and Secure Web Gateway can use the programmable APIs to communicate with the SEP Management (SEPM) Console and orchestrate a response to blacklist newly discovered malicious applications using Application Control. Runs on Windows, Mac, Linux, virtual machines, and embedded systems.

• Secure Web Gateway Integration: New programmable REST APIs make integration possible with existing security infrastructure including Secure Web Gateway, orchestrating a response at the endpoint to quickly stop the spread of infection. 

• EDR Console (ATP: Endpoint) Integration: Symantec Endpoint Protection is integrated with Symantec Advanced Threat Protection: Endpoint (EDR Console) designed to detect, respond and block targeted attacks and advanced persistent threats faster by prioritizing attacks. EDR (Endpoint Detection and Response) capability is built into Symantec Endpoint Protection makes it unnecessary to deploy additional agents.

Specifications

Benefits

BENEFITS

Advanced Capabilities Deliver High-Performance

Although Symantec Endpoint Protection includes a wide breadth of technologies, it has been optimized so as not to slow down the network or the user; and consistently performs at the top of third party tests in terms of performance.

• Intelligent Threat Cloud's rapid scan capabilities using advanced techniques such as pipelining, trust propagation, and batched queries has made it unnecessary to download all signature definitions to the endpoint to maintain a high level of effectiveness. Therefore, only the newest threat information is downloaded, reducing the size of signature definition files by up to 70%, which in turn reduces bandwidth usage.

• With the additional effectiveness provided by Advanced Machine Learning on the endpoint not only has the frequency of downloads been reduced, but there is a minimum of disruption due to false positives to impact productivity

 • The single lightweight agent combines technologies and capabilities normally only obtained through multiple agents: machine learning, exploit mitigation, Endpoint Detection and Response (EDR), and antimalware. This presents the organization with the opportunity to reduce the number of managed agents on their endpoints for possible performance increases; while reducing the burden on IT and lowering total cost of ownership.

Easy Integration for an Orchestrated Response at the Endpoint

Symantec Endpoint Protection includes a single console and agent that offers protection across operating systems, platforms and businesses of any size.

Power Eraser: An aggressive tool, which can be triggered remotely, to address advanced persistent threats and remedy tenacious malware.

Host Integrity: Ensures endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet your requirements. Use with threat detection products to orchestrate a response to quarantine an infected endpoint to quickly stop the spread of infection until you can remediate or reimage the endpoint.

System Lockdown: Allow whitelisted applications (known to be good) to run, or block blacklisted applications (known to be bad) from running. Symantec Advanced Threat Protection (ATP) and Secure Web Gateway can use the programmable APIs to communicate with the SEP Management (SEPM) Console and orchestrate a response to blacklist newly discovered malicious applications using Application Control. Runs on Windows, Mac, Linux, virtual machines, and embedded systems.

• Secure Web Gateway Integration: New programmable REST APIs make integration possible with existing security infrastructure including Secure Web Gateway, orchestrating a response at the endpoint to quickly stop the spread of infection. 

• EDR Console (ATP: Endpoint) Integration: Symantec Endpoint Protection is integrated with Symantec Advanced Threat Protection: Endpoint (EDR Console) designed to detect, respond and block targeted attacks and advanced persistent threats faster by prioritizing attacks. EDR (Endpoint Detection and Response) capability is built into Symantec Endpoint Protection makes it unnecessary to deploy additional agents.

Features

FEATURES

Comprehensive Protection across the Attack Chain

A combination of next generation and essential technologies stop advanced threats and rapidly mutating malware regardless of how they attack your endpoint - all in a high-performance, lightweight agent.

Incursion:

Network Intrusion Prevention, URL, and Firewall Policies: Symantec’s network threat protection technology analyzes incoming and outgoing traffic and blocks threats while they travel through the network before hitting endpoints. Rules-based firewall and browser protection are available to protect against web-based attacks. In general, with strong network protection, over half of threats can be detected before delivery to the endpoint.

• Application Behavioral Control: Controls file and registry access and how processes are allowed to run.

Unrivaled Security

Stops targeted attacks and advanced persistent threats with intelligent security and layered protection

• Symantec Endpoint Protection leverages the world's largest civilian threat intelligence network to deliver advanced protection at the endpoint. This network consists of telemetry data coming from 175 million endpoints and 57 million attack sensors in 175 countries, providing unique visibility into the latest security threats.

• Derived from this intelligence network, our unique Insight™ technology identifies file reputation by analyzing key file attributes such as how often a file has been downloaded, how long a file has been there, and where it is being downloaded from. This information allows us to block more threats and defend against new, mutating malware.

• SONAR™ technology, also powered by this intelligence network, monitors application behavior in real-time and stops targeted attacks and zero-day threats

• Network Threat Protection analyzes incoming data streams and blocks threats while they travel through the network before hitting endpoints

• Symantec™ Endpoint Protection detects and removes threats more accurately2, repeatedly scoring an AAA rating, the highest score, by Dennis Labs Real World A/V Test • The latest version is integrated with Symantec Advanced Threat Protection (ATP) designed to detect, respond and block targeted attacks faster. The integration offers the ability to communicate directly with Symantec Endpoint Protection clients, flagging and reporting any anomalous activity to ATP

• The latest version is integrated with Symantec Advanced Threat Protection (ATP) designed to detect, respond and block targeted attacks faster. The integration offers the ability to communicate directly with Symantec Endpoint Protection clients, flagging and reporting any anomalous activity to ATP

Blazing Performance

Performance so fast your users won't know it is there

• Insight™ reputation technology accurately identifies file reputation so only at-risk files are scanned, effectively eliminating up to 70 percent of scan overhead compared to traditional solutions

Symantec™ Endpoint Protection outperforms all products in its class in terms of scan speed and total performance impact3

• Optimizes content delivery for faster distribution and lower storage requirements. Virus definition sets require 90% less disk space on Symantec™ Endpoint Protection Manager.

• Supports embedded systems and Virtual Desktop Infrastructures (VDI) with smaller client size for reduced memory footprint

Smarter Management Single management console across physical and virtual platforms with granular policy control

• Delivers intelligent security technologies and policy lockdown features in a single

• Delivers intelligent security technologies and policy lockdown features in a single high-performance agent with a single management console across Windows, Mac, Linux, virtual machines, and embedded systems

• Provides granular policy control with the flexibility to customize policies depending on users and their location

• Supports remote deployment and client management for both Windows® and Mac® systems making it easier to keep remote endpoints up-to-date

• Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use dashboard

• Reduces network overhead and decreases the time it takes to get updates by allowing one client to send updates to another (Group Update Provider). This also facilitates more effective updates in remote locations.

• Delivers intelligent security technologies and policy lockdown features in a single high-performance agent with a single management console across Windows® , Mac® , Linux® , virtual machines, and embedded systems

• Provides granular policy control with the flexibility to customize policies depending on users and their location

• Supports remote deployment and client management for both Windows® and Mac® systems making it easier to keep remote endpoints up-to-date

• Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use dashboard

• Reduces network overhead and decreases the time it takes to get updates by allowing one client to send updates to another (Group Update Provider). This also facilitates more effective updates in remote locations.

Five Layers of Protection

Symantec™ Endpoint Protection provides five layers of protection in one high-performance agent all managed through a single console.

1) Network: Symantec’s network threat protection technology analyzes incoming data and blocks threats while they travel through the network before hitting endpoints. Rules-based firewall and browser protection are also included to protect against web-based attacks.

2) File: Signature-based antivirus and advanced file heuristics look for and eradicate malware on a system to protect against viruses, worms, Trojans, spyware, bots, adware, and rootkits

3) Reputation: Symantec’s unique Insight™ correlates tens of billions of linkages between users, files, and websites to detect rapidly mutating threats. By analyzing key file attributes, Insight™ can accurately identify whether a file is good or bad and assign a reputation score, effectively protecting against targeted attacks while reducing scan overhead by up to 70 percent.

4) Behavior: SONAR™ leverages artificial intelligence to provide zero-day protection. It effectively stops new and unknown threats by monitoring nearly 1,400 file behaviors while they execute in real-time to determine file risk.

5) Repair: Power Eraser™ aggressively scans infected endpoints to locate advanced persistent threats and remove tenacious malware. Remote support enables the administrator to trigger the Power Eraser scan and remedy the infection remotely from the Symantec™ Endpoint Protection management console.

Extended Policy Control Features

In addition to core protection technologies, Symantec™ Endpoint Protection also provides granular policy controls, including:

1) Application Control: Allows you to control file and registry access and how processes are allowed to run. It also includes advanced system lockdown features, only allowing whitelisted applications (known to be good) to run, or blocking blacklisted applications (known to be bad) from running.

2) External Media Control: Allows you to restrict access to select hardware and control what types of devices can upload or download information.External media control can be combined with application control to offer more flexible control policies.

3) Host Integrity Checking & Policy Enforcement: Ensures endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet your requirements

Optimization for Virtual Environments

Symantec™ Endpoint Protection protects your high-density virtual environment while maintaining performance levels superior to agentless solutions and providing end-to-end security visibility.

1) VMware vShield™ Integration: Allows higher virtual machine (VM) density and reduces I/O and CPU usage

2) Virtual Image Exception: Whitelists files from a standard virtual machine image to optimize scanning

3) Resource Leveling: Randomizes scan and update schedules to prevent resource utilization spikes

4) Shared Insight™ Cache: Scans files once, shares the results of clients, and de-duplicates file scanning to reduce bandwidth and latency

5) Virtual Client Tagging: Automatically detects and reports whether the client is running in a virtual environment, making it easier to set different policies for virtual machines

6) Offline Image Scanning: Finds threats in offline VM images

7) Scan Throttling for Virtualization: Detects disk load and reduces scan speed to prevent utilization spikes

Documentation No
Send inquiry? Yes

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Reviews

Write Your Own Review

You're reviewing: Symantec EndPoint Protection