Symantec Endpoint Protection
Stops targeted attacks and advanced persistent threats with intelligent security and layered protection
- Symantec Endpoint Protection leverages the world’s largest civilian threat intelligence network to deliver advanced protection at the endpoint. This network consists of telemetry data coming from 175 million endpoints and 57 million attack sensors in 175 countries, providing unique visibility into the latest security threats.
- Derived from this intelligence network, our unique InsightTM technology identifies file reputation by analyzing key file attributes such as how often a file has been downloaded, how long a file has been there, and where it is being downloaded from. This information allows us to block more threats and defend against new, mutating malware.
- SONARTM technology, also powered by this intelligence network, monitors application behavior in real-time and stops targeted attacks and zero-day threats
- Network Threat Protection analyzes incoming data streams and blocks threats while they travel through the network before hitting endpoints
- SymantecTM Endpoint Protection detects and removes threats more accurately2, repeatedly scoring a AAA rating, the highest score, by Dennis Labs Real World A/V Test
- The latest version is integrated with Symantec Advanced Threat Protection (ATP) designed to detect, respond and block targeted attacks faster. The integration offers the ability to communicate directly with Symantec Endpoint Protection clients, flagging and reporting any anomalous activity to ATP.
Performance so fast your users won’t know it is there
- Insight reputation technology accurately identifies file reputation so only at-risk files are scanned, effectively eliminating up to 70 percent of scan overhead compared to traditional solutions
- Symantec Endpoint Protection outperforms all products in its class in terms of scan speed and total performance impact3
- Optimizes content delivery for faster distribution and lower storage requirements. Virus definition sets require 90% less
- disk space on Symantec Endpoint Protection Manager.
- Supports embedded systems and Virtual Desktop Infrastructures (VDI) with smaller client size for reduced memory footprint
Single management console across physical and virtual platforms with granular policy control
- Delivers intelligent security technologies and policy lockdown features in a single high performance agent with a single management console across Windows®, Mac®, Linux®, virtual machines, and embedded systems
- Provides granular policy control with the flexibility to customize policies depending on users and their location
- Supports remote deployment and client management for both Windows® and Mac® systems making it easier to keep remote
- endpoints up-to-date
- Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use
- Reduces network overhead and decreases the time it takes to get updates by allowing one client to send updates to another
- (Group Update Provider). This also facilitates more effective updates in remote locations.
Five Layers of Protection
Symantec Endpoint Protection 12.1.6 provides five layers of protection in one high performance agent all managed through a single console.
Extended Policy Control Features
In addition to core protection technologies, Symantec Endpoint Protection 12.1.6 also provides granular policy controls, including:
Optimization for Virtual Environments
Symantec Endpoint Protection protects your high-density virtual environment while maintaining performance levels superiorto agentless solutions and providing end-to-end security visibility.
- VMware vShield™ Integration: Allows higher virtual machine (VM) density and reduces I/O and CPU usage
- Virtual Image Exception: Whitelists files from a standard virtual machine image to optimize scanning
- Resource Leveling: Randomizes scan and update schedules to prevent resource utilization spikes
- Shared Insight™ Cache: Scans files once, shares the results between clients, and de-duplicates file scanning to reduce
- bandwidth and latency
- Virtual Client Tagging: Automatically detects and reports whether the client is running in a virtual environment, making it
- easier to set different policies for virtual machines
- Offline Image Scanning: Finds threats in offline VM images
Scan Throttling for Virtualization: Detects disk load and reduces scan speed to prevent utilization spikes