Call us on +44 (0)20 7621 7836 LinkedInTwitter

Call +44 (0)20 7621 7836 LinkedInTwitter

Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection is the lightest and the strongest endpoint protection on the market.

Have you considered a Managed Service for you End-Point Protection?

Anti-Virus - this protects against malware, rootkits, spyware and similar file based malicious code and has the usual options of: exclusions, schedule and real time scanning. Along with traditional viral file print matching, Symantec Endpoint Protection uses reputation lookups to positively identify known ‘good software and apps’ and hence classify possible risks. This is only possible due to Symantec’s global intelligence network (GIN) of some 350 million sensors which are constantly locating, fingerprinting and classifying software for addition to the reputation library.

DTFW - (Desk Top Fire Wall) - Typically enabled for endpoints that operate outside of the cooperate firewall. This module can self-determine its location and enable functionality automatically; i.e. inside the office LAN reduce protection, whilst when outside the LAN apply maximum network security connection control to the host. This module can also be used to prevent the corporate firewall being abridged; for instance preventing a laptop connecting to the LAN whilst in the office, and at the same time connecting via Wi-Fi to an external non-secured Wi-Fi node (local starbucks as an example). The DTFW also supports multiple NIC’s ensuring that different security controls can be applied to different ingress points on a single host.

USB & Attached media Contro - Managing USB attached devices connection state to host. A few examples of usage include:

  • Allowing USB storage media access and specifically preventing executable code form being copied to the host or network, thereby preventing malicious code ingress.  
  • Allowing USB storage access, but only for preauthorised storage devices, thereby allowing staff productivity of file sharing, whilst ensuring security via controlling the type of specific type and model of device to be used.
  • Allow USB file copying, but make a log of files copied and or moved, this helps with data loss management.

Application Control - This module halts an application from launching, and thus preventing malicious code propagation or system configuration drift. Typically deployed for systems that are either high risk or high value and where a “lock-down” and “hardened” approach is needed. The enablement takes the form of “Denying” or “Allowing” process and services, having both options allowing flexibility of configuration. Usage scenario of this feature is to locking the registry from changes even if the user is a local administrator.

Advanced protection - zero day threats are risks that as yet have not been previously detected, as such signature scanning can miss such risks. SEP has a feature called Sonar that monitors processes every few minutes for both acceptable and suspicious activity. A few example of suspicious activity for instance would be a program not adding itself to the add/remove program stack, not having a help file associated with it, and invoking remote connections without user input. By scoring these and augmenting against the acceptable behaviour marks, a zero day threat can be identified and blocked.

Key Features & Benefits

  • A single agent incorporating five endpoint security components
  • Support for: Windows (Including Win8), MAC and Linux.
  • Additional options for:
  1. Mobile devices & Smart phones
  2. SharePoint
  3. MS exchange
  4. Lotus Notes
  5. File Transfer Protocol (FTP)
  6. Web Gateway Security
  7. Email Gateway
  • Optimised for virtualised environments – eliminate scan storms, secure the host and protect all guest OS’s.
  • Improved Performance – low footprint, fast scanning and non-intrusive.


Protect all your devices hassle-free

9 reasons Symantec Endpoint Protection Cloud is the ideal security candidate.

Download Listicle »

Free Trial Offer

Request a free trial of Symantec Endpoint Protection Cloud.

Alternatively call the team today on 020 7621 7836 or email us.