Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.
Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection is the lightest and the strongest endpoint protection on the market.
Have you considered a Managed Service for you End-Point Protection?
Anti-Virus - this protects against malware, rootkits, spyware and similar file based malicious code and has the usual options of: exclusions, schedule and real time scanning. Along with traditional viral file print matching, Symantec Endpoint Protection uses reputation lookups to positively identify known ‘good software and apps’ and hence classify possible risks. This is only possible due to Symantec’s global intelligence network (GIN) of some 350 million sensors which are constantly locating, fingerprinting and classifying software for addition to the reputation library.
DTFW - (Desk Top Fire Wall) - Typically enabled for endpoints that operate outside of the cooperate firewall. This module can self-determine its location and enable functionality automatically; i.e. inside the office LAN reduce protection, whilst when outside the LAN apply maximum network security connection control to the host. This module can also be used to prevent the corporate firewall being abridged; for instance preventing a laptop connecting to the LAN whilst in the office, and at the same time connecting via Wi-Fi to an external non-secured Wi-Fi node (local starbucks as an example). The DTFW also supports multiple NIC’s ensuring that different security controls can be applied to different ingress points on a single host.
USB & Attached media Contro - Managing USB attached devices connection state to host. A few examples of usage include:
Application Control - This module halts an application from launching, and thus preventing malicious code propagation or system configuration drift. Typically deployed for systems that are either high risk or high value and where a “lock-down” and “hardened” approach is needed. The enablement takes the form of “Denying” or “Allowing” process and services, having both options allowing flexibility of configuration. Usage scenario of this feature is to locking the registry from changes even if the user is a local administrator.
Advanced protection - zero day threats are risks that as yet have not been previously detected, as such signature scanning can miss such risks. SEP has a feature called Sonar that monitors processes every few minutes for both acceptable and suspicious activity. A few example of suspicious activity for instance would be a program not adding itself to the add/remove program stack, not having a help file associated with it, and invoking remote connections without user input. By scoring these and augmenting against the acceptable behaviour marks, a zero day threat can be identified and blocked.
Protect all your devices hassle-free
9 reasons Symantec Endpoint Protection Cloud is the ideal security candidate.Download Listicle »