Symantec Endpoint Security

Symantec endpoint protection SEP14

 

As a Symantec Specialist Platinum Partner and foremost provider of Symantec Endpoint Security solutions, Threatscape’s experience in designing, deploying and supporting Endpoint Security is unparalleled. Having completed deployments across some of the largest Government and Private sector organisations, our engineers’ product and project knowledge ensures our customers benefit with effective and speedy deployments, delivering additional ROI. We have deployed and continue to support customers in the Airline, Energy, Road/Rail Transport and Government sectors to name a few with environments ranging from hundreds to hundreds of thousands of systems across the globe.

 

 

Symantec Endpoint Protection

 

Symantec Endpoint Protection is built on multiple layers of protection, including Symantec Insight and SONAR both of which provide protection against new and unknown threats. Built for virtual environments, it can integrate with VMware vShield Endpoint for dramatically improved performance. Symantec Endpoint Protection includes the latest features for improved security, performance and management. Integrated protection technologies such as network access control, antivirus, antispyware, desktop firewall, intrusion prevention, and application and device control technologies.

 

  • Anti-Virus and Anti-Spyware for Windows, Linux and Macintosh – Symantec provides unmatched, malware protection, market-leading anti-virus and spyware protection, as well as rootkit protection.
  • Endpoint Firewall – Network threat protection in the form of a rule-based desktop firewall engine and generic exploit blocking to block malware before it can enter a system.
  • Intrusion Prevention – proactive threat protection, SONAR examines programs as they run, identifying and stopping malicious behaviour even for new and previously unknown threats.
  • Device and Application Control – Prevents internal security breaches by controlling what information an application is allowed to access and what type of device that information can be written to.

 

 

Network Access Control

 

Symantec Network Access Control protects networks from unauthorised, misconfigured, and infected endpoint computing devices. For example, Symantec Network Access Control can deny network access to the client computers that do not run specific versions of software and signatures. If client computers do not comply, Symantec Network Access Control can quarantine and remediate the computers.

 

Data Centre Security

 

Symantec Data Centre Security enables organisations to harden their physical and virtual servers as well as their private clouds; continuously monitor the security and compliance posture of their on-premise data centers, public clouds, and private clouds; protect legacy infrastructure from zero-day threats and new vulnerabilities, securely transition into software-defined data centers; and enable microsegmentation to deliver application-centric security.

 

 

Symantec Mobile Management

 

Symantec Mobile Management (SMM) provides policy based application deployment, device control and security policy management for Android, Apple iOS, Blackberry, and Windows Mobile/CE devices.

 

 

Access Control & Authentication – Symantec VIP

 

Symantec Validation and ID Protection Service is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorised attackers. A unified solution providing both two-factor and risk-based token-less authentication, VIP is based on open standards and can easily integrate into enterprise applications.

 

 

New Key Features of Symantec Endpoint Protection (SEP 14)

 

  • Advanced Machine Learning – Advanced machine learning on the endpoint stops new and unknown threats reducing our dependence on signatures. Using the trillions of samples of good and bad files in the global intelligence network to train the machine learning results in a very low false positive rate.

 

  • Memory Exploit Mitigation – Neutralises zero-day exploits like Heap Spray, SEHOP overwrite, and Java exploits in popular software that have not been patched by the vendor. This signatureless technology works regardless of the flaw, bug, or vulnerability.

 

  • Emulator – The high-speed emulator detects malware hidden using polymorphic custom packers. The static data scanner runs each file in milliseconds in a lightweight virtual machine to cause threats to reveal themselves, improving not only Symantec’s detection rates but performance.

 

  • Intelligence Threat Cloud – Rapid scan capabilities using advanced techniques such as pipelining, trust propagation, and batched queries has made it unnecessary to download all signature definitions to the endpoint to maintain a high level of effectiveness. Therefore, only the newest threat information is downloaded, reducing the size of signature definition files by up to 70% which in turn reduces bandwidth usage.

 

 

For more information or product demonstration, please contact us at sales@threatscape.com