Symantec Endpoint Protection



Similar documents
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

How To Protect Your Computer From A Malicious Virus

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Endpoint Protection Datasheet

Total Defense Endpoint Premium r12

Symantec Endpoint Protection A unified, proactive approach to endpoint security

Symantec AntiVirus Enterprise Edition

INFORMATION PROTECTED

CA Host-Based Intrusion Prevention System r8.1

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Endpoint protection for physical and virtual desktops

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Symantec Endpoint Protection

Symantec Endpoint Protection

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Getting Started with Symantec Endpoint Protection

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Symantec Endpoint Protection and Symantec Network Access Control

Small and Midsize Business Protection Guide

Symantec Endpoint Protection

Endpoint protection for physical and virtual desktops

Symantec Enterprise Vault for Lotus Domino

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Symantec Messaging Gateway powered by Brightmail

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Symantec Backup Exec System Recovery

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

IBM Endpoint Manager for Core Protection

Symantec Backup Exec 2010

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Symantec Endpoint Protection Getting Started Guide

Solution Brief: Enterprise Security

Symantec Messaging Gateway 10.5

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

IBM Endpoint Manager for Server Automation

BitDefender Client Security Workstation Security and Management

Symantec Endpoint Protection Getting Started Guide

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Endpoint Protection Small Business Edition 2013?

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Symantec Messaging Gateway 10.6

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

A progressive and integrated approach to protecting corporate networks

Payment Card Industry Data Security Standard

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

McAfee Total Protection Reduce the Complexity of Managing Security

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Altiris IT Management Suite 7.1 from Symantec

Symantec Backup Exec.cloud

Symantec Client Management Suite 7.5 powered by Altiris

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

Symantec Protection Suite Add-On for Hosted and Web Security

IBM Tivoli Endpoint Manager for Security and Compliance

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments

FortiClient dialup-client configurations

Symantec Endpoint Protection Getting Started Guide

Symantec Client Management Suite 7.6 powered by Altiris technology

McAfee Server Security

Comparing Free Virtualization Products

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

Proven LANDesk Solutions

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Kaseya IT Automation Framework

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Symantec Mail Security for Microsoft Exchange

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Symantec Endpoint Protection Getting Started Guide

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

2012 Endpoint Security Best Practices Survey

Symantec Backup Exec 12 for Windows Servers

Trend Micro OfficeScan 10.6 SP3 System Requirements

How To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows)

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

Host-based Intrusion Prevention System (HIPS)

Symantec AntiVirus for Network Attached Storage 5.1

Trend Micro OfficeScan 11.0 System Requirements

Transcription:

The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops, and servers. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware. Endpoint delivers more than world-class, industry-leading antivirus and antispyware signature-based protection. It also provides advanced threat prevention that protects endpoints from targeted attacks and attacks not seen before. It includes turnkey, proactive technologies that automatically analyze application behaviors and network communications to detect and block suspicious activities, as well as administrative control features that allow you to deny specific device and application activities deemed as high risk for your organization. You can even block specific actions based on the location of the user. This multilayered approach significantly lowers risks and gives you the confidence that your business assets are protected. It is a comprehensive product that gives you the capabilities you need now, along with the ability to enable the pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally motivated, endpoints will be protected. Endpoint increases protection and helps lower your total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. It provides a single agent that is administered by a single management console. This simplifies endpoint security administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program. Endpoint is easy to implement and deploy. provides a range of consulting, technical education, and support services that guide organizations through the migration, deployment, and management of the solution and help them realize the full value of their investment. For organizations that want to outsource security monitoring and management, also offers Managed Security Services to deliver real-time security protection. Single Agent and Single Console Antivirus Antispyware Firewall Intrusion Prevention Device and Application Control Results A unified approach to endpoint protection Increased protection, control, and manageability Reduced cost, complexity, and risk exposure Key benefits Secure Comprehensive protection Endpoint integrates best-of-breed technologies to stop security threats even from the most devious new and unknown attackers before they penetrate the network. It detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, and rootkits. Page 1 of 5

Proactive protection TruScan Proactive Threat Scan is a unique technology used to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rulebased configurations. Industry-best threat landscape intelligence protection mechanisms leverage the industry-leading Global Intelligence Network to deliver an unparalleled view of the entire Internet threat landscape. This intelligence results in actionable protection and peace of mind against evolving attacks. Simple Single agent, single console A full range of security technologies are integrated into a single agent and a centralized management console, with an intuitive user interface and Web-based graphical reporting. You are able to set and enforce security policies across the enterprise to protect your critical assets. Endpoint simplifies management, reduces system resource usage, and requires no additional agents when adding Network Access Control support. Network Access Control features are automatically enabled on the agent and management console with the purchase of a license. Easy to deploy Because it requires only a single agent and management console and it operates with an organization s existing security and IT investments, Endpoint is easy to implement and deploy. For organizations that want to outsource security monitoring and management, offers Managed Security Services to deliver real-time security protection. Lower cost of ownership Endpoint delivers a lower total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. This unified approach to endpoint security simplifies administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program. Seamless Easy to install, configure, and manage Endpoint makes it easy to enable/disable and configure desired technologies to fit into your environment. Network Access Control ready Each endpoint becomes Network Access Control ready, eliminating the need to deploy additional network access control endpoint agent software. Leverages existing security technologies and IT investments Endpoint works with other leading antivirus products, firewalls, IPS technologies, and network access control infrastructures. It also works with leading software deployment tools, patch management tools, and security information management tools. Integration with Altiris endpoint management solutions Distributing software packages, migrating older AntiVirus or other antivirus deployments, and viewing new agent rollout status and activity is easier. Key features More than antivirus Antivirus and antispyware Provides unmatched, bestof-breed malware protection, including market-leading antivirus protection, enhanced spyware protection, new rootkit protection, reduced memory footprint, and new dynamic performance adjustments to keep users productive. Network threat protection A rules-based firewall engine and Generic Exploit Blocking (GEB) block malware before it can enter a system. Page 2 of 5

Proactive threat protection Providing protection against unseen threats (i.e., zero-day threats), it includes TruScan Proactive Threat Scan, which does not rely on a signature. Single agent and single management console Antivirus, antispyware, desktop firewall, IPS, device and application control, and network access control (with the purchase of a Network Access Control license) are provided on a single agent all managed by a single console. Endpoint product family Endpoint Multi-tier Small Business Edition Multi-tier Antivirus Antispyware Firewall Device and application control Intrusion prevention Mail Security for Microsoft Exchange Mail Security for Domino Premium AntiSpam * * (for Groupware) Brightmail Gateway * software subscription Mobile AntiVirus * for Windows Mobile AntiVirus for Linux AntiVirus for Mac * Shaded area = Centrally managed by a single agent and single console * New additions. Note: If a customer does not want to use Endpoint when they purchase a bundle, they may install AntiVirus. They just need to go directly to Customer Care. In the new bundle, The Endpoint version is 11.0.3 (MR3). System requirements Client workstations and servers Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000 Professional,, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Home Edition, Professional Edition, Tablet PC Edition, Embedded Edition, Media Center Edition with Service Pack 1 or Business, Compute Cluster, Storage Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate Windows 2008 Standard Edition, Enterprise Windows Small Business Standard Edition, Windows Essential Business Standard Edition, Linux operating systems (32-bit and 64-bit versions): Red Hat Enterprise Linux 3.x, 4.x, 5.x SUSE Linux Enterprise (server/desktop) 9.x, 10.x Novell Open Enterprise (OES/OES2) VMware ES 2.5, 3.x Ubuntu 7.x, 8.x Debian 4.x Memory: 256 MB of RAM or more Hard Disk: 600 MB or more Page 3 of 5

Management server Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Professional Edition with Service Pack 1 or Business, Compute Cluster, Storage Windows 2008 Standard Edition, Enterprise Windows Small Business Standard Edition, Windows Essential Business Standard Edition, Memory: 1 GB of RAM or more Hard disk: 2 GB or more Management console Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000 Professional,, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Professional Edition with Service Pack 1 or Business, Compute Cluster, Storage Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate Windows 2008 Standard Edition, Enterprise Windows Small Business Standard Edition, Windows Essential Business Standard Edition, Memory: 512 MB of RAM or more Hard disk: 15 MB or more Database Embedded database provided. Also supports: Microsoft SQL 2000 with Service Pack 3 or Microsoft SQL 2005 Hard disk: 4 GB or more AntiVirus for Linux client Linux distribution supported: Component 32-bit 64-bit Red Hat Enterprise Linux 3.x, 4.x, 5.x SUSE Linux Enterprise (/Desktop) 9.x, 10.x Novell Open Enterprise (OES/OES2) VMware ES 2.5.x, 3.x Not centrally managed by the Endpoint Manager Page 4 of 5

Additional administrator tools Live Update Administrator Operating system supported: Microsoft Windows 2000, 2003, and P Processor: Intel Pentium 4 1.8 GHz Memory: 512 MB of RAM Hard disk: 5 GB More information Visit our Web site www.symantec.com/endpoint To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our Web site. About is a global leader in providing security, storage, and systems management solutions to help businesses and consumers manage their information. Headquartered in Cupertino, Calif., has operations in more than 40 countries. More information is available at www.symantec.com. World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA +1 (408) 517 8000 1 (800) 721 3934 www.symantec.com Copyright 2008 Corporation. All rights reserved., the Logo, AntiVirus, and Premium AntiSpam are trademarks or registered trademarks of Corporation or its affiliates in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Novell is a registered trademark of Novell, Inc. in the United States and other countries. Microsoft, Windows, Windows, and Windows Vista are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Intel, Pentium, and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Printed in the U.S.A. 12/08 12836807-4 Page 5 of 5