Symantec Endpoint Protection 12.1

Similar documents
Symantec Endpoint Protection

Symantec Endpoint Protection

Symantec Endpoint Protection Datasheet

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

Symantec Endpoint Protection

Symantec Endpoint Protection

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

INFORMATION PROTECTED

How To Protect Your Computer From A Malicious Virus

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Getting Started with Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Endpoint protection for physical and virtual desktops

Total Defense Endpoint Premium r12

Endpoint Protection Small Business Edition 2013?

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Symantec Client Management Suite 8.0

Information Security Recommendation Report

Endpoint protection for physical and virtual desktops

Symantec Backup Exec.cloud

End to End Security do Endpoint ao Datacenter

Symantec Workspace Streaming 6.1

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Endpoint Protection Getting Started Guide

2012 Endpoint Security Best Practices Survey

CA Host-Based Intrusion Prevention System r8.1

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec ServiceDesk 7.1

Symantec Backup Exec 2010

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Payment Card Industry Data Security Standard

Altiris Server Management Suite 7.1 from Symantec

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Symantec Advanced Threat Protection: Network

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Symantec Desktop and Laptop Option 7.6

Symantec Endpoint Protection Getting Started Guide

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Symantec AntiVirus Enterprise Edition

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Symantec Server Management Suite 7.6 powered by Altiris technology

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Securing the endpoint and your data

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2

McAfee Server Security

Demystifying Virtualization for Small Businesses Executive Brief

Symantec Backup Exec System Recovery

AVeS Cloud Security powered by SYMANTEC TM

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Symantec IT Management Suite 7.5 powered by Altiris

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

McAfee Total Protection Reduce the Complexity of Managing Security

Endpoint Security More secure. Less complex. Less costs... More control.

Symantec Workspace Virtualization 7.6

IBM Tivoli Endpoint Manager for Security and Compliance

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

IBM Endpoint Manager Product Introduction and Overview

How To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows)

Small and Midsize Business Protection Guide

Virtualization Journey Stages

What s New in Ghost Solution Suite 3.0

Symantec Enterprise Vault for Microsoft Exchange

How To Monitor Your Entire It Environment

McAfee Endpoint Protection Products

IBM Tivoli Endpoint Manager for Security and Compliance

Solution Brief: Enterprise Security

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Insight. Security Response. Deployment Best Practices

Kaseya IT Automation Framework

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Enterprise Vault 11 Feature Briefing

Norton AntiVirus 9.0 for Macintosh

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Sage Grant Management System Requirements

Trend Micro. Advanced Security Built for the Cloud

Endpoint Security for DeltaV Systems

Symantec Messaging Gateway powered by Brightmail

BITDEFENDER ENDPOINT SECURITY TOOLS

Symantec Endpoint Protection Small Business Edition Implementation Guide

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Antivirus. Quick Start Guide. Antivirus

Transcription:

Unrivaled security. Blazing performance. Built for virtual environments. Overview Powered by Symantec Insight, Symantec Endpoint Protection is fast, powerful security for endpoints. It offers advanced defense against all types of attacks for both physical and virtual systems. Seamlessly integrating the essential security tools you need into a single, high performance agent with a single management console, Endpoint Protection provides world-class protection without slowing you down. Endpoint Protection makes it easy to manage security across both physical and virtual systems. Key Benefits Unrivaled security Detects new threats earlier and more accurately than signature or behavioral based solutions alone. Insight identifies new and zero day threats utilizing the collective wisdom of over 175 million systems in over 200 countries. Real-time SONAR examines programs as they run, identifying and stopping malicious behavior even for new and previously unknown threats. Leveraging Symantec s Global Intelligence Network, Endpoint Protection informs and automates responses to new threats. Proven to detect and remove more threats than any other solution in its class. Endpoint Protection detects more threats then do products from McAfee, Trend Micro or Microsoft. 1 Blazing performance Performance so fast your users won t know it is there. The Insight technology included in Endpoint Protection eliminates up to 70 percent of scan overhead compared to traditional solutions. Separates safe files from those at risk for faster, fewer, smarter scans. New, intelligence driven scan engine works while your computer is idle. 1. AV-Test.org, Real World Testing, February 2011 Page 1 of 5

Out performs all products in its class in scan speed, memory use and total performance impact. 2 Built for virtual environments Enhanced to help protect your virtual infrastructure. Takes much of the scanning out of each virtual machine, reducing scan overhead by up to 70 percent and disk input/output by as much as 90 percent. Prevents simultaneous scans and updates in virtual environments. Automatically identifies and manages virtual clients making it easy to create specific policies for virtual machines. Scans offline images. Detects more threats than virtual security solutions from McAfee or Trend Micro. 3 Key features Proactive threat detection Insight and SONAR detect new and rapidly mutating malware, stopping malicious behavior, including new and previously unknown threats. Virus and spyware protection Protects against viruses, worms, Trojans, spyware, bots, zero-day threats and root kits. Network threat protection Rules-based firewall engine, browser protection and Generic Exploit Blocking (GE) shields systems from drive-by downloads and from network based attacks. Single agent for multiple technologies Consolidates antivirus, antispyware, desktop firewall, intrusion prevention, device and application control, and network access control into a single agent. Intelligent management Centralized management and process automation helps increase threat visibility and accelerates threat response. Symantec Insight With Insight, malware creators are caught in a Catch-22 - mutate too little and get caught by signature based protection, mutate too much and get caught by Insight. Insight detects new and unknown threats that are missed by other approaches. Correlates tens of billions of linkages between users, files, and websites to identify rapidly mutating threats that may only exist on a few systems. Reduces scan overhead by as much as 70 percent by scanning only files at risk. Can t be evaded or coded around by mutated or encrypted malware. What's new Insight: Separates files at risk from those that are safe, for faster and more accurate malware detection. Real time SONAR 3: Examines programs as they run, identifying and stopping malicious behavior even for new and previously unknown threats. Browser protection: Scans for drive-by downloads and attacks directed at browser vulnerabilities. 2. PassMark Software, "Small Business Endpoint Protection Performance Benchmarks", February 2011 3. Dennis Labs. "Real World Testing in Virtual Environments", April 2011 Page 2 of 5

Built for virtual environments: Protects your virtual infrastructure. Virtual image exception: White list files from standard virtual machine image to optimize scanning. Resource leveling: Randomizes scan and update schedules to prevent resource utilization spikes. Shared Insight cache: Shares scans results centrally across virtual clients to reduce bandwidth and latency Virtual client tagging: Symantec Endpoint Protection Manager can automatically identify and manage virtual clients. Offline image scanning: Finds threats even in offline virtual machine images. Endpoint Protection for Apple OS X and Linux : Includes endpoint protection for OS X and Linux based systems. Faster central console: Optimized database to increase responsiveness. Smart scheduler: Stays out of your way by performing non-critical security tasks when your computer is idle. Enhanced client deployment: Improved wizards and more deployment options will allow new installs and upgrades to be faster and easier than ever before. Symantec Endpoint Protection Manager integration with Symantec Protection Center 2.0: Protection Center is a centralized security management console that allows organizations to identify emerging threats, prioritize tasks and accelerate time to protection based on relevant, actionable intelligence. Protection Center is a free product, available at no additional charge for existing Endpoint Protection 12 customers. Advanced reporting and analytics: Includes IT Analytics which complements and expands upon the traditional reporting offered by Endpoint Protection by incorporating multi-dimensional analysis and robust graphical reporting in an easy to use dashboard. How to choose the right Endpoint Protection product? Feature Symantec Endpoint Protection Small Business Edition 12.1 Symantec Endpoint Protection.cloud Symantec Endpoint Protection 12.1 Norton Internet Security 2011 Seats 5-99 5-250 100+ seats 1-5 seats Antivirus/Antispyware Desktop Firewall Intrusion Detection/Prevention Insight / SONAR Protection for Mac OS X Protection for Linux Device and Application Control Network Access Control Self- Enforcement ready Symantec Hosted Infrastructure Centrally Managed Built for Virtual Environments Page 3 of 5

System Requirements (for complete system requirements, please visit www.symantec.com) Symantec Endpoint Protection for Windows client Windows 2000, Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Small Business Server 2003, Windows Small Business Server 2008, Windows Essential Business Server 2008, or Windows Small Business Server 2011 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended) 64-bit processor: 2-GHz Pentium 4 or equivalent minimum (Itanium processors are not supported) 512 MB of RAM, or higher if required by the operating system (1 GB RAM recommended) 700MB disk space Symantec Endpoint Protection for Mac client PowerPC technology-based Mac running Mac OS X 10.4-10.5x Intel -based Mac running Mac OS X 10.4-10.6 256 MB of RAM (512 MB recommended) for 10.4; 512 MB for 10.5; 1 GB for 10.6 500 MB of available hard disk space for installation Symantec AntiVirus for Linux Client Red Hat Enterprise Linux, SUSE Linux Enterprise (server/desktop), Novell Open Enterprise Server, VMWare ES, Ubuntu, Debian, Fedora Symantec Endpoint Protection Manager Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Small Business Server 2003, Windows Small Business Server 2008, Windows Essential Business Server 2008, or Windows Small Business Server 2011 Microsoft SQL Server 2000 SP4 or SQL Server 2005 SP2 or SQL Server 2008 (optional) 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended) 64-bit processor: 2-GHz Pentium 4 or equivalent minimum 1 GB of RAM for 32-bit operating systems, 2 GB of RAM for 64-bit operating systems, or higher if required by the operating system (4 GB recommended) 4 GB disk for the server; plus 4 GB for the database Page 4 of 5

More Information For more information, visit our website http://www.symantec.com/business/endpoint-protection To speak with a Product Specialist in the U.S., call toll-free 1 (800) 745 6054 To speak with a Product Specialist in Australia, call toll-free 1800 808 089 To speak with a Product Specialist in New Zealand, call toll-free 0800 445 450 For specific country offices and contact numbers, please visit our website. About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. Symantec World Headquarters 350 Ellis St., Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions. Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Symantec helps organizations secure and manage their information-driven world with security management, endpoint security, messaging security, and application security solutions. 21194634 06/11 Page 5 of 5