Symantec Endpoint Protection 12.1.5 Datasheet



Similar documents
Symantec Endpoint Protection

Symantec Endpoint Protection

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

INFORMATION PROTECTED

Symantec Endpoint Protection

End to End Security do Endpoint ao Datacenter

Endpoint protection for physical and virtual desktops

Symantec Client Management Suite 7.6 powered by Altiris technology

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Symantec Protection Suite Small Business Edition

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Endpoint Protection Getting Started Guide

Symantec Messaging Gateway 10.5

Symantec Advanced Threat Protection: Network

Symantec Mobile Security

Endpoint protection for physical and virtual desktops

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

How To Protect Your Computer From A Malicious Virus

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec

IBM Endpoint Manager for Core Protection

Endpoint Protection Small Business Edition 2013?

Symantec Encryption Solutions for , Powered by PGP Technology

Getting Started with Symantec Endpoint Protection

Symantec Client Management Suite 8.0

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Symantec IT Management Suite 7.5 powered by Altiris

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Symantec Backup Exec.cloud

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Securing the endpoint and your data

Veritas Cluster Server from Symantec

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Symantec Protection Suite Small Business Edition

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Symantec Messaging Gateway 10.6

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Total Defense Endpoint Premium r12

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Endpoint Protection Getting Started Guide

Symantec Client Management Suite 7.5 powered by Altiris

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Superior protection from Internet threats and control over unsafe web usage

McAfee MOVE AntiVirus Multi-Platform 3.5.0

Symantec Server Management Suite 7.6 powered by Altiris technology

McAfee Server Security

Symantec Endpoint Protection Small Business Edition Implementation Guide

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Symantec Workspace Virtualization 7.6

Symantec AntiVirus Enterprise Edition

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

CA Host-Based Intrusion Prevention System r8.1

Symantec Control Compliance Suite Standards Manager

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

SNOW LICENSE MANAGER (7.X)... 3

ESET Security Solutions for Your Business

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Kaseya IT Automation Framework

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Symantec Backup Exec 2012

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

SNOW LICENSE MANAGER (7.X)... 3

BITDEFENDER ENDPOINT SECURITY TOOLS

Closing the Vulnerability Gap of Third- Party Patching

Comprehensive security platform for physical, virtual, and cloud servers

#ITtrends #ITTRENDS SYMANTEC VISION

Microsoft Windows Apple Mac OS X

Symantec Endpoint Protection MP1a and MP1 Release Notes

Symantec Messaging Gateway powered by Brightmail

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Veritas Storage Foundation High Availability for Windows by Symantec

Microsoft Windows Apple Mac OS X

Virtualization Journey Stages

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery

BMC Client Management - Technical Specifications. Version 12.0

AVeS Cloud Security powered by SYMANTEC TM

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Trend Micro deep security 9.6

Patch Management SoftwareTechnical Specs

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments

GravityZone INSTALLATION GUIDE

Transcription:

Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It is time to move beyond antivirus. Symantec s unique ability to provide intelligent security leverages the collective wisdom of the world s largest Global Intelligence Network (GIN) that gathers data from millions of users and sensors. Derived from GIN, the exceptional Insight technology in Symantec Endpoint Protection blocks mutating threats and enables faster scan time by analysing a file s reputation. Meanwhile, SONAR technology stops zero-day threats by monitoring file behaviour in real time. With a single high-powered agent that integrates intelligent security technologies with strong antivirus and policy lockdown, Symantec Endpoint Protection 12.1.5 allows you to focus on your business without compromising security or performance. Unrivalled security Stops targeted attacks and advanced persistent threats with intelligent security and layered protection that go beyond antivirus Leverages the world s largest Global Intelligence Network (GIN) made up of hundreds of millions of sensors that feed data into our proactive protection technologies Derived from GIN, the unique Insight technology identifies file reputation by analysing key file attributes such as how often a file has been downloaded, how long has a file been there and where it is being downloaded from. This information allows us to block more threats and defend against new, mutating malware. SONAR technology, also powered by GIN, monitors application behaviour in real time and stops targeted attacks and zeroday threats. Network Threat Protection analyses incoming data streams that arrive on a user s machine via network connections and blocks threats before they hit the system. Symantec Endpoint Protection detects and removes more threats than any other solution in its class 1, repeatedly scoring AAA rating, the highest score, by Dennis Labs Real World A/V Test. Blazing performance Performance so fast your users will not know it is there. The Symantec Insight technology included in Endpoint Protection eliminates up to 70% of scan overheads compared to traditional solutions by accurately identifying file reputation so only at-risk files are scanned. Allows hardware to run faster and last longer thanks to reduced system impact. Reduces network load by providing flexible control over the number of connections and bandwidth. Out performs all products in its class in scan speed and total performance impact 2. 1 AV-TEST, Product Review, Corporate Solutions for Windows 7, July/August 2013. 2 PassMark Software, Enterprise Endpoint Security Performance Benchmarks, 2014. 1

Smarter management Single management console across physical and virtual platforms with granular policy control. Delivers intelligent security technologies and policy lockdown features in a single high performance agent with a single management console across PC, Mac, Linux and virtual machines. Provides granular policy control with the flexibility to customise policies depending on users and their location. Supports remote deployment and client management for both PC and Mac making it easier to keep remote endpoints up-to-date. Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use dashboard. Group Update Provider reduces network overhead and decreases the time it takes to get updates by enabling one client to send updates to another, enabling more effective updates in remote locations. 5 Layers of Protection Symantec Endpoint Protection 12.1.5 provides 5-layers of protection- 1) network 2) file 3) reputation 4) behaviour and 5) repair: 1) Network: Symantec s network threat protection includes Vantage technology that analyses incoming data and blocks threats while they travel through the network before hitting the system. Rules-based firewall and browser protection are also included to protect against web-based attacks. 2) File: Signature-based antivirus looks for and eradicates malware on a system to protect against viruses, worms, Trojans, spyware, bots, adware and rootkits. 3) Reputation: Symantec s unique Insight correlates tens of billions of linkages between users, files and websites to detect rapidly mutating threats. By analysing key file attributes, Insight can accurately identify whether a file is good and assign a reputation score to each file, effectively protecting against targeted attacks while reducing scan overhead by up to 70%. 4) Behaviour: SONAR leverages artificial intelligence to provide zero-day protection. It effectively stops new and unknown threats by monitoring nearly 1,400 file behaviours while they execute in real time to determine file risk. 5) Repair: Power Eraser aggressively scans infected endpoints to locate Advanced Persistent Threats and remove tenacious malware. Remote support enables the administrator to trigger the Power Eraser scan and remedy the infection remotely from the Symantec Endpoint Protection management console. Firewall and intrusion prevention Network Blocks malware before it spreads to your machine and controls traffic Antivirus File Scans and eradicates malware that arrives on a system Insight Reputation Determines safety of files and websites using the wisdom of the community Sonar Behaviours Monitors and blocks programs that exhibit suspicious behaviours Power eraser Repair Aggressive remediation of hard-to-remove infections 2

Extended Policy Control Features In addition to core protection technologies, Symantec Endpoint Protection 12.1.5 also provides granular policy controls, including: 1) System Lockdown: Enhances protection for business critical systems by only allowing whitelisted applications (known to be good) to run or by blocking blacklisted applications (known to be bad) from running. 2) Application and Device Control: Helps prevent internal and external security breaches by monitoring application behaviour and controlling file access, registry access, processes that are allowed to run and devices information can be written to. 3) Host Integrity Checking and Policy Enforcement: Allows users to run script on their endpoints to verify and report compliance; quarantine location and peer-to-peer enforcement lockdown and isolate a non-compliant or infected system. 4) Location Awareness: Automatically detects what location a system is connecting from, such as a hotel, hotspot, wireless network or VPN and adjusts the security to offer the best protection for the environment. System Lockdown Application Control Device Control Host Integrity Tightly control applications through advanced whitelisting and blacklisting Monitor and control the behaviour of applications Restrict and enable access to the hardware that can be used Ensures endpoints are protected and compliant Virtual Optimisation Symantec Endpoint Protection protects your high-density virtual environment while maintaining performance levels superior to agentless solutions and providing end-to-end security visibility. 1) VMware vshield Integration: Allows higher VM density and reduces I/O and CPU usage. 2) Virtual image exception: Whitelists files from a standard virtual machine image to optimise scanning. 3) Resource levelling: Randomises scan and update schedules to prevent resource utilisation spikes. 4) Shared Insight cache: Scans files once, shares the results between clients and de-duplicates file scanning to reduce bandwidth and latency. 5) Virtual client tagging: Automatically detects and reports whether the client is running in a virtual environment, making it easier to set different policies for virtual machines. 6) Offline image scanning: Finds threats in offline virtual machine images. 7) Scan throttling for virtualisation: Detects disk load and reduces scan speed to prevent utilisation spikes. 3

Client Workstation and Server System Requirements* Windows Operating Systems Windows XP (32-bit, SP2 or later; 64-bit) Windows XP Embedded (SP2 or later) Windows Vista (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows 7 Embedded Windows 8 (32-bit, 64-bit) Windows Server 2003 (32-bit, 64-bit, R2 or SP1 or later) Windows Server 2008 (32-bit, 64-bit, including R2) Windows Server 2012 (32-bit, including R2) Windows Small Business Server 2011 (64-bit) Windows Essential Business Server 2008 (64-bit) Macintosh Operating Systems MAC OS X 10.6.8, 10.7, 10.8, 10.9 MAC OS X Server 10.6, 10.7, 10.8, 10.9 Linux Operating Systems (32-bit and 64-bit versions) Red Hat Enterprise Linux SuSE Linux Enterprise (server/desktop) Novell Open Enterprise Server Oracle Linux VMWare ESX Ubuntu Debian Fedora Virtual Environments vsphere Server (ESXi) Microsoft Hyper-V Citrix XenServer, XenDesktop, XenApp Hardware Requirements 1 GHz CPU or higher 512 MB of RAM (1 GB recommended) 850 MB of free space on the hard disk Manager System Requirements Windows Operating Systems Windows 7 Windows XP (32-bit, SP3 or later; 64-bit, SP2 or later) Windows Server 2003 (32-bit, 64-bit, R2 or SP1 or later) Windows Server 2008 (32-bit, 64-bit, including R2) Windows Small Business Server 2008 (64-bit) Windows Small Business Server 2011 (64-bit) Windows Essential Business Server 2008 (64-bit) Windows Server 2012 (64-bit, including R2) Hardware 1 GHz CPU or higher 1 GB of RAM (2 GB recommended) 16 GB or more free space on the hard drive Web Browser Microsoft Internet Explorer Mozilla Firefox Database Embedded database included or chose from the following: SQL Server 2005, SP4 or later SQL Server 2008 and R2 SQL Server 2012 SQL Server 2014 * For a complete list of system requirements visit our support page Try it now for FREE Try the leading solution in endpoint protection by downloading a free 30-day trial today: http://www.symantec.com/endpoint-protection/trialware Read third party reviews and find out why Gartner has ranked Symantec as a leader in the Endpoint Protection magic quadrant: http://www.symantec.com/endpoint-protection/news-reviews 4

More Information Visit our website http://enterprise.symantec.com To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec protects the world s information and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 +1 (800) 721 3934 www.symantec.com Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21320633-2UK 07/14 5