Symantec Endpoint Protection

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Symantec Endpoint Protection 12.1.

6
Datasheet

Data Sheet: Endpoint Security

Overview
1
Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high . The
threat environment is evolving quickly and coupled with the size and complexity of today's networks, organizations are
struggling to keep up. SymantecTM Endpoint Protection is designed to address these challenges with a layered approach to
security at the endpoint. It goes beyond traditional antivirus to include firewall, IPS and advanced protection technologies
powered by the worlds largest civilian threat intelligence network. Symantec InsightTM technology blocks rapidly-mutating
malware and enables faster scan times, while SONARTM stops zero-day threats by monitoring file behavior and blocking
suspicious files while they execute. Granular policy settings such as system lockdown, application and device control provide
an added layer of security. With a single management console and high-powered agent, Symantec Endpoint Protection delivers
powerful protection at the endpoint without compromising performance.

Unriv
Unrivaled
aled Securit
Securityy
Stops targeted attacks and advanced persistent threats with intelligent security and layered protection

Leverages the worlds largest civilian threat intelligence network made up of 57 million attack sensors monitoring 175
million endpoints in 157 countries that feed data into our proactive protection technologies
Derived from this intelligence network, our unique Insight technology identifies file reputation by analyzing key file
attributes such as how often a file has been downloaded, how long has a file been there, and where it is being downloaded
from. This information allows us to block more threats and defend against new, mutating malware.
SONAR technology, also powered by this intelligence network, monitors application behavior in real-time and stops
targeted attacks and zero-day threats
Network Threat Protection analyzes incoming data streams that arrive on a users machine via network connections and
blocks threats before they hit the system
2
Symantec Endpoint Protection detects and removes threats more accurately , repeatedly scoring AAA rating, the highest
score, by Dennis Labs Real World A/V Test

Blazing P
Perf
erformance
ormance
Performance so fast your users won't know it is there.

The Symantec Insight technology included in Endpoint Protection accurately identifies file reputation so only at-risk fils
are scanned, effectively eliminating up to 70 percent of scan overhead compared to traditional solutions
Reduced client size by 90% with smaller memory footprint that better fits embedded systems and VDI
Reduces network load by providing flexible control over the number of connections and bandwidth
3
Outperforms all products in its class in scan speed and total performance impact

1. Symantec Internet Security Threat Report 2015


2. AV-Test, Product Review, Corporate Solutions for Windows 7, April 2015

1
Data Sheet: Endpoint Security
Symantec Endpoint Protection 12.1.6 Datasheet

Ability to throttle the bandwidth used between the client and the server

Smarter Management
Single management console across physical and virtual platforms with granular policy control

Delivers intelligent security technologies and policy lockdown features in a single high performance agent with a single
management console across PC, Mac, Linux, virtual machines, and embedded systems
Provides granular policy control with the flexibility to customize policies depending on users and their location
Supports remote deployment and client management for both PC and Mac making it easier to keep remote endpoints up-to-
date
Expands traditional reporting by incorporating multi-dimensional analysis and robust graphical reporting in an easy-to-use
dashboard
Group Update Provider reduces network overhead and decreases the time it takes to get updates by enabling one client to
send updates to another, enabling more effective updates in remote locations

5 Layers of Protection
Symantec Endpoint Protection 12.1.6 provides 5 la
layers
yers of pro
protection
tection in one high performance agent all managed through a
single console.

1) Net
Network:
work: Symantecs network threat protection includes Vantage technology that analyzes incoming data and blocks
threats while they travel through the network before hitting the system. Rules-based firewall and browser protection are also
included to protect against web-based attacks.

2) File: Signature-based antivirus looks for and eradicates malware on a system to protect against viruses, worms, Trojans,
spyware, bots, adware, and rootkits

3) Reputation: Symantecs unique Insight correlates tens of billions of linkages between users, files, and websites to detect
rapidly mutating threats. By analyzing key file attributes, Insight can accurately identify whether a file is good and assign a
reputation score to each file, effectively protecting against targeted attacks while reducing scan overhead by up to 70%.

4) Beha vior: SONAR leverages artificial intelligence to provide zero-day protection. It effectively stops new and unknown
Behavior:
threats by monitoring nearly 1,400 file behaviors while they execute in real-time to determine file risk.

5) Repair: Power Eraser aggressively scans infected endpoints to locate advanced persistent threats and remove tenacious
malware. Remote support enables the administrator to trigger the Power Eraser scan and remedy the infection remotely from
the Symantec Endpoint Protection management console.

3. PassMark Software, "Enterprise Endpoint Security Performance Benchmarks", 2014.

2
Data Sheet: Endpoint Security
Symantec Endpoint Protection 12.1.6 Datasheet

Extended Policy Control Features


In addition to core protection technologies, Symantec Endpoint Protection 12.1.6 also provides granular policy controls,
including:

1) Sys
ystem
tem LLock
ockdown:
down: Enhances protection for business critical systems by only allowing whitelisted applications (known to be
good) to run or by blocking blacklisted applications (known to be bad) from running

2) Application and Device Control: Helps prevent internal and external security breaches by monitoring application behavior
and controlling file access, registry access, processes that are allowed to run, and devices information can be written to

3) Ho
Hosst Inte
Integrit
grityy Checking & P
Polic
olicyy Enf
Enforcement
orcement: Allows users to run script on their endpoints to verify and report
compliance; quarantine location and peer-to-peer enforcement lockdown and isolate a non-compliant or infected system

4) Location A
Awareness
wareness: Automatically detects what location a system is connecting from, such as a hotel, hotspot, wireless
network, or VPN and adjusts the security to offer the best protection for the environment

Optimization for Virtual Environments


Symantec Endpoint Protection protects your high-density virtual environment while maintaining performance levels superior
to agentless solutions and providing end-to-end security visibility.
1) VMware vShield Inte
Integration:
gration: Allows higher VM density and reduces I/O and CPU usage
2) Virtual image ex
excep
ception:
tion: Whitelists files from a standard virtual machine image to optimize scanning

3
Data Sheet: Endpoint Security
Symantec Endpoint Protection 12.1.6 Datasheet

3) Resource leveling: Randomizes scan and update schedules to prevent resource utilization spikes
4) Shared Insight cache: Scans files once, shares the results between clients, and de-duplicates file scanning to reduce
bandwidth and latency
5) Virtual client tag
tagging:
ging: Automatically detects and reports whether the client is running in a virtual environment, making it
easier to set different policies for virtual machines
6) Offline image scanning: Finds threats in offline virtual machine images

7) Scan thro
throttling
ttling ffor
or virtualization: Detects disk load and reduces scan speed to prevent utilization spikes

* For a complete list of system requirements visit our support


page

4
Data Sheet: Endpoint Security
Symantec Endpoint Protection 12.1.6 Datasheet

More Information
Try it now for FREE
Try the leading solution in endpoint protection by downloading a free 30-day trial today:

http://www.symantec.com/endpoint-protection/trialware

Read third party reviews and find out why Gartner has ranked Symantec as a leader in the Endpoint Protection magic quadrant:

http://www.symantec.com/endpoint-protection/news-reviews

Visit our website


http://enterprise.symantec.com

To speak with a Product Specialist in the U.S.


Call toll-free 1 (800) 745 6054

To speak with a Product Specialist outside the U.S.


For specific country offices and contact numbers, please visit our website.

About Symantec
Symantec protects the worlds information, and is a global leader in security, backup and availability solutions. Our innovative
products and services protect people and information in any environment from the smallest mobile device, to the enterprise
data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our
customers confidence in a connected world. More information is available at www.symantec.com or by connecting with
Symantec at: go.symantec.com/socialmedia

Symantec World Headquarters


350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com

Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Other names may be trademarks of their respective owners.

21320633-3 07/15

You might also like