FTP Info
FTP Info
FTP Info
Overview
The attack surface of organizations continues to increase as the
THREAT PREVENTION adoption of cloud applications, including generative AI increases. In
addition, pressures to provide remote access to users continues despite
INNOVATIONS
post-pandemic hybrid work trends. All of these issues around digital
• Adaptive Protection: Intelligent, transformation have also increased the pressure to meet new and existing
automated attack surface reduction regulatory requirements across multiple jurisdictions. Organizations must
without disruption of normal address all of these challenges in an environment of economic uncertainty
business operations and geopolitical tensions.
• Application Control: Discovery
and control of risky applications, Figure 1: Modern Challenges for Global Enterprises
including detailed risk assessments
and smart recommendations for
administrators
• Active Directory Security:
Protection against initial access,
privilege escalation, and credential
theft used by attackers for lateral
movement leveraging AI-driven
obfuscation of Active Directory
query results
• Threat Hunter: Expert threat Broadcom understands the needs of global organizations and how the
hunters apply machine learning evolving threat landscape requires firms to continuously improve their
analytics and expert analysis to threat prevention and data protection, all while simplifying IT and security
expose and notify customers of the staff operations. These two sets of capabilities are key to the success of
early signs of stealth attacks that enterprises that require the highest levels of security for important data
otherwise would evade detection
assets. In addition, global organizations must demonstrate that regulated
• Dedicated IP Addresses: Prevent data meets multiple compliance standards requiring threat prevention and
the use of unassigned IP addresses data protection that extends everywhere data resides.
by threat actors who want to gain
unauthorized access to sensitive Symantec® Enterprise Cloud delivers advanced threat and sensitive data
applications and conduct malicious detection across endpoint, email, web traffic, and cloud applications. This
activities solution allows customers to discover and block targeted attacks and data
• ZTNA Threat Prevention: Cloud- breaches that would otherwise go undetected.
native, multi-layered threat
Our solution employs a modern approach that keeps our customers ahead
inspection and detection for zero
of threats by protecting what attackers target and enterprises value most,
trust network access (ZTNA)
critical data assets, and the devices and networks used to access this
connections
information.
• Mobile Threat Defense: Proactive
protection for mobile devices from This document describes the current Symantec software threat prevention
malware, network threats, and and data protection innovations. These innovations are critical for
application or OS vulnerability customers today, and Symantec software innovations will continue to
exploits address evolving threats in the future.
Global enterprises want to streamline operations with uniform data protection policies across all control channels
(endpoint, network, cloud, and email). They also need adaptive and contextual technologies that give better insight
into risk mitigation and data loss prevention. Symantec Enterprise Cloud permits customers to apply a single, risk-
aware policy across multiple channels.
Broadcom continually invests in Symantec data protection innovations, including the following features:
• Generative AI Protection – Employees can easily expose sensitive and proprietary information when leveraging
generative AI applications. As generative AI use increases, enterprises need to assess the risk of this category
of applications and ensure a safe environment to understand how users leverage generative AI. Symantec’s
innovative approach to the discovery, analysis, monitoring, and control of these applications means each
enterprise can manage the adoption of generative AI applications that conforms to their risk appetite.
• ZTNA Data Protection – Symantec Enterprise Cloud merges ZTNA and DLP capabilities. DLP policies can
now be applied to private resources and corporate assets in the cloud to avoid unintentional or malicious data
exfiltration, and ensure that your organization meets compliance and data privacy regulations. DLP enforces
cloud storage, sharing, and access policies for HIPAA, PCI, PII, and other sensitive data. As organizations look to
protect their assets in the cloud, they can ensure that protection with the DLP integration, their security and risk
teams can meet those compliance obligations. Moreover, with the advantage of the DLP single-policy engine, you
can extend the same DLP policies that you use in on-premises, cloud, and web environments. You can apply the
policies to your corporate assets through a secure ZTNA connection to ensure that data is protected and does
not leave the organization.
Figure 2: Symantec Enterprise Cloud – A Modern Solution for Threat Prevention, Data Protection, and More
Conclusion
Symantec software products continue to lead the way in the two most critical areas of security capabilities:
threat prevention and data protection. At their core, these innovations delivered in Symantec Enterprise Cloud
give organizations the flexibility to adjust their threat prevention and data protection deployments for maximum
efficiency and efficacy.
Symantec researchers have decades of expertise and global intelligence to decompose attack methods and model
how motivated attackers use legitimate and malicious tools to exfiltrate data. Symantec Enterprise Cloud leverages
this learning by delivering layered capabilities that allow our customers to secure their data assets with minimal
impact on their users or business processes.
Broadcom has delivered Symantec threat prevention and data protection capabilities at an accelerated pace. Unlike
other cybersecurity organizations, we focus on the needs of large and complex organizations with strict security
and compliance requirements. Our modern approach, using leading-edge innovations, means streamlined security
operations and continual improvement in an adopting organization’s risk posture.