Symantec Endpoint Protection

Similar documents
Symantec Multi-tier Protection

Symantec Multi-tier Protection

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Symantec Client Security. Integrated protection for network and remote clients.

Key Features. DATA SHEET

Evaluation Program for Symantec Mail Security Appliances

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Symantec Endpoint Protection

A NEW DIMENSION FOR DELL SOFTWARE SOFTWARE SOLUTIONS APRIL 2009

Symantec Endpoint Protection 11.0

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Implementation Guide for Symantec Endpoint Protection Small Business Edition

Symantec Endpoint Protection 14

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Symantec Enterprise Solution Product Guide

Seqrite Endpoint Security

Symantec Network Security 7100 Series

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Symantec Backup Exec System Recovery

McAfee Public Cloud Server Security Suite

Veritas Provisioning Manager

CA Host-Based Intrusion Prevention System r8

Symantec Security Monitoring Services

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure

Trend Micro Deep Security

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,

McAfee Embedded Control

for businesses with more than 25 seats

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

SaaS Flyer for Trend Micro

Symantec Endpoint Protection Getting Started Guide

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Symantec Protection Suite Add-On for Hosted Security

for businesses with more than 25 seats

Symantec Advanced Threat Protection: Endpoint

Veritas NetBackup 6.5 Clients and Agents

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

McAfee Embedded Control for Retail

IBM Internet Security Systems Proventia Management SiteProtector

McAfee Endpoint Threat Defense and Response Family

Cisco Network Admission Control (NAC) Solution

Symantec Business Continuity Solutions for Operational Risk Management

Veritas Volume Replicator Option by Symantec

ESET Secure Business. Simple and Straightforward

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

For Businesses with more than 25 seats.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012

Symantec System Recovery 2013 Management Solution FAQ

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Owner of the content within this article is Written by Marc Grote

Altiris Client Management Suite 7.1 from Symantec User Guide

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

A Guide to Closing All Potential VDI Security Gaps

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings

Veritas Storage Foundation for Windows by Symantec

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Veritas Storage Foundation for Windows by Symantec

Vulnerability Management

SentinelOne Technical Brief

Protecting Your Digital World

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Building Resilience in a Digital Enterprise

Changing face of endpoint security

IBM United States Software Announcement , dated November 15, 2011

Get BitDefender Client Security 2 Years 30 PCs software suite ]

WHITE PAPER: ENDPOINT SECURITY. Symantec Endpoint Protection Managed Services Implementation Guide

Novell ZENworks 7.2 Linux Management

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Securing Today s Mobile Workforce

Cisco Security Appliances

Symantec Enterprise Vault

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Transforming Security from Defense in Depth to Comprehensive Security Assurance

The threat landscape is constantly

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

INSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security

etrust Antivirus Release 7.1

TRAPS ADVANCED ENDPOINT PROTECTION

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

McAfee Network Security Platform 8.3

Transcription:

The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops, and servers. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware. Endpoint delivers more than world-class, industry-leading antivirus and antispyware signature-based protection. It also provides advanced threat prevention that protects endpoints from targeted attacks and attacks not seen before. It includes turnkey, proactive technologies that automatically analyze application behaviors and network communications to detect and block suspicious activities, as well as administrative control features that allow you to deny specific device and application activities deemed as high risk for your organization. You can even block specific actions based on the location of the user. This multilayered approach significantly lowers risks and gives you the confidence that your business assets are protected. It is a comprehensive product that gives you the capabilities you need now, along with the ability to enable the pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally motivated, endpoints will be protected. Endpoint increases protection and helps lower your total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. It provides a single agent that is administered by a single management console. This simplifies endpoint security administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program. Endpoint is easy to implement and deploy. provides a range of consulting, technical education, and support services that guide organizations through the migration, deployment, and management of the solution and help them realize the full value of their investment. For organizations that want to outsource security monitoring and management, also offers Managed Security Services to deliver real-time security protection. Single Agent and Single Console Antivirus Antispyware Firewall Intrusion Prevention Device and Application Control Results A unified approach to endpoint protection Increased protection, control, and manageability Reduced cost, complexity, and risk exposure Key benefits Secure Comprehensive protection Endpoint integrates best-of-breed technologies to stop security threats even from the most devious new and unknown attackers before they penetrate the network. It detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, and rootkits. Page 1 of 5

Proactive protection TruScan Proactive Threat Scan is a unique technology used to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rulebased configurations. Industry-best threat landscape intelligence protection mechanisms leverage the industry-leading Global Intelligence Network to deliver an unparalleled view of the entire Internet threat landscape. This intelligence results in actionable protection and peace of mind against evolving attacks. Simple Single agent, single console A full range of security technologies are integrated into a single agent and a centralized management console, with an intuitive user interface and Web-based graphical reporting. You are able to set and enforce security policies across the enterprise to protect your critical assets. Endpoint simplifies management, reduces system resource usage, and requires no additional agents when adding Network Access Control support. Network Access Control features are automatically enabled on the agent and management console with the purchase of a license. Easy to deploy Because it requires only a single agent and management console and it operates with an organization s existing security and IT investments, Endpoint is easy to implement and deploy. For organizations that want to outsource security monitoring and management, offers Managed Security Services to deliver real-time security protection. Lower cost of ownership Endpoint delivers a lower total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. This unified approach to endpoint security simplifies administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program. Seamless Easy to install, configure, and manage Endpoint makes it easy to enable/disable and configure desired technologies to fit into your environment. Network Access Control ready Each endpoint becomes Network Access Control ready, eliminating the need to deploy additional network access control endpoint agent software. Leverages existing security technologies and IT investments Endpoint works with other leading antivirus products, firewalls, IPS technologies, and network access control infrastructures. It also works with leading software deployment tools, patch management tools, and security information management tools. Integration with Altiris endpoint management solutions Distributing software packages, migrating older AntiVirus or other antivirus deployments, and viewing new agent rollout status and activity is easier. Key features More than antivirus Antivirus and antispyware Provides unmatched, bestof-breed malware protection, including market-leading antivirus protection, enhanced spyware protection, new rootkit protection, reduced memory footprint, and new dynamic performance adjustments to keep users productive. Network threat protection A rules-based firewall engine and Generic Exploit Blocking (GEB) block malware before it can enter a system. Page 2 of 5

Proactive threat protection Providing protection against unseen threats (i.e., zero-day threats), it includes TruScan Proactive Threat Scan, which does not rely on a signature. Single agent and single management console Antivirus, antispyware, desktop firewall, IPS, device and application control, and network access control (with the purchase of a Network Access Control license) are provided on a single agent all managed by a single console. Endpoint product family Endpoint Multi-tier Small Business Edition Multi-tier Antivirus Antispyware Firewall Device and application control Intrusion prevention Mail Security for Microsoft Exchange Mail Security for Domino Premium AntiSpam (for Groupware) Brightmail Gateway software subscription Mobile AntiVirus for Windows Mobile AntiVirus for Linux * * AntiVirus for Mac * Shaded area = Centrally managed by a single agent and single console * New additions. Note: If a customer does not want to use Endpoint when they purchase a bundle, they may install AntiVirus. They just need to go directly to Customer Care. In the new bundle, The Endpoint version is 11.0.3 (MR3). * * System requirements Client workstations and servers Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000 Professional,, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Home Edition, Professional Edition, Tablet PC Edition, Embedded Edition, Media Center Edition with Service Pack 1 or Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate Windows 2008 Standard Edition, Enterprise Edition, Datacenter Edition, Web Edition Linux operating systems (32-bit and 64-bit versions): Red Hat Enterprise Linux 3.x, 4.x, 5.x SUSE Linux Enterprise (server/desktop) 9.x, 10.x Novell Open Enterprise (OES/OES2) VMware ES 2.5, 3.x Memory: 256 MB of RAM or more Hard Disk: 600 MB or more Page 3 of 5

Management server Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Professional Edition with Service Pack 1 or Memory: 1 GB of RAM or more Hard disk: 2 GB or more Management console Processor: Intel Pentium processor or compatible Note: Itanium is not supported Windows operating systems (32-bit and 64-bit versions): Windows 2000 Professional,, Advanced, Datacenter, Small Business with Service Pack 3 or Windows P Professional Edition with Service Pack 1 or Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate Memory: 512 MB of RAM or more Hard disk: 15 MB or more Database Embedded database provided. Also supports: Microsoft SQL 2000 with Service Pack 3 or Microsoft SQL 2005 Hard disk: 4 GB or more AntiVirus for Linux client Linux distribution supported: Component 32-bit 64-bit Red Hat Enterprise Linux 3.x, 4.x, 5.x SUSE Linux Enterprise (/Desktop) 9.x, 10.x Novell Open Enterprise (OES/OES2) VMware ES 2.5.x, 3.x Not centrally managed by the Endpoint Manager Additional administrator tools Live Update Administrator Operating system supported: Microsoft Windows 2000, 2003, and P Processor: Intel Pentium 4 1.8 GHz Memory: 512 MB of RAM Hard disk: 5 GB Page 4 of 5

More information Visit our Web site www.symantec.com/endpoint To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our Web site. About is a global leader in providing security, storage, and systems management solutions to help businesses and consumers manage their information. Headquartered in Cupertino, Calif., has operations in more than 40 countries. More information is available at www.symantec.com. World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA +1 (408) 517 8000 1 (800) 721 3934 www.symantec.com Copyright 2008 Corporation. All rights reserved., the Logo, AntiVirus, and Premium AntiSpam are trademarks or registered trademarks of Corporation or its affiliates in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Novell is a registered trademark of Novell, Inc. in the United States and other countries. Microsoft, Windows, Windows, and Windows Vista are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Intel, Pentium, and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Printed in the U.S.A. 10/08 12836807-3 Page 5 of 5