Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Similar documents
Symantec Endpoint Protection 12

Symantec Endpoint Protection

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology

Securing Your Virtual Data Centers:

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

IC B01: Internet Security Threat Report: How to Stay Protected

Securing the SMB Cloud Generation

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Symantec Endpoint Protection 14

Insight Frequently Asked Questions version 2.0 (8/24/2011)

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

SYMANTEC DATA CENTER SECURITY

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Symantec Ransomware Protection

EM L01 Introduction to Mobile

Symantec Protection Engine

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

UP L13: Leveraging the full protection of SEP 12.1.x

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

: Administration of Symantec Endpoint Protection 14 Exam

Symantec Protection Suite Add-On for Hosted Security

Securing the Modern Data Center with Trend Micro Deep Security

Trend Micro Enterprise Endpoint Comparative Report Performed by AV-Test.org

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Building Resilience in a Digital Enterprise

Kaspersky Security Network

CloudSOC and Security.cloud for Microsoft Office 365

The Evolution of Data Center Security, Risk and Compliance

Trend Micro Endpoint Comparative Report Performed by AV-Test.org

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)

ENTERPRISE ENDPOINT COMPARATIVE REPORT

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Symantec Exam ST0-134 Symantec EndPoint Protection 12.1 Technical Assessment Version: 8.0 [ Total Questions: 282 ]

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection V14. Security information 1. Preface 2.

Anti-Virus Comparative

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Symantec and VMWare why 1+1 makes 3

Defend Against the Unknown

Symantec Enterprise Solution Product Guide

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

The Symantec Approach to Defeating Advanced Threats

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

Transparency report. Examining the AV-TEST January-February 2018 Results. Prepared by. Windows Defender Research team

Un SOC avanzato per una efficace risposta al cybercrime

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

MOVE AntiVirus page-level reference

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

McAfee Endpoint Security

Next Generation Endpoint Security Confused?

Maximum Security with Minimum Impact : Going Beyond Next Gen

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Application Whitelisting and Active Analysis Nick Levay, Chief Security Officer, Bit9

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

McAfee Network Security Platform 9.1

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

McAfee Embedded Control

Instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates.

COMPARATIVE MALWARE PROTECTION ASSESSMENT

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012


Endpoint Security for DeltaV Systems

Data Insight Feature Briefing Box Cloud Storage Support

Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

Cisco Tetration Analytics

Maximize your Private Cloud with Server Management Suite

Cisco Security: Advanced Threat Defense for Microsoft Office 365

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Enterprise Vault Best Practices

Expand Virtualization. Maintain Security.

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Presentation by Brett Meyer

Datacenter Security: Protection Beyond OS LifeCycle

SecureAnywhere TM. Business Endpoint Protection

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

PracticeTorrent. Latest study torrent with verified answers will facilitate your actual test

Invincea Endpoint Protection Test

Symantec Endpoint Protection Getting Started Guide

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

McAfee Advanced Threat Defense

IM-B23: What s New with NetBackup Appliances

Technical Brief Veritas Technical Education Services

Cisco s Appliance-based Content Security: IronPort and Web Security


TREND MICRO SMART PROTECTION SUITES

McAfee Network Security Platform 8.3

EM L05 Symantec Mobile Management Managing ios and Android Devices

Intel and Symantec: Improving performance, security, manageability and data protection

TREND MICRO SMART PROTECTION SUITES

Sophos for Virtual Environments. configuration guide -- Sophos Central edition

McAfee Network Security Platform 8.3

CONSUMER EPP COMPARATIVE ANALYSIS

Transcription:

SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1

Panelists Jeff Marsh Christian Sosa David Nguyen Presentation Identifier Goes Here 2

Symantec Endpoint Protection 12 Unrivaled Security Blazing Performance Built for Virtual Environments Powered by Insight Real Time Behavior Monitoring with SONAR Up to 70% reduction in scan overhead Smarter Updates Faster Management Tested and optimized for virtual environments Higher VM densities 3

Symantec Insight Proactive Protection from New, Targeted Threats Leverages anonymous telemetry data from 210M+ machines to construct a massive nexus of files, machines and domains Tracks nearly every binary in the world 3.1 billion files, adding 37 million every week Uses age, prevalence, source and other attributes to assign a reputation rating to files Can accurately identify and block threats even if just a single Symantec user encounters them Bad Safety Rating File is blocked No Safety Rating Yet IT can set block/ allow thresholds Good Safety Rating File is whitelisted 4

SONAR Proactive Threat Protection Against: Heuristic Threats Determines if an unknown file behaves suspiciously and might be a high risk or low risk. System Changes Bad Behavior from Trusted Applications Identifies applications or files that try to modify DNS settings or a host file on a client computer. Detects suspicious behavior from trusted files. Removes bad applications before they can do damage. Symantec Vision 2012 5

Symantec Protection Model Defense in Depth File Network Website/ Domain/ IP address Network File Reputation Behavioral Repair Network-based Reputation- Protection Stops malware as it travels over the network and tries to take up residence on a system Protocol aware IPS Browser Protection File-based Protection Looks for and eradicates malware that has already taken up residence on a system Antivirus Engine Auto Protect Malheur based Protection Establishes information about entities e.g. websites, files, IP addresses to be used in effective security Domain Reputation File Reputation (INSIGHT) Behavioralbased Protection Looks at processes as they execute and uses malicious behaviors to indicate the presence of malware SONAR Behavioral Signatures Remediation Tools Aggressive tools for hard to remove infections Boot to a clean OS Power Eraser uses aggressive heuristics Threat-specific tools 6

Insight Faster, Smarter, Fewer Scans On a typical system, 70% of files can be skipped! Traditional Scanning Has to scan every file Insight - Optimized Scanning Skips any file we are sure is good, leading to much faster scan times 7

Virtualization Features Virtual Client Tagging Virtual Image Exception Shared Insight Cache Offline Image Scanning Resource Leveling Together up to 90% reduction in disk IO 8

Kaspersky Trend Micro Microsoft McAfee Symantec Sophos 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% Third Party Testing Results 0% 1.9% 13.5% 98.1% 3.8% 82.7% 4% false positive Blocked Partial Infected 32.7% 3.8% 15.4% 63.5% 26.9% 57.7% 40.4% 44.2% 5.8% 53.8% 3.8% 51.9% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 100% 64% Symantec Endpoint Protection 12.1 20% 16% Trend Deep Security 8 (Agentless) Compromised Neutralized Defended 160 Ranked 1 st in overall Performance! 140 120 100 80 60 40 20 0 SEP 12.1 Scans: 3.5X faster than McAfee 2X faster than Microsoft 9

Panelists Jeff Marsh Christian Sosa David Nguyen 10

Other Symantec Endpoint Protection Sessions Time Topic Speaker(s) Location Wednesday 1:00pm-2:00pm Wednesday 4:45pm-5:45pm Thursday 10:15am-11:15am Wednesday 2:15pm-3:15pm Thursday 09:00am-10:00am Thursday 10:15am-11:15am 1:00pm-2:00pm Thursday 11:30am-12:30pm SR B20: Symantec Endpoint Protection 12.1 Overview SR B27: SONAR, Insight, Skeptic, GIN The Symantec Secret Sauce SR B23: The Roadmap for Symantec Infrastructure Protection Products SR L06: Migrating to Symantec Endpoint Protection 12.1 Michael Marfise Scott Sawoya Kevin Haley Archana Rajan Louis Fiorello Jason Nadeau Paul Murgatroyd Josh Etsten Elisha Riedlinger RM 116 RM 116 RM 311 RM 121 SR L08: Troubleshooting SEP 12.1 Paul Murgatroyd RM 121 SR L07: Configuring Protection Technologies with Symantec Endpoint Protection 12.1 Scott Sawoya RM 121 11

Thank you! Piero DePaoli piero_depaoli@symantec.com +1 415 203 5991 Scott Sawoya scott_sawoya@symantec.com +1 310 721 4076 Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 12