Symantec Endpoint Protection

Introduction

Today, malware approach of large-scale public attacks targeted attacks and advanced persistent threats has changed. Anti-virus alone can not cope with the attacks. Now is the time that an antivirus solution beyond use. The unique ability to offer intelligent security company Symantec, based on the collective knowledge is obtained from the Global Intelligent Network. The network gathers data from millions of users around the world, the knowledge needed to deal with advanced threats and zero-day attacks Insight technology provides.

Symantec Endpoint Protection is a security solution architecture-based software client / server is the duty of protecting desktops, laptops and servers against malware and its risks and vulnerabilities. The solution can be your network against the most sophisticated attacks, such as rootkits, zero-day attacks, and spyware and ransomware care of them. Multiple tools for integrated antivirus security software in high-performance unit with a management console, is gathered. Using a comprehensive management solution can control the policies applied to the user.

Five layers of protection
Five protective layer provided through a program that all these layers are managed by a single console.

endpoint protection

  1. Network (Network): Network Threat Protection, by analyzing the flow of information from the network, identify and neutralize threats before they reach the user’s system. Firewall and Browser Protection also protects users against web attacks.
  2. File (File): antivirus and advanced exploration system files, users can file against malware such as viruses, worms, Trojans, spyware, adware, ransomware, and rootkits protect baht.
  3. Reputation (Reputation): Technology Insight to review files and communications between users and websites can accurately identify threats in progress. The system can analyze the properties of files files in its credit rating. In this way, the client scans reduced to seventy percent.
  4. Behavior (behavior): SONAR technology with real-time analysis of about 1,400 different applications using artificial intelligence techniques can protect the Zero (Zero Day Protection) provide to users.
  5. Restoration (Repair): Power Eraser tool to scan the infected client can delete advanced persistent threats. Ability to activate this tool from a remote management console on the client’s network.

Plug-control policies

The software protection technologies in addition to the main control policies include the following plugin is able to:

endpoint protection2

  • Control Program (Application Control): the ability to control how applications and processes and their access to Windows registry files and resources, there with this application. The software capabilities for policy implementation Lockdown allowed to run good programs (allowed) or prevent bad performances (illegal) images.
  • Host integrity checking and implementation of policies (Host Integrity Checking and Policy Enforcement): The software implementation of various policies to ensure the health of the client. Detects unauthorized changes and pathology, computers that do not meet the prerequisites set is isolated.

Video

Symantec Endpoint Protection

Symantec Endpoint Protection is a security solution architecture-based software client / server is the duty of protecting desktops, laptops and servers against malware and its risks and vulnerabilities. The solution can be your network against the most sophisticated attacks, such as rootkits, zero-day attacks, and spyware and ransomware care of them.

Symantec Endpoint Protection Gallery

Related Products