Symantec Endpoint security Complete

 

Solution Overview

Symantec Endpoint Security Complete delivers the most comprehensive and integrated endpoint security platform on the planet. As an on premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defenses at the device, application, and network level, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud based management system simplifies protecting, detecting, and responding to all the advanced threats targeting your endpoints.

 

Unmatched Endpoint Safety for Your Organization

Symantec Endpoint Security provides your organization with the best security at the endpoint for both traditional and mobile devices across the three attack phases—Pre-Attack, Attack, and Post Attack—with an emphasis on prevention across the attack chain for rapid containment. Proactive attack surface reduction and innovative attack prevention technologies provide the strongest defense against the hardest-todetect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, behavior forensics, automated investigation playbooks, and industry-first lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.

 

Attack Surface Reduction

Symantec delivers proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies that continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks allowing for immediate mitigation with prescriptive recommendations on remediation.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices to reduce the risk of threats and exfiltration. Application Control assesses the risk of applications and their vulnerabilities and allows only known good applications to run.
  • Behavioral Isolation limits unusual and risky behaviors of trusted applications with minimal operational impact.
  • Vulnerability Remediation3 enhances security posture by providing visibility and intelligence into vulnerabilities and their associated risk. Discovered vulnerabilities are ranked by severity based on the CVSS (Common Vulnerability Scoring System) along with identification

Product Features

Attack Prevention

Symantec multilayer attack prevention immediately and effectively protects against file-based and fileless attack vectors and methods. Its machine learning and artificial intelligence uses advanced device and cloud-based detection schemes to identify evolving threats across device types, operating systems, and applications. Attacks are blocked in real-time, so endpoints maintain integrity and negative impacts are avoided.

  • Malware Prevention combines pre-execution detection and blocking of new and evolving threats (advanced machine learning, sandboxing to detect malware hidden in custom packers, and suspicious file behavioral monitoring and blocking), and signature-based methods (file and website reputation analysis and malware scanning).
  • Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
  • Intensive Protection separately enables fine-grained tuning of the level of detection and blocking to optimize protection and gain enhanced visibility into suspicious files.
  • Network Connection Security identifies rogue Wi-Fi networks, utilizes hotspot reputation technology, and delivers a policy-driven VPN to protect network connections and support compliance.

 

Learn More

Pre-Attack Surface Reduction

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

 

Learn More

Breach Prevention

    • Intrusion prevention and firewall blocks known network and browser-based malware attacks using rules and policies and prevents command and control setup with automated domain IP address blacklisting.
    • Deception uses lures and baits – fake files, credentials, network shares, cache entries and endpoints – to expose, determine attacker intent and tactics, and delay attackers through early visibility.
    • Active Directory Security defends the primary attack surface for lateral movement and domain admin credential theft by controlling the attacker’s perception of an organization’s Active Directory resources – from the endpoint – using unlimited obfuscation (fake asset and credential creation). With obfuscation, the attacker gives themselves away while interacting with “fake assets” or attempting use of domain admin credentials on Active Directory’s perception.
      Learn More About Active Directory Security
    • Auto-managed policies, based on advanced AI and ML, uniquely combines indicators of compromise and historical anomalies to continuously adapt endpoint policy thresholds or rules and keep them up to date and aligned with the current risk profile of your organization.

 

Learn More

Response and Remediation

Symantec combines endpoint detection and response (EDR) technologies and unmatched security operations center (SOC) analyst expertise, giving you the tools necessary to quickly close out endpoint incidents and minimize attack impacts.  Integrated EDR capabilities, in a single-agent architecture, precisely detect advanced attacks, provide real-time analytics, and enable you to actively hunt threats and pursue forensic investigations and remediation.

  • Targeted Attack Analytics provides precise detections from time tested Targeted Attack Analytics used by Symantec’s 3,000 researchers, based on global activity of the good and the bad, across all enterprises that comprise our telemetry set. Real-time incidents are generated—with a detailed analysis of the attacker, techniques, impacted machines, and remediation guidance.
  • Advanced Threat Hunting tools are provided in Symantec EDR including built-in playbooks that encapsulate the best practices of skilled threat hunters, anomaly detection, process memory analysis, risk-scored recording of endpoint activity, and continually updated endpoint behaviors that detect advanced attack techniques.
  • Integrated Response takes direct action on the endpoint to remediate – retrieving files, deleting files, isolating endpoints and blacklisting. Symantec EDR supports automatic submission of identified suspicious files to sandboxing for complete malware analysis including exposing malware that is VM-aware.
  • Expert SOC Investigator is a 24×7 forensics investigation and threat hunting service that employs Symantec SOC analysts to actively detect stealthy attacks and expertly examine suspicious activity. These analysts use Symantec Endpoint Detection and Response (EDR) coupled with machine learning analytics and Symantec Global Intelligence Network correlation.
    Learn more about EDR

.

 

Learn More

Mobile website packages provide quality web hosting with unlimited resources.

Lorem Ipsum as their default model text, and a search for lorem ipsum will uncover many web sites still in their infancy also the leap into electronic typesetting, remaining essentially was in the with the release of sheets versions over the years.

 

Learn More

Select your currency
USD United States (US) dollar
EUR Euro