Symantec Endpoint Protection 14
The Most Complete Endpoint Security Solution for the Cloud Generation
At-a-Glance
Protect endpoints from all attack vectors at industry leading efficacy with a single agent architecture
• Defend against ransomware and other emerging threats with multilayered protection that fuses signatureless technologies like advanced machine learning, behavior analysis and exploit prevention with proven protection capabilities like intrusion prevention, reputation analysis and more
• Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
• Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
• Shield commonly used applications against vulnerability exploits and isolate suspicious applications from malicious activity
Realize integrated cyber defense at scale
• Detect threats anywhere and respond with SEP by integrating with network security infrastructure such as
web and email gateways
Introduction
With the constant evolving nature of today’s IT environment, attackers are using more sophisticated attacks to infiltrate networks and the endpoint represents the last line of defense. Organizations are more concerned about cyber damage and disruption as ransomware attacks are trending upward as was evident with the WannaCry and Petya outbreaks. In addition, the attackers’ expanding use of file-less and stealthy attacks combined with “living off the land” (leveraging common IT tools for attacks) threatens the confidentiality, integrity, and availability of endpoint assets.
• Integrate with EDR for incident investigation and response leveraging the same SEP agent
• Integrate with existing IT infrastructure for automation
and orchestration with open-APIs
Enable business with a high-performance,
lightweight solution
• Optimize content update frequency for endpoints with network bandwidth constraints without compromising security efficacy
• Boost performance with a lightweight agent and virus definition sets that require minimal network bandwidth usage (70% less compared to SEP12)
• Speed detection with advanced design techniques and patented real-time cloud lookup that delivers faster
scanning times (15% faster compared to SEP12)
So what can security teams do to address cyber attacks? Managing multiple point products and technologies is overwhelming and challenges mount when managing security across multiple geographies with diverse operation systems and platforms. With limited resources and limited budgets, security teams want easy-to-manage technologies that can integrate with each other to improve overall security. They do not need “just another point product.” See Figure