Description
Symantec Endpoint security Complete
Solution Overview
Symantec Endpoint Security Complete delivers the most comprehensive and integrated endpoint security platform on the planet. As an on premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defenses at the device, application, and network level, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud based management system simplifies protecting, detecting, and responding to all the advanced threats targeting your endpoints.
Unmatched Endpoint Safety for Your Organization
Symantec Endpoint Security provides your organization with the best security at the endpoint for both traditional and mobile devices across the three attack phasesโPre-Attack, Attack, and Post Attackโwith an emphasis on prevention across the attack chain for rapid containment. Proactive attack surface reduction and innovative attack prevention technologies provide the strongest defense against the hardest-todetect threats that rely on stealthy malware, credential theft, fileless, and โliving off the landโ attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, behavior forensics, automated investigation playbooks, and industry-first lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.
Attack Surface Reduction
Symantec delivers proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies that continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.
- Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks allowing for immediate mitigation with prescriptive recommendations on remediation.
- Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices to reduce the risk of threats and exfiltration. Application Control assesses the risk of applications and their vulnerabilities and allows only known good applications to run.
- Behavioral Isolation limits unusual and risky behaviors of trusted applications with minimal operational impact.
- Vulnerability Remediation3 enhances security posture by providing visibility and intelligence into vulnerabilities and their associated risk. Discovered vulnerabilities are ranked by severity based on the CVSS (Common Vulnerability Scoring System) along with identification
Reviews
There are no reviews yet.