SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Data Sheet: Endpoint Security

Symantec™ Endpoint Protection 12.1
Unrivaled security. Blazing performance. Built for virtual environments.

Overview
Powered by Symantec Insight™, Symantec™ Endpoint Protection is fast, powerful security for endpoints. It offers advanced
defense against all types of attacks for both physical and virtual systems. Seamlessly integrating the essential security tools
you need into a single, high performance agent with a single management console, Endpoint Protection provides world-class
protection without slowing you down.




                                   Endpoint Protection makes it easy to manage security across both physical and virtual systems.




Key Benefits
Unrivaled security
Detects new threats earlier and more accurately than signature or behavioral based solutions alone.

• Insight identifies new and zero day threats utilizing the collective wisdom of over 175 million systems in over 200 countries.
• Real-time SONAR examines programs as they run, identifying and stopping malicious behavior even for new and previously
      unknown threats.
• Leveraging Symantec’s Global Intelligence Network, Endpoint Protection informs and automates responses to new threats.
• Proven to detect and remove more threats than any other solution in its class. Endpoint Protection detects more threats
      then do products from McAfee®, Trend Micro™ or Microsoft®.1

Blazing performance
Performance so fast your users won’t know it is there.

• The Insight technology included in Endpoint Protection eliminates up to 70 percent of scan overhead compared to
      traditional solutions.
• Separates safe files from those at risk for faster, fewer, smarter scans.
• New, intelligence driven scan engine works while your computer is idle.

1.   AV-Test.org, “Real World Testing”, February 2011


Page 1 of 5
Data Sheet: Endpoint Security
Symantec™ Endpoint Protection 12.1

• Out performs all products in its class in scan speed, memory use and total performance impact.2

Built for virtual environments
Enhanced to help protect your virtual infrastructure.

• Takes much of the scanning out of each virtual machine, reducing scan overhead by up to 70 percent and disk input/output
      by as much as 90 percent.
• Prevents simultaneous scans and updates in virtual environments.
• Automatically identifies and manages virtual clients making it easy to create specific policies for virtual machines.
• Scans offline images.
• Detects more threats than virtual security solutions from McAfee or Trend Micro.3

Key features
Proactive threat detection Insight and SONAR detect new and rapidly mutating malware, stopping malicious behavior,
                 detection–
including new and previously unknown threats.

Virus and spy ware protection– Protects against viruses, worms, Trojans, spyware, bots, zero-day threats and root kits.
          spyware protection

Network threat protection – Rules-based firewall engine, browser protection and Generic Exploit Blocking (GE) shields
Network        protection
systems from drive-by downloads and from network based attacks.

Single agent for multiple technologies Consolidates antivirus, antispyware, desktop firewall, intrusion prevention, device
             for          technologies–
and application control, and network access control into a single agent.

Intelligent management – Centralized management and process automation helps increase threat visibility and accelerates
threat response.

Symantec Insight
With Insight, malware creators are caught in a Catch-22 - mutate too little and get caught by signature based protection,
mutate too much and get caught by Insight.

Insight detects new and unknown threats that are missed by other approaches.

• Correlates tens of billions of linkages between users, files, and websites to identify rapidly mutating threats that may only
      exist on a few systems.
• Reduces scan overhead by as much as 70 percent by scanning only files at risk.
• Can’t be evaded or coded around by mutated or encrypted malware.

What's new
Insight: Separates files at risk from those that are safe, for faster and more accurate malware detection.

Real time SONAR 3: Examines programs as they run, identifying and stopping malicious behavior even for new and previously
unknown threats.

Browser protection: Scans for drive-by downloads and attacks directed at browser vulnerabilities.
        protection:


2.   PassMark Software, "Small Business Endpoint Protection Performance Benchmarks", February 2011
3.   Dennis Labs. "Real World Testing in Virtual Environments", April 2011


Page 2 of 5
Data Sheet: Endpoint Security
Symantec™ Endpoint Protection 12.1

Built for virtual environments: Protects your virtual infrastructure.
      for         environments:

• Virtual image exception: White list files from standard virtual machine image to optimize scanning.
• Resource leveling: Randomizes scan and update schedules to prevent resource utilization spikes.
• Shared Insight cache: Shares scans results centrally across virtual clients to reduce bandwidth and latency
• Virtual client tagging: Symantec Endpoint Protection Manager can automatically identify and manage virtual clients.
• Offline image scanning: Finds threats even in offline virtual machine images.

Endpoint Protection for Apple OS X® and Linux®: Includes endpoint protection for OS X and Linux based systems.
         Protection for       OS X®

Faster central console: Optimized database to increase responsiveness.
 aster

Smart scheduler: Stays out of your way by performing non-critical security tasks when your computer is idle.

Enhanced client deployment: Improved wizards and more deployment options will allow new installs and upgrades to be
faster and easier than ever before.
Symantec Endpoint Protection Manager integration with Symantec™ Protection Center 2.0: Protection Center is a
                  Protection         integration      Symantec™ Protection
centralized security management console that allows organizations to identify emerging threats, prioritize tasks and accelerate
time to protection based on relevant, actionable intelligence. Protection Center is a free product, available at no additional
charge for existing Endpoint Protection 12 customers.

Advanced reporting and analytics: Includes IT Analytics which complements and expands upon the traditional reporting
Advanced               analytics
offered by Endpoint Protection by incorporating multi-dimensional analysis and robust graphical reporting in an easy to use
dashboard.

How to choose the right Endpoint Protection product?
                                  Symantec™ Endpoint Protection Small   Symantec Endpoint   Symantec Endpoint   Norton™ Internet
 Feature
                                  Business Edition 12.1                 Protection.cloud    Protection 12.1     Security 2011

 Seats                                             5-99                         5-250             100+ seats          1-5 seats

 Antivirus/Antispyware                               •                            •                   •                  •

 Desktop Firewall                                    •                            •                   •                  •

 Intrusion Detection/Prevention                      •                            •                   •                  •

 Insight / SONAR                                     •                            •                   •                  •

 Protection for Mac OS X                             •                            •                   •                  •

 Protection for Linux                                                                                 •

 Device and Application Control                                                                       •

 Network Access Control Self-                                                                         •
 Enforcement ready

 Symantec Hosted Infrastructure                                                   •

 Centrally Managed                                   •                            •                   •

 Built for Virtual Environments                                                                       •




Page 3 of 5
Data Sheet: Endpoint Security
Symantec™ Endpoint Protection 12.1


System Requirements (for complete system requirements, please visit www.symantec.com)
 ystem              (for          system                              w.symantec.com)

Symantec Endpoint Protection for Windows® client
                  Protection for

Minimum requirements

Windows® 2000, Windows® XP, Windows® Vista, Windows® 7, Windows Server® 2003, Windows Server® 2008, Windows® Small
Business Server 2003, Windows® Small Business Server 2008, Windows® Essential Business Server 2008, or Windows® Small
Business Server 2011

∙ 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended)

∙ 64-bit processor: 2-GHz Pentium 4 or equivalent minimum (Itanium processors are not supported)

∙ 512 MB of RAM, or higher if required by the operating system (1 GB RAM recommended)

∙ 700MB disk space
Symantec Endpoint Protection for Mac® client
                  Protection for

Minimum requirements

∙ PowerPC technology-based Mac® running Mac OS X 10.4-10.5x

∙ Intel®-based Mac® running Mac OS X 10.4-10.6

∙ 256 MB of RAM (512 MB recommended) for 10.4; 512 MB for 10.5; 1 GB for 10.6

∙ 500 MB of available hard disk space for installation

Symantec AntiVirus™ for Linux® Client
         AntiVirus™ for

Red Hat® Enterprise Linux, SUSE® Linux Enterprise (server/desktop), Novell® Open Enterprise Server, VMWare® ES, Ubuntu®,
Debian®, Fedora®

Symantec Endpoint Protection Manager
                  Protection

Minimum requirements

Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Small Business Server 2003,
Windows Small Business Server 2008, Windows Essential Business Server 2008, or Windows Small Business Server 2011

∙ Microsoft® SQL Server™ 2000 SP4 or SQL Server 2005 SP2 or SQL Server 2008 (optional)

∙ 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended)

∙ 64-bit processor: 2-GHz Pentium 4 or equivalent minimum

∙ 1 GB of RAM for 32-bit operating systems, 2 GB of RAM for 64-bit operating systems, or higher if required by the operating
system (4 GB recommended)

∙ 4 GB disk for the server; plus 4 GB for the database




Page 4 of 5
Data Sheet: Endpoint Security
Symantec™ Endpoint Protection 12.1

More Information
For more information, visit our website http://www.symantec.com/business/endpoint-protection
To speak with a Product Specialist in the U.S., call toll-free 1 (800) 745 6054
For specific country offices and contact numbers, please visit our website.
About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and
organizations secure and manage their information-driven world. Our software and services protect against more risks at more
points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in
Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com.

Symantec World Headquarters
350 Ellis St., Mountain View, CA 94043 USA
+1 (650) 527 8000 | 1 (800) 721 3934
www.symantec.com




Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Any future release of the product or planned modifications to product capability,
functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making
purchasing decisions.

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.
Other names may be trademarks of their respective owners.

Symantec helps organizations secure and manage their information-driven world with security management, endpoint security, messaging security, and application security solutions.                  21194634 06/11



Page 5 of 5

Weitere ähnliche Inhalte

Was ist angesagt?

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i SecurityPrecisely
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ TechnologySHC
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedSHC
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 

Was ist angesagt? (20)

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 

Ähnlich wie Endpoint Security Data Sheet

Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfOlufemi37
 

Ähnlich wie Endpoint Security Data Sheet (20)

Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
 

Kürzlich hochgeladen

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Kürzlich hochgeladen (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

Endpoint Security Data Sheet

  • 1. Data Sheet: Endpoint Security Symantec™ Endpoint Protection 12.1 Unrivaled security. Blazing performance. Built for virtual environments. Overview Powered by Symantec Insight™, Symantec™ Endpoint Protection is fast, powerful security for endpoints. It offers advanced defense against all types of attacks for both physical and virtual systems. Seamlessly integrating the essential security tools you need into a single, high performance agent with a single management console, Endpoint Protection provides world-class protection without slowing you down. Endpoint Protection makes it easy to manage security across both physical and virtual systems. Key Benefits Unrivaled security Detects new threats earlier and more accurately than signature or behavioral based solutions alone. • Insight identifies new and zero day threats utilizing the collective wisdom of over 175 million systems in over 200 countries. • Real-time SONAR examines programs as they run, identifying and stopping malicious behavior even for new and previously unknown threats. • Leveraging Symantec’s Global Intelligence Network, Endpoint Protection informs and automates responses to new threats. • Proven to detect and remove more threats than any other solution in its class. Endpoint Protection detects more threats then do products from McAfee®, Trend Micro™ or Microsoft®.1 Blazing performance Performance so fast your users won’t know it is there. • The Insight technology included in Endpoint Protection eliminates up to 70 percent of scan overhead compared to traditional solutions. • Separates safe files from those at risk for faster, fewer, smarter scans. • New, intelligence driven scan engine works while your computer is idle. 1. AV-Test.org, “Real World Testing”, February 2011 Page 1 of 5
  • 2. Data Sheet: Endpoint Security Symantec™ Endpoint Protection 12.1 • Out performs all products in its class in scan speed, memory use and total performance impact.2 Built for virtual environments Enhanced to help protect your virtual infrastructure. • Takes much of the scanning out of each virtual machine, reducing scan overhead by up to 70 percent and disk input/output by as much as 90 percent. • Prevents simultaneous scans and updates in virtual environments. • Automatically identifies and manages virtual clients making it easy to create specific policies for virtual machines. • Scans offline images. • Detects more threats than virtual security solutions from McAfee or Trend Micro.3 Key features Proactive threat detection Insight and SONAR detect new and rapidly mutating malware, stopping malicious behavior, detection– including new and previously unknown threats. Virus and spy ware protection– Protects against viruses, worms, Trojans, spyware, bots, zero-day threats and root kits. spyware protection Network threat protection – Rules-based firewall engine, browser protection and Generic Exploit Blocking (GE) shields Network protection systems from drive-by downloads and from network based attacks. Single agent for multiple technologies Consolidates antivirus, antispyware, desktop firewall, intrusion prevention, device for technologies– and application control, and network access control into a single agent. Intelligent management – Centralized management and process automation helps increase threat visibility and accelerates threat response. Symantec Insight With Insight, malware creators are caught in a Catch-22 - mutate too little and get caught by signature based protection, mutate too much and get caught by Insight. Insight detects new and unknown threats that are missed by other approaches. • Correlates tens of billions of linkages between users, files, and websites to identify rapidly mutating threats that may only exist on a few systems. • Reduces scan overhead by as much as 70 percent by scanning only files at risk. • Can’t be evaded or coded around by mutated or encrypted malware. What's new Insight: Separates files at risk from those that are safe, for faster and more accurate malware detection. Real time SONAR 3: Examines programs as they run, identifying and stopping malicious behavior even for new and previously unknown threats. Browser protection: Scans for drive-by downloads and attacks directed at browser vulnerabilities. protection: 2. PassMark Software, "Small Business Endpoint Protection Performance Benchmarks", February 2011 3. Dennis Labs. "Real World Testing in Virtual Environments", April 2011 Page 2 of 5
  • 3. Data Sheet: Endpoint Security Symantec™ Endpoint Protection 12.1 Built for virtual environments: Protects your virtual infrastructure. for environments: • Virtual image exception: White list files from standard virtual machine image to optimize scanning. • Resource leveling: Randomizes scan and update schedules to prevent resource utilization spikes. • Shared Insight cache: Shares scans results centrally across virtual clients to reduce bandwidth and latency • Virtual client tagging: Symantec Endpoint Protection Manager can automatically identify and manage virtual clients. • Offline image scanning: Finds threats even in offline virtual machine images. Endpoint Protection for Apple OS X® and Linux®: Includes endpoint protection for OS X and Linux based systems. Protection for OS X® Faster central console: Optimized database to increase responsiveness. aster Smart scheduler: Stays out of your way by performing non-critical security tasks when your computer is idle. Enhanced client deployment: Improved wizards and more deployment options will allow new installs and upgrades to be faster and easier than ever before. Symantec Endpoint Protection Manager integration with Symantec™ Protection Center 2.0: Protection Center is a Protection integration Symantec™ Protection centralized security management console that allows organizations to identify emerging threats, prioritize tasks and accelerate time to protection based on relevant, actionable intelligence. Protection Center is a free product, available at no additional charge for existing Endpoint Protection 12 customers. Advanced reporting and analytics: Includes IT Analytics which complements and expands upon the traditional reporting Advanced analytics offered by Endpoint Protection by incorporating multi-dimensional analysis and robust graphical reporting in an easy to use dashboard. How to choose the right Endpoint Protection product? Symantec™ Endpoint Protection Small Symantec Endpoint Symantec Endpoint Norton™ Internet Feature Business Edition 12.1 Protection.cloud Protection 12.1 Security 2011 Seats 5-99 5-250 100+ seats 1-5 seats Antivirus/Antispyware • • • • Desktop Firewall • • • • Intrusion Detection/Prevention • • • • Insight / SONAR • • • • Protection for Mac OS X • • • • Protection for Linux • Device and Application Control • Network Access Control Self- • Enforcement ready Symantec Hosted Infrastructure • Centrally Managed • • • Built for Virtual Environments • Page 3 of 5
  • 4. Data Sheet: Endpoint Security Symantec™ Endpoint Protection 12.1 System Requirements (for complete system requirements, please visit www.symantec.com) ystem (for system w.symantec.com) Symantec Endpoint Protection for Windows® client Protection for Minimum requirements Windows® 2000, Windows® XP, Windows® Vista, Windows® 7, Windows Server® 2003, Windows Server® 2008, Windows® Small Business Server 2003, Windows® Small Business Server 2008, Windows® Essential Business Server 2008, or Windows® Small Business Server 2011 ∙ 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended) ∙ 64-bit processor: 2-GHz Pentium 4 or equivalent minimum (Itanium processors are not supported) ∙ 512 MB of RAM, or higher if required by the operating system (1 GB RAM recommended) ∙ 700MB disk space Symantec Endpoint Protection for Mac® client Protection for Minimum requirements ∙ PowerPC technology-based Mac® running Mac OS X 10.4-10.5x ∙ Intel®-based Mac® running Mac OS X 10.4-10.6 ∙ 256 MB of RAM (512 MB recommended) for 10.4; 512 MB for 10.5; 1 GB for 10.6 ∙ 500 MB of available hard disk space for installation Symantec AntiVirus™ for Linux® Client AntiVirus™ for Red Hat® Enterprise Linux, SUSE® Linux Enterprise (server/desktop), Novell® Open Enterprise Server, VMWare® ES, Ubuntu®, Debian®, Fedora® Symantec Endpoint Protection Manager Protection Minimum requirements Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Small Business Server 2003, Windows Small Business Server 2008, Windows Essential Business Server 2008, or Windows Small Business Server 2011 ∙ Microsoft® SQL Server™ 2000 SP4 or SQL Server 2005 SP2 or SQL Server 2008 (optional) ∙ 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended) ∙ 64-bit processor: 2-GHz Pentium 4 or equivalent minimum ∙ 1 GB of RAM for 32-bit operating systems, 2 GB of RAM for 64-bit operating systems, or higher if required by the operating system (4 GB recommended) ∙ 4 GB disk for the server; plus 4 GB for the database Page 4 of 5
  • 5. Data Sheet: Endpoint Security Symantec™ Endpoint Protection 12.1 More Information For more information, visit our website http://www.symantec.com/business/endpoint-protection To speak with a Product Specialist in the U.S., call toll-free 1 (800) 745 6054 For specific country offices and contact numbers, please visit our website. About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. Symantec World Headquarters 350 Ellis St., Mountain View, CA 94043 USA +1 (650) 527 8000 | 1 (800) 721 3934 www.symantec.com Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions. Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Symantec helps organizations secure and manage their information-driven world with security management, endpoint security, messaging security, and application security solutions. 21194634 06/11 Page 5 of 5