SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Symantec Endpoint Protection 12

February 2011


                                  1
Jan, 2007 - 250,000 viruses
Dec, 2009 – over 240 million




                               2
Malware authors have switched tactics


                                            75% of malware infect less than
                                                    50 machines



From:                                 To:
 A mass distribution of a              A micro distribution model e.g.
 relatively few threats e.g.
                                         The average Vundo variant is
  Storm made its way onto millions       distributed to 18 Symantec users!
   of machines across the globe          The average Harakit variant is
                                          distributed to 1.6 Symantec users!




                                                                               3
A Security Catastrophe… the growth in AV signatures
10,000,000



 8,000,000



 6,000,000
                  Signature based scanning
 4,000,000
                       won’t keep up

 2,000,000



        0
Introducing Symantec Endpoint Protection 12

              Malware
             Protection                What’s New

  Access                  Personal     - Unrivaled Security
  Control                 Firewall      Insight
            Symantec                    SONAR
             Endpoint
                                       - Blazing Performance
            Protection                  Faster Scans
   App                     Intrusion
  Control                 Prevention
                                       - Built for Virtual Environments
                                        Identify and Manage Virtual
              Device                      Clients
              Control                   Reduced Scan Overheads



                                                                          5
Powered by
                             Insight
Proactive protection against new, mutating threats
• puts files in context, using their age, frequency, location and
  more to expose threats otherwise missed
• using community-based security ratings
• derived from Symantec's more than 175 million endpoints



                                                                    6
How Insight Works                                               Check the DB
                                                           4
                                                                    during scans
                             2   Rate nearly
                                 2.5 billion
                                 every file on
                                 the files
                                      internet


1      Build a
          175
     collection
        million
      network
          PCs


          Is it new?
       Bad reputation?
                                                                         Prevalence
                                                                            Age
                                                                          Source
                               Provide           3     Look for
                       5                             associations         Behavior
                           actionable data                               Associations
Unrivaled Security

Hackers mutate threats to evade fingerprints




Mutated threats stick out like a sore thumb

It’s a catch-22 for the virus writers
  – Mutate too much =Insight finds it
  – Mutate too little = Easy to discover & fingerprint



                                                         8
SONAR – Completes the Protection Stack


                                         SONAR
             Network IPS &
               Browser
                                • Monitors processes and
                Protect           threads as they execute
                                • Rates behaviors
                Insight         • Feeds Insight
                Lookup


                File Based
              Protection –
             Sigs/Heuristics   Only hybrid behavioral-
                               reputation engine on the planet
               Real time       Monitors 400 different
               behavioral      application behaviors
               SONAR           Selective sandbox (ex Adobe)


                                                            9
Proven Most Effective in Real World Test
               100%                                                                      100%
                        3.8%
                                 13.5%
               90%                                                                       90%
                                                        26.9%
                                  3.8%     32.7%
               80%                                                   40.4%               80%
                                                                                44.2%

               70%                                                                       70%
% of samples




                                            3.8%        15.4%




                                                                                                % False Positives
               60%                                                                       60%
                                                                      5.8%
                                                                                 3.8%
               50%                                                                       50%
                       96.2%

               40%               82.7%                                                   40%


               30%
                                           63.5%                                         30%
                                                        57.7%
                                                                     53.8%      51.9%
               20%                                                                       20%
                                                                                                             Infected

               10%                                                                       10%                 Partial
                                                                                                             Blocked
                                  4%                                                                         FP
                0%                                                                       0%
                      Symantec   Sophos   Kaspersky   Trend Micro   Microsoft   McAfee

                                                                                                                    10
Most Effective Remediation
                                         120                                                                                     30



                                                110
                                         100                104                                                                  25




                                                                                                                                                          Number of False Positives
                                                                         94         93
Remediation Score




                                          80                                                                                     20

                                                                                               75
                    (higher is better)




                                                                                                                                      (lower is better)
                                                                                                           69
                                          60                                                                                     15




                                          40                                                                                     10




                                          20                                                                          24         5




                                                             1
                                           0                                                                                     0
                                               Symantec   Kaspersky   Microsoft   Sophos   Malwarebytes   McAfee   Trend Micro


                                                                                                                                                  11
Insight: Faster than Traditional Scanning




                               Insight - Optimized Scanning
     Traditional Scanning       Skips any file we are sure is good,
      Has to scan every file    leading to much faster scan times
                                On a typical system, 70% of active
                                   applications can be skipped!
                                                                      12
Tests Prove SEP 12 Outperforms Competition

 Symantec Endpoint Protection 12 Scans:
  3.5X faster than McAfee
  2X faster than Microsoft


 Ranked 1st in overall Performance!

        160
        140
        120
        100
         80
         60
         40
         20
          0
              Symantec   Kaspersky   Trend Micro   Microsoft   Sophos   McAfee   Average

                                                                                           13
Lowest Memory Use
                              180.0

                              160.0

                              140.0

                              120.0

                              100.0

                               80.0

                               60.0

                               40.0

                               20.0

                                0.0
                                      Symantec   Kaspersky   Trend   McAfee   Sophos   Microsoft   Average
    Memory Usage                                             Micro


                                      Symantec Endpoint Protection 12 uses:
                                       66% less memory than McAfee
                                       76% less memory than Microsoft

PassMark™ Software, Feb., 2011 - http://www.passmark.com/AVReport                                            14
Built for Virtual Environments



 Virtual Client   Virtual Image   Shared Insight    Resource
    Tagging         Exception         Cache         Leveling




             Together – up to 90% reduction in disk IO



                                                               15
Symantec Endpoint Protection
Small Business Edition 12.1


       Fastest                •Powered by Symantec
                               Insight and SONAR
                              •Support for Macintosh
        Most Effective
                              •Faster Installs and
                               Upgrades
        Simple
                              •Smart Scanning


                                                     16
Solutions Tailored for Business of All Sizes




                                                                                         Servers, Desktops
                                                                                             & Laptops




                                                                    Servers, Desktops    Servers, Desktops
                                                                        & Laptops            & Laptops




                                             Servers, Desktops &    Servers, Desktops    Servers, Desktops
                                                  Laptops               & Laptops            & Laptops



  Servers, Desktops &   Desktops & Laptops   Desktops & Laptops    Desktops & Laptops   Desktops & Laptops
       Laptops

                                                                                                             17
What’s Right For Your Business?
                                              Endpoint
                                                               Endpoint
                  Feature                  Protection Small
                                                              Protection
                                           Business Edition
 Seats                                        5-99 seats      100+ seats
 Antivirus/Antispyware                            •               •
 Desktop Firewall                                 •               •
 Intrusion Detection/Prevention                   •               •
 Generic Exploit Blocking                         •               •
 Protection for Mac OS X and Windows              •               •
 Protection for Linux                                             •
 Device and Application Control                                   •
 Network Access Control Self-Enforcement                          •
 Flexible, granular policy management                             •
 Enhanced Virtualization Features                                 •

                                                                           18
Thank you!




SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2010 Symantec Corporation. All rights reserved.


                                                              19
Disclaimer



“Any forward-looking indication of plans for products is
  preliminary and all future release dates are tentative and are
  subject to change. Any future release of the product or planned
  modifications to product capability, functionality, or feature are
  subject to ongoing evaluation by Symantec, and may or may not
  be implemented and should not be considered firm
  commitments by Symantec and should not be relied upon in
  making purchasing decisions.”




                                                                   20

Weitere ähnliche Inhalte

Was ist angesagt?

KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
GS CHO
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
MindRiver Group
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 

Was ist angesagt? (20)

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 

Ähnlich wie Symantec Endpoint Protection 12

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Security and the Cloud- Symantec
Security and the Cloud- SymantecSecurity and the Cloud- Symantec
Security and the Cloud- Symantec
itnewsafrica
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
DefconRussia
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
 

Ähnlich wie Symantec Endpoint Protection 12 (20)

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
Security and the Cloud- Symantec
Security and the Cloud- SymantecSecurity and the Cloud- Symantec
Security and the Cloud- Symantec
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
2012 ab is-your-browser-putting-you-at-risk
2012 ab is-your-browser-putting-you-at-risk2012 ab is-your-browser-putting-you-at-risk
2012 ab is-your-browser-putting-you-at-risk
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Symantec Endpoint Protection 12

  • 1. Symantec Endpoint Protection 12 February 2011 1
  • 2. Jan, 2007 - 250,000 viruses Dec, 2009 – over 240 million 2
  • 3. Malware authors have switched tactics 75% of malware infect less than 50 machines From: To: A mass distribution of a A micro distribution model e.g. relatively few threats e.g.  The average Vundo variant is  Storm made its way onto millions distributed to 18 Symantec users! of machines across the globe  The average Harakit variant is distributed to 1.6 Symantec users! 3
  • 4. A Security Catastrophe… the growth in AV signatures 10,000,000 8,000,000 6,000,000 Signature based scanning 4,000,000 won’t keep up 2,000,000 0
  • 5. Introducing Symantec Endpoint Protection 12 Malware Protection What’s New Access Personal - Unrivaled Security Control Firewall  Insight Symantec  SONAR Endpoint - Blazing Performance Protection  Faster Scans App Intrusion Control Prevention - Built for Virtual Environments  Identify and Manage Virtual Device Clients Control  Reduced Scan Overheads 5
  • 6. Powered by Insight Proactive protection against new, mutating threats • puts files in context, using their age, frequency, location and more to expose threats otherwise missed • using community-based security ratings • derived from Symantec's more than 175 million endpoints 6
  • 7. How Insight Works Check the DB 4 during scans 2 Rate nearly 2.5 billion every file on the files internet 1 Build a 175 collection million network PCs Is it new? Bad reputation? Prevalence Age Source Provide 3 Look for 5 associations Behavior actionable data Associations
  • 8. Unrivaled Security Hackers mutate threats to evade fingerprints Mutated threats stick out like a sore thumb It’s a catch-22 for the virus writers – Mutate too much =Insight finds it – Mutate too little = Easy to discover & fingerprint 8
  • 9. SONAR – Completes the Protection Stack SONAR Network IPS & Browser • Monitors processes and Protect threads as they execute • Rates behaviors Insight • Feeds Insight Lookup File Based Protection – Sigs/Heuristics Only hybrid behavioral- reputation engine on the planet Real time Monitors 400 different behavioral application behaviors SONAR Selective sandbox (ex Adobe) 9
  • 10. Proven Most Effective in Real World Test 100% 100% 3.8% 13.5% 90% 90% 26.9% 3.8% 32.7% 80% 40.4% 80% 44.2% 70% 70% % of samples 3.8% 15.4% % False Positives 60% 60% 5.8% 3.8% 50% 50% 96.2% 40% 82.7% 40% 30% 63.5% 30% 57.7% 53.8% 51.9% 20% 20% Infected 10% 10% Partial Blocked 4% FP 0% 0% Symantec Sophos Kaspersky Trend Micro Microsoft McAfee 10
  • 11. Most Effective Remediation 120 30 110 100 104 25 Number of False Positives 94 93 Remediation Score 80 20 75 (higher is better) (lower is better) 69 60 15 40 10 20 24 5 1 0 0 Symantec Kaspersky Microsoft Sophos Malwarebytes McAfee Trend Micro 11
  • 12. Insight: Faster than Traditional Scanning Insight - Optimized Scanning Traditional Scanning Skips any file we are sure is good, Has to scan every file leading to much faster scan times On a typical system, 70% of active applications can be skipped! 12
  • 13. Tests Prove SEP 12 Outperforms Competition Symantec Endpoint Protection 12 Scans:  3.5X faster than McAfee  2X faster than Microsoft Ranked 1st in overall Performance! 160 140 120 100 80 60 40 20 0 Symantec Kaspersky Trend Micro Microsoft Sophos McAfee Average 13
  • 14. Lowest Memory Use 180.0 160.0 140.0 120.0 100.0 80.0 60.0 40.0 20.0 0.0 Symantec Kaspersky Trend McAfee Sophos Microsoft Average Memory Usage Micro Symantec Endpoint Protection 12 uses:  66% less memory than McAfee  76% less memory than Microsoft PassMark™ Software, Feb., 2011 - http://www.passmark.com/AVReport 14
  • 15. Built for Virtual Environments Virtual Client Virtual Image Shared Insight Resource Tagging Exception Cache Leveling Together – up to 90% reduction in disk IO 15
  • 16. Symantec Endpoint Protection Small Business Edition 12.1 Fastest •Powered by Symantec Insight and SONAR •Support for Macintosh Most Effective •Faster Installs and Upgrades Simple •Smart Scanning 16
  • 17. Solutions Tailored for Business of All Sizes Servers, Desktops & Laptops Servers, Desktops Servers, Desktops & Laptops & Laptops Servers, Desktops & Servers, Desktops Servers, Desktops Laptops & Laptops & Laptops Servers, Desktops & Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Laptops 17
  • 18. What’s Right For Your Business? Endpoint Endpoint Feature Protection Small Protection Business Edition Seats 5-99 seats 100+ seats Antivirus/Antispyware • • Desktop Firewall • • Intrusion Detection/Prevention • • Generic Exploit Blocking • • Protection for Mac OS X and Windows • • Protection for Linux • Device and Application Control • Network Access Control Self-Enforcement • Flexible, granular policy management • Enhanced Virtualization Features • 18
  • 19. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved. 19
  • 20. Disclaimer “Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.” 20