Symantec™ Endpoint Protection
Data Sheet: Endpoint Security
Symantec™ Endpoint Protection
The next generation of antivirus technology from Symantec
Overview
multiple endpoint security products. It provides a single
Advanced threat protection
agent that is administered via a single management console.
Symantec Endpoint Protection combines Symantec
This simplifies endpoint security administration and provides
AntiVirus™ with advanced threat prevention to deliver an
operational efficiencies such as single software updates and
unmatched defense against malware for laptops, desktops,
policy updates, unified and central reporting, and a single
and servers. It provides protection against even the most
licensing and maintenance program.
sophisticated attacks that evade traditional security
Symantec Endpoint Protection is easy to implement and
measures, such as rootkits, zero-day attacks, and
deploy. Symantec provides a range of consulting, technical
mutating spyware.
education, and support services that guide organizations
Symantec Endpoint Protection delivers more than world-class,
industry-leading antivirus and antispyware signature-based
protection. It also provides advanced threat prevention that
protects endpoints from targeted attacks and attacks not
seen before. It includes turnkey, proactive technologies that
automatically analyze application behaviors and network
communications to detect and block suspicious activities,
through the migration, deployment, and management of
the solution and help them realize the full value of their
investment. For organizations that want to outsource security
monitoring and management, Symantec also offers Managed
Security Services to deliver real-time security protection.
Single Agent
and Single Console
as well as administrative control features that allow you to
Antivirus
Antispyware
deny specific device and application activities deemed as
Increased
protection, control,
and manageability
Firewall
high risk for your organization. You can even block specific
actions based on the location of the user.
Results
Intrusion Prevention
Reduced cost,
complexity, and
risk exposure
Device Control
This multilayered approach significantly lowers risks and
gives you the confidence that your business assets are
A unified approach to endpoint protection
protected. It is a comprehensive product gives you all the
capabilities you need, now with the ability to enable the
Key benefits
pieces you need, as you need them. Whether the attack is
Secure
coming from a malicious insider or is externally motivated,
Comprehensive protection—Integrates best-of-breed
endpoints will be protected.
technologies to stop security threats—even from the most
Symantec Endpoint Protection increases protection and helps
lower your total cost of ownership by reducing administrative
overhead as well as the costs associated with managing
devious new and unknown attackers—before they penetrate
the network. Detects and blocks malicious software in real
time, including viruses, worms, Trojan horses, spyware,
adware, and rootkits.
Page 1 of 4
Data Sheet: Endpoint Security
Symantec Endpoint Protection
Proactive protection—New Proactive Threat Scan uses a
Lower cost of ownership—Symantec Endpoint Protection
unique Symantec technology to score both good and bad
delivers a lower total cost of ownership by reducing
behaviors of unknown applications, enhancing detection
administrative overhead as well as the costs associated
and reducing false positives without the need to create
with managing multiple endpoint security products. This
rule-based configurations.
unified approach to endpoint security simplifies administration
and provides operational efficiencies such as single software
Industry-best threat landscape intelligence—Symantec’s
updates and policy updates, unified and central reporting,
protection mechanisms leverage the industry-leading
and a single licensing and maintenance program.
Global Intelligence Network to deliver an unparalleled view
of the entire Internet threat landscape. This intelligence
Seamless
results in actionable protection and peace of mind against
Easy to install, configure, and manage—Symantec Endpoint
evolving attacks.
Protection makes it easy to enable/disable and configure
desired technologies to fit into your environment.
Simple
Single agent, single console—Integrates a full range of
Symantec Network Access Control ready—Each endpoint
security technologies into a single agent and a centralized
becomes “Symantec Network Access Control ready,” elimi-
management console, with an intuitive user interface and
nating the need to deploy additional network access control
Web-based graphical reporting. Enables you to set and
endpoint agent software.
enforce security policies across the enterprise to protect
Leverages existing security technologies and IT
your critical assets. Simplifies management, reduces system
investments—Works with other leading antivirus vendors,
resource usage, and requires no additional agents when
firewalls, IPS technologies, and network access control
adding Symantec Network Access Control support. Symantec
infrastructures. Also works with leading software deployment
Network Access Control features are automatically enabled
tools, patch management tools, and security information
on the agent and management console with the purchase of
management tools.
a license.
Easy to deploy—Because it requires only a single agent and
Key features
management console and operates with an organization’s
More than antivirus
existing security and IT investments, Symantec Endpoint
Antivirus and antispyware—Provides unmatched, best-of-
Protection is easy to implement and deploy. For organizations
breed malware protection, including market-leading
that want to outsource security monitoring and management,
antivirus protection, enhanced spyware protection, new
Symantec offers Managed Security Services to deliver
rootkit protection, reduced memory footprint, and new
real-time security protection.
dynamic performance adjustments to keep users productive.
Page 2 of 4
Data Sheet: Endpoint Security
Symantec Endpoint Protection
Network threat protection—Offers a rules-based firewall
System requirements
engine and Generic Exploit Blocking (GEB) that blocks
Symantec Endpoint Protection Client
malware before it can enter a system.
(Protection software for server, desktop, and laptop systems)
• Operating system supported:
Proactive threat protection—Provides protection for unseen
threats (i.e., zero-day threats). Includes Proactive Threat Scan,
which does not rely on a signatures.
Single agent and single management console—Provides
antivirus, antispyware, desktop firewall, IPS, device control,
and network access control (with the purchase of a
Microsoft® Windows Vista™
32-bit
64-bit
X
X
Microsoft Windows® 2003
X
X
Microsoft Windows XP
X
X
Microsoft Windows 2000 (SP3 and later)
X
Symantec Endpoint Protection Manager
• Operating system supported:
Symantec Network Access Control license) on a single
agent—all managed by a single management console.
Symantec Endpoint Protection product family
Symantec
Endpoint
Protection
Antivirus
Antispyware
X
X
Symantec
Endpoint
Protection
Small Business
Edition
Symantec
Multi-Tier
Protection
X
X
X
X
X
X
X
Intrusion prevention
X
X
X
Device control
X
X
X
X
X
Symantec Mail Security
for Domino®
Symantec Mail Security
for SMTP
X
Microsoft Windows XP
X
Microsoft Windows 2000 (SP3 and later)
X
Symantec Endpoint Protection Manager Console
32-bit
64-bit
Microsoft Windows Vista
X
X
Microsoft Windows 2003
X
X
Microsoft Windows XP
X
X
Microsoft Windows 2000 (SP3 and later)
X
Symantec AntiVirus for Linux® Client
• Linux distribution supported:
X
32-bit
X
Shaded area = Centrally managed via a single agent and single console.
Page 3 of 4
64-bit
X
• Operating system supported:
Desktop firewall
Symantec Mail Security
for Microsoft® Exchange
32-bit
Microsoft Windows 2003
Red Hat® Enterprise Linux
X
SuSE Linux Enterprise (Server/Desktop)
X
Novell® Open Enterprise Server
X
VMware ESX
X
64-bit
Data Sheet: Endpoint Security
Symantec Endpoint Protection
Additional administrator tools
More information
Symantec Quarantine Console
Visit our Web site
• Operating system supported: Microsoft Windows 2003,
www.symantec.com/endpoint
Microsoft Windows XP, Microsoft Windows 2000 (SP3
To speak with a Product Specialist in the U.S.
and later)
Call toll-free 1 (800) 745 6054
Symantec Central Quarantine
To speak with a Product Specialist outside the U.S.
• Operating system supported: Microsoft Windows 2003,
For specific country offices and contact numbers, please
Microsoft Windows XP, Microsoft Windows 2000 (SP3
visit our Web site.
and later)
About Symantec
• Free disk space: 500 MB to 4 GB disk space recommended
Symantec is a global leader in infrastructure software,
for quarantined items
enabling businesses and consumers to have confidence
• Browser: Microsoft Internet Explorer Version 5.5 SP2
in a connected world. The company helps customers
protect their infrastructure, information, and interactions
LiveUpdate Administrator
by delivering software and services that address risks
• Operating system supported: Windows 2000, 2003, XP
to security, availability, compliance, and performance.
• CPU: P4 1.8 GHz
Headquartered in Cupertino, Calif., Symantec has
• RAM: 512 MB
operations in 40 countries. More information is available
• Free disk space: 5 GB
at www.symantec.com.
• Browser: Microsoft Internet Explorer Version 5.5 SP2,
Internet Explorer 6.0 and later, Netscape 7.0, and Mozilla
Symantec World Headquarters
Firefox 1.5 and later
20330 Stevens Creek Boulevard
Cupertino, CA 95014 USA
+1 (408) 517 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Symantec AntiVirus are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Microsoft, Internet Explorer, Windows, and Windows Vista are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. Other names may be
trademarks of their respective owners. Printed in the U.S.A.
05/07
12516465
Page 4 of 4
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement