Symantec Endpoint Security Enterprise Hybrid Subscription License with Support 1-99 Devices 1Y

25


. Symantec Endpoint Security provides your organization with ultimate security at the endpoint. It stops endpoint compromise with superior next-gen protection technologies that span the attack chain. Innovative prevention and proactive attack surface reduction technologies provide the strongest defense against the hardest-to-detect threats that rely on stealthy malware credential theft fileless and living off the land attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics automated investigation playbooks and lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real timeKey Product Info . Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated riskBreach Assessment continuously probes Active Directory for domain misconfigurations vulnerabilities and persistence using attack simulations to identify risksDevice Control specifies block or allow policies on different types of devices that attach to client computers such as USB infrared and FireWire devicesApp Isolation and; App Control allows only known good applications to run shields known-good applications to prevent attackers from exploiting application vulnerabilities and isolates unknown appsMalware Prevention combines signature-based methods (file and website reputation analysis and antivirus scanning) and pre-execution detection and blocking of new and evolving threats (advanced machine learning sandboxing to detect malware hidden in custom packers and suspicious file behavioral monitoring and blocking)Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular softwareIntensive Protection enables fine-grained tuning of the level of detection and blocking separately to optimize protection and gain enhanced visibility into suspicious filesNetwork Connection Security identifies rogue Wi-Fi networks and utilizes hotspot reputation technology and delivers a policy-driven VPN to protect network connections and support complianceIntrusion prevention and firewall blocks known network and browser-based malware attacks using rules and policies and prevents command and control setup with automated domain IP address blacklistingIntegrated Response takes direct action on the endpoint to remediate - retrieving files deleting files isolating endpoints and blacklisting