Symantec Endpoint Security Data Sheet
Symantec Endpoint Security Data Sheet
FEATURES
MANAGEMENT
OPTIONS
On-Premises On-Premises Cloud Hybrid
DEVICE COVERAGE
Corporate Owned, BYOD, UYOD
Laptop Desktop Server Mobile Tablet Laptop Desktop Server
PROTECTION TECHNOLOGIES
SEP SES ENTERPRISE SES COMPLETE
ATTACK PREVENTION
MOBILE THREAT Predicts, detects and prevents physical, malware, network and vulnerability exploits to protect
DEFENSE businesses from mobile cyber attacks.
SECURE NETWORK Protects modern devices from network attacks when users work in public areas and are on
CONNECTION non-corporate networks.
BREACH Continuously simulates breaches and attacks to find misconfigurations and backdoors that lead
ASSESSMENT to total compromise.
BEHAVIORAL
Reduces attack surface by preventing authorized applications from running malicious code.
ISOLATION
APPLICATION
Reduces attack surface by allowing only authorized applications to run.
CONTROL
DEVICE Prevents malicious code injection and intellectual property theft by managing USB removable
CONTROL storage device usage on endpoints.
BREACH PREVENTION
INTRUSION Detects and blocks inbound network and web attacks as well as malicious outgoing traffic to
PREVENTION Command & Control servers through deep packet inspection.
Plants deceptors (i.e. baits) to expose hidden adversaries and reveal attacker intent and tactics
DECEPTION
via early visibility.
ACTIVE DIRECTORY Prevents breaches and lateral movement at the endpoint by identifying Active Directory based
SECURITY credential misuse.
ENDPOINT DETECTION Empowers your SOC with actionable intelligence, behavioral forensics, and advanced investigation
& RESPONSE and response tools.
TARGETED ATTACK Applies machine learning across telemetry from all Symantec endpoint customers to detect new
CLOUD ANALYTICS attacks and provide recommended actions.
BEHAVIORAL Records activities from all processes on the endpoint and can be remotely retrieved and searched
FORENSICS to assist in investigations and threat hunting.
THREAT Super charges your SOC with the combined power of Machine Learning & Symantec's Expert
HUNTER Threat Hunters to help identify high fidelity incidents.
RAPID Remediate endpoints rapidly and ensure threat does not return.
RESPONSE
IT OPERATIONS
DISCOVER
Discover unmanaged devices using network scanning and remotely enroll and secure them.
& DEPLOY
HOST INTEGRITY Define, enforce and remediate the security of clients to ensure that endpoints are protected
CHECKS and compliant with your company's security policies.
For product information and a complete list of distributors, visit our website at: broadcom.com
Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
SES_SESE_SESC_Features_Technologies