0% found this document useful (0 votes)
64 views

Symantec Endpoint Security Data Sheet

Uploaded by

sumeet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

Symantec Endpoint Security Data Sheet

Uploaded by

sumeet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Symantec Endpoint Security

FEATURES

SEP SES ENTERPRISE SES COMPLETE


Industry standard in Endpoint Extends SEP to all OSs and Adds advanced protection,
Protection. 5 years running all devices including mobile. EDR, threat hunting, and
as #1 Protection & now also Offers cloud management. other technologies for
#1 Performance by AV Test. complete protection.

MANAGEMENT
OPTIONS
On-Premises On-Premises Cloud Hybrid

AGENTS REQUIRED  SINGLE SYMANTEC AGENT 

DEVICE COVERAGE
Corporate Owned, BYOD, UYOD
Laptop Desktop Server Mobile Tablet Laptop Desktop Server

OS COVERAGE Windows macOS Linux Windows macOS iOS Linux Android


(including S Mode & Arm)

PROTECTION TECHNOLOGIES
SEP SES ENTERPRISE SES COMPLETE
ATTACK PREVENTION

Delivers defense in-depth capabilities, including:


INDUSTRY-BEST • Antimalware • Advanced Machine Learning
ANTI-MALWARE • Behavior Based Prevention • Memory Exploit Mitigation
Powered by Advanced • Intensive Protection
Machine Learning

MOBILE THREAT Predicts, detects and prevents physical, malware, network and vulnerability exploits to protect
DEFENSE businesses from mobile cyber attacks.

SECURE NETWORK Protects modern devices from network attacks when users work in public areas and are on
CONNECTION non-corporate networks.

ATTACK SURFACE REDUCTION

BREACH Continuously simulates breaches and attacks to find misconfigurations and backdoors that lead
ASSESSMENT to total compromise.

BEHAVIORAL
Reduces attack surface by preventing authorized applications from running malicious code.
ISOLATION

APPLICATION
Reduces attack surface by allowing only authorized applications to run.
CONTROL

DEVICE Prevents malicious code injection and intellectual property theft by managing USB removable
CONTROL storage device usage on endpoints.

BREACH PREVENTION

INTRUSION Detects and blocks inbound network and web attacks as well as malicious outgoing traffic to
PREVENTION Command & Control servers through deep packet inspection.

FIREWALL Manages network access using default and custom policies.

Plants deceptors (i.e. baits) to expose hidden adversaries and reveal attacker intent and tactics
DECEPTION
via early visibility.

ACTIVE DIRECTORY Prevents breaches and lateral movement at the endpoint by identifying Active Directory based
SECURITY credential misuse.

RESPONSE & REMEDIATION

ENDPOINT DETECTION Empowers your SOC with actionable intelligence, behavioral forensics, and advanced investigation
& RESPONSE and response tools.

TARGETED ATTACK Applies machine learning across telemetry from all Symantec endpoint customers to detect new
CLOUD ANALYTICS attacks and provide recommended actions.

BEHAVIORAL Records activities from all processes on the endpoint and can be remotely retrieved and searched
FORENSICS to assist in investigations and threat hunting.

THREAT Super charges your SOC with the combined power of Machine Learning & Symantec's Expert
HUNTER Threat Hunters to help identify high fidelity incidents.

RAPID Remediate endpoints rapidly and ensure threat does not return.
RESPONSE

IT OPERATIONS

DISCOVER
Discover unmanaged devices using network scanning and remotely enroll and secure them.
& DEPLOY

HOST INTEGRITY Define, enforce and remediate the security of clients to ensure that endpoints are protected
CHECKS and compliant with your company's security policies.

For product information and a complete list of distributors, visit our website at: broadcom.com
Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
SES_SESE_SESC_Features_Technologies

You might also like