Symantec Endpoint Protection PDF
Symantec Endpoint Protection PDF
Symantec Endpoint Protection PDF
At-a-Glance
Protect endpoints from all attack vectors at industry • Integrate with EDR for incident investigation and response
leading efficacy with a single agent architecture leveraging the same SEP agent
• Defend against ransomware and other emerging threats with • Integrate with existing IT infrastructure for automation
multilayered protection that fuses signatureless technologies and orchestration with open-APIs
like advanced machine learning, behavior analysis and exploit
Enable business with a high-performance,
prevention with proven protection capabilities like intrusion
lightweight solution
prevention, reputation analysis and more
• Optimize content update frequency for endpoints with
• Gain enhanced visibility into suspicious files via tunable
network bandwidth constraints without compromising
protection to make better policy decisions
security efficacy
• Use deception techniques to expose hidden adversaries and
• Boost performance with a lightweight agent and virus
determine their intent to improve security posture
definition sets that require minimal network bandwidth
• Shield commonly used applications against vulnerability
usage (70% less compared to SEP12)
exploits and isolate suspicious applications from malicious
• Speed detection with advanced design techniques and
activity
patented real-time cloud lookup that delivers faster
Realize integrated cyber defense at scale scanning times (15% faster compared to SEP12)
• Detect threats anywhere and respond with SEP by
integrating with network security infrastructure such as
web and email gateways
Introduction
With the constant evolving nature of today’s IT environment, So what can security teams do to address cyber attacks?
attackers are using more sophisticated attacks to infiltrate Managing multiple point products and technologies is
networks and the endpoint represents the last line of defense. overwhelming and challenges mount when managing security
Organizations are more concerned about cyber damage and across multiple geographies with diverse operation systems
disruption as ransomware attacks are trending upward as was and platforms. With limited resources and limited budgets,
evident with the WannaCry and Petya outbreaks. In addition, security teams want easy-to-manage technologies that can
the attackers’ expanding use of file-less and stealthy attacks integrate with each other to improve overall security. They do
combined with “living off the land” (leveraging common IT not need “just another point product.” See Figure 1.
tools for attacks) threatens the confidentiality, integrity, and
availability of endpoint assets.
Anti-malware
Advanced
Deception Malware
Protection
Symantec
Endpoint
Protection
14
Exploit Endpoint
Prevention Detection &
Response
Application
Control
Figure 3.
SEP Hardening:
DECEPTION
• Comprehensive application security by minimizing the
SEP Deception1 plants deceptors (i.e. baits) to expose attack surface.
hidden adversaries and reveal attacker intent and tactics • Unprecedented visibility by discovering and categorizing
via early visibility, so that the information can be used to all endpoint applications.
enhance security posture. SEP Deception features accurate • Fastest speed to value by leveraging SEP’s single agent
and insightful detection while delivering fast time to value. architecture.
Joint Symantec Endpoint Protection and Symantec Managed
Security Services customers benefit from 24x7 real-time
SEP Deception monitoring and response by a global team of
experts. Symantec is the only endpoint protection platform
vendor offering deception.
1
Consulting services are required to configure and deploy the SEP Deception feature.
Realize Integrated Cyber Benchmark tests for Windows 7 and Windows 10. Visit the
Symantec Performance Center for additional third-party
Defense at Scale validation symantec.com/products/performance-center.
Most large organizations support global IT environments
Significant performance increases within SEP include:
that are becoming increasingly complex. Many implemented
• Reducing content update sizes by 70%2
solutions only do a very specific job. Therefore, organizations
• Delivering 15% faster detection scan times2
need an endpoint protection solution that provides greater
value and better overall protection by integrating with other Compared to emerging vendors, SEP offers less endpoint
IT security solutions to share intelligence and defend the complexity by bundling multiple capabilities in a single,
network together. lightweight agent. Attempting to match Symantec endpoint
security capabilities would require multiple emerging vendors,
SEP 14 is a foundational product that facilitates integration
multiple solutions, and certainly multiple agents.
so that IT security teams can detect threats anywhere in
their network and address these threats with orchestrated
responses. SEP 14 works alongside Symantec solutions (for
example, as a key component of the Integrated Cyber Defense
Platform and with 3rd party products (via published APIs) to
strengthen security posture. Symantec’s Integrated Cyber
Defense Platform unifies cloud and on-premises security to
protect users, information, messaging and the web, powered
by unparalleled threat intelligence. No other vendor provides
an integrated solution that orchestrates a response at the
endpoint (blacklists and remediation) triggered by the
detection of a threat at the network gateway (i.e. web and
email security gateways).
2
Gains from SEP 12 to SEP 14.
About Symantec: Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most
important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints,
cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their
digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most
advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
350 Ellis St., Mountain View, CA 94043 USA | +1 (650) 527 8000 | 1 (800) 721 3934 | www.symantec.com
Copyright © 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. SYMC_DS_SEP14_CloudGeneration_EN_v1a