Symantec Endpoint Protection
Symantec Endpoint Protection
Listed at Mar 8, 2024

The Symantec Endpoint Security Suite provides attack prevention, detection and response for endpoints in an organization. It provides a broad feature set including traditional and machine-learning based prevention measures, Endpoint Detection and Response (EDR), application control, and deception technology.

Show more
Sort by:
  • 26% Off
Symantec Endpoint Protection 14 for 3 Year Subscription License Symantec Endpoint Protection 14 for 3 Year Subscription License
Symantec Endpoint Protection 14 for 3 Year Subscription License
Availability: In Stock
108.00 145.00

3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Endpoint Protection 14 fuses Artificial intelligence with critical endpoint technologies to deliver the most complete endpoint security on the planet.

Stronger, faster, lighter

  • Symantec Endpoint Protection 14 reduces bandwidth usage and definition file sizes by 70 percent over previous versions.
  • Our proprietary real-time cloud lookup enables faster scanning times.
  • Supports machine learning, exploit prevention, Endpoint Detection and Response (EDR), and antimalware, from one single agent.
  • Reduce total cost of ownership and IT resources via automated updates.
  • READ THE REPORT

Respond and protect at scale

  • Integrates seamlessly with Symantec Blue Coat ProxySG web gateway and other security controls via programmable APIs to respond smartly at the endpoint.
  • See and manage all your endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems.
  • Ensure the most current protection with self-updating endpoint agents and extended LiveUpdate Administrator capabilities to support security patching.

175 million endpoints at your service

  • Symantec's global intelligence network of 175 million endpoints and our advanced machine learning technologies allow you to detect threats more accurately.
  • Advanced machine learning done right: Stop unknown threats with advanced machine learning AI to deliver maximum protection at the endpoint with minimal false positives.
  • Wrap your endpoints in multi-layered protection—artificial intelligence in the cloud, combined with critical endpoint technologies creates the most threat-resistant endpoint security in the world.
  • Block zero-day attacks that prey on memory-based vulnerabilities in many popular applications with memory exploit mitigation.

For more information, download the Symantec Endpoint Protection 14 datasheet here.

  • 8% Off
Symantec Protection Suite Enterprise Edition One-Year Subscription License Symantec Protection Suite Enterprise Edition One-Year Subscription License
Symantec Protection Suite Enterprise Edition One-Year Subscription License
Availability: In Stock
380.00 415.00

1-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Protection Suite Enterprise Edition - Multilayered Protection from Endpoint to Gateway

Securing your business is challenging, but made easier with Symantec Protection Suite Enterprise Edition. Protect against more threats and secure your environment against data loss, malware, and spam by accurately identifying and addressing risks consistently across different platforms. Multiple layers of protection fuse next generation and essential technologies to ensure you are accurately identifying and addressing risks while delivering consistent protection in both physical and virtual environments. Symantec combines the broad spectrum of necessary security protections across your endpoint with industry-leading messaging infrastructure to keep you safe.

  • Fastest, most effective security - Powered by next generation and essential technologies, you can confidently protect your infrastructure with industry-leading endpoint and messaging security, with data protection solutions built to secure your physical and virtual environments.
  • Layered security and intelligence - efficiently manage your endpoint and mail system’s security with real time actionable intelligence across protection technologies.
  • More protection, for less - Increase the security posture across your IT infrastructure, while reducing upfront and ongoing IT costs and force out unnecessary complexity.

The products included within the Symantec Protection Suite Enterprise Edition are:

  • Symantec Endpoint Protection (Windows, Linux, and Macintosh)
  • Symantec Mail Security for Microsoft Exchange
  • Symantec Messaging Gateway
  • 27% Off
Symantec Endpoint Security Complete 3-Year Subscription License Symantec Endpoint Security Complete 3-Year Subscription License
Symantec Endpoint Security Complete 3-Year Subscription License
Availability: In Stock
510.00 699.00

3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Prevent attacks early in the attack chain before a full breach occurs. Only Symantec delivers attack and breach prevention, response and remediation across the attack chain.

Symantec Endpoint Security Complete provides your organization with ultimate security at the endpoint. It stops endpoint compromise with superior next gen protection technologies that span the attack chain. Innovative prevention and proactive attack surface reduction technologies provide the strongest defense against the hardest to detect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, automated investigation playbooks, and industry first lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.

Protections for All Phases of the Attack Lifecycle

Pre-Attack Surface Reduction

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Attack Prevention

Multilayer attack prevention immediately and effectively protects against file-based and fileless attack vectors and methods. Machine learning and artificial intelligence use advanced device and cloud-based detection schemes to identify evolving threats across device types, operating systems, and applications. Attacks are blocked in real-time to maintain endpoint integrity and avoid negative impacts.

  • Malware Prevention combines signature-based methods (file and website reputation analysis and antivirus scanning) and pre-execution detection and blocking of new and evolving threats (advanced machine learning, sandboxing to detect malware hidden in custom packers, and suspicious file behavioral monitoring and blocking).
  • Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
  • Intensive Protection enables fine-grained tuning of the level of detection and blocking separately to optimize protection and gain enhanced visibility into suspicious files.
  • Network Connection Security identifies rogue Wi-Fi networks and utilizes hotspot reputation technology and delivers a policy-driven VPN to protect network connections and support compliance.

Breach Prevention

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Response and Remediation

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Click here to download a datasheet on Symantec Endpoint Security.

  • 17% Off
Symantec Endpoint Security Enterprise for One Year Subscription License Symantec Endpoint Security Enterprise for One Year Subscription License
Symantec Endpoint Security Enterprise for One Year Subscription License
Availability: In Stock
125.00 150.00

1-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Endpoint Security Enterprise offers Industry-leading protection for all devices with cloud, on-premises, or hybrid management.

Symantec Endpoint Security Enterprise delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints.

  • Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks).
  • Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • Manage smarter. Work less. Intelligent automation and AI-guided policy management enhance administrator productivity; Symantec experts fortify SOC teams to meet customer needs without hiring additional headcount.
  • Manage everything in one place. Integrated Cyber Defense Manager (ICDm) is a single cloud management console that strengthens overall endpoint security posture.
  • Endpoint security delivered your way. With a single agent, protection across traditional and mobile devices, and on-prem, cloud or hybrid management.

Click here to download a datasheet on Symantec Endpoint Security.

  • 23% Off
Symantec Ghost Solution Suite  One Year Subscription License Symantec Ghost Solution Suite  One Year Subscription License
Symantec Ghost Solution Suite One Year Subscription License
Availability: In Stock
120.00 155.00

Symantec Academic & Non-Profit licenses are for sale to K-12 Schools, Community Colleges, Universities, IRS 501c3 Non-Profit Organizations and Churches in the US only.

1-Year Subscription License

Symantec Ghost Solution Suite is an industry leading and award-winning solution for deploying and managing desktops, laptops, tablets, and servers. From a single management console, you can quickly and easily migrate to the latest operating systems, inventory machines, deploy software, and perform custom configurations across multiple hardware platforms and OS types including Windows, Mac, and Linux.

Easy to use Management Console

With Symantec Ghost Solution Suite 3.3 you can do everything you need to manage your systems to manage your systems from within a single console without leaving your desk. Use the intuitive and fast interface to build jobs to perform all of your computer management tasks. A single job can include every step needed to provision and manage a machine, including disk configuration, OS deployment, network configuration, and software deployment.

  • Simply drag a Windows, Mac, or Linux job onto a computer or group of computers, and then run it immediately or schedule it for after hours. It is that easy.
  • The console includes multi-casting capabilities, support for adding, modifying, and deleting computers, jobs and tasks, and support for managing virtual computers and thin clients.
  • It is also easy to restrict access to console functions and managed systems with role-and-scope-based security, so only authorized staff can access and manage appropriate systems.
  • Our centralized management console increases IT productivity and helps lower the total cost of ownership (TCO) for desktops, laptops, tablets, and servers.

Simplified Inventory, Software, and Settings

OS deployment and configuration is only part of the battle. Once a computer is in day-to-day usage, ongoing tasks like inventory, software management, and basic asset management are also important areas that must be addressed.

Symantec Ghost Solution Suite 3.3 makes it fast and easy to deploy, configure, and upgrade software on managed devices including being able to group machines based on application versions for easy targeting.

Symantec Ghost Solution Suite also enables power users to perform advanced automation and customized scripting. Whether it is support for server-side scripting or conditional error handling, Ghost Solution Suite provides nparalleled job and task management.

Technician’s Web Console

Symantec Ghost Solution Suite 3.3 includes a web-based console designed specifically for technicians with minimal experience. It complements the full console and is simple to use with built-in wizards for common tasks such as Windows 10 migration and image deployment. The console also has a modern UI and works with any browser.

With the web console, frequently run jobs can be delegated to frontline technicians to optimize resources and reduce costs. The web console is also highly scalable, so a large number of technicians can use it simultaneously.

Quick Tasks

Quick tasks allow you to schedule existing jobs, move computers to groups or to add new computers for immediate provisioning of images. Quick tasks can simplify complex processes into step-by-step flows that will make even the newest admin feel like a pro.

Job Creation Wizards

Job Creation Wizards provide step-by-step guides to create the most common jobs executed in the console. These wizards allow users to quickly learn how to create jobs and ensure consistency throughout the process. Jobs can be deployed using the web console and can also be edited further in the standard Symantec Ghost Solution Suite console.

Faster Imaging

A significant part of the time required for imaging machines is booting into automation. The longer a machine takes to get into automation, the longer the overall imaging process takes. Symantec Ghost Solution Suite 3.3 supports iPXE which delivers a dramatic speed improvement to the pre-boot automation process. iPXE shortens the overall downtime during deployment activities and gets the end user back to productivity quicker

  • 23% Off
Symantec Protection Suite Enterprise Edition 3-Year Subscription License Symantec Protection Suite Enterprise Edition 3-Year Subscription License
Symantec Protection Suite Enterprise Edition 3-Year Subscription License
Availability: In Stock
318.00 415.00

3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Protection Suite Enterprise Edition - Multilayered Protection from Endpoint to Gateway

Securing your business is challenging, but made easier with Symantec Protection Suite Enterprise Edition. Protect against more threats and secure your environment against data loss, malware, and spam by accurately identifying and addressing risks consistently across different platforms. Multiple layers of protection fuse next generation and essential technologies to ensure you are accurately identifying and addressing risks while delivering consistent protection in both physical and virtual environments. Symantec combines the broad spectrum of necessary security protections across your endpoint with industry-leading messaging infrastructure to keep you safe.

  • Fastest, most effective security - Powered by next generation and essential technologies, you can confidently protect your infrastructure with industry-leading endpoint and messaging security, with data protection solutions built to secure your physical and virtual environments.
  • Layered security and intelligence - efficiently manage your endpoint and mail system’s security with real time actionable intelligence across protection technologies.
  • More protection, for less - Increase the security posture across your IT infrastructure, while reducing upfront and ongoing IT costs and force out unnecessary complexity.

The products included within the Symantec Protection Suite Enterprise Edition are:

  • Symantec Endpoint Protection (Windows, Linux, and Macintosh)
  • Symantec Mail Security for Microsoft Exchange
  • Symantec Messaging Gateway
  • 20% Off
Symantec Endpoint Security Enterprise for 3 Year Subscription License Symantec Endpoint Security Enterprise for 3 Year Subscription License
Symantec Endpoint Security Enterprise for 3 Year Subscription License
Availability: In Stock
120.00 150.00

3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Endpoint Security Enterprise offers Industry-leading protection for all devices with cloud, on-premises, or hybrid management.

Symantec Endpoint Security Enterprise delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints.

  • Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks).
  • Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • Manage smarter. Work less. Intelligent automation and AI-guided policy management enhance administrator productivity; Symantec experts fortify SOC teams to meet customer needs without hiring additional headcount.
  • Manage everything in one place. Integrated Cyber Defense Manager (ICDm) is a single cloud management console that strengthens overall endpoint security posture.
  • Endpoint security delivered your way. With a single agent, protection across traditional and mobile devices, and on-prem, cloud or hybrid management.

Click here to download a datasheet on Symantec Endpoint Security.

  • 21% Off
Symantec Ghost Solution Suite 3-Year Subscription License Symantec Ghost Solution Suite 3-Year Subscription License
Symantec Ghost Solution Suite 3-Year Subscription License
Availability: In Stock
110.00 140.00

Symantec Academic & Non-Profit licenses are for sale to K-12 Schools, Community Colleges, Universities, IRS 501c3 Non-Profit Organizations and Churches in the US only.

3-Year Subscription License

Symantec Ghost Solution Suite is an industry leading and award-winning solution for deploying and managing desktops, laptops, tablets, and servers. From a single management console, you can quickly and easily migrate to the latest operating systems, inventory machines, deploy software, and perform custom configurations across multiple hardware platforms and OS types including Windows, Mac, and Linux.

Easy to use Management Console

With Symantec Ghost Solution Suite 3.3 you can do everything you need to manage your systems to manage your systems from within a single console without leaving your desk. Use the intuitive and fast interface to build jobs to perform all of your computer management tasks. A single job can include every step needed to provision and manage a machine, including disk configuration, OS deployment, network configuration, and software deployment.

  • Simply drag a Windows, Mac, or Linux job onto a computer or group of computers, and then run it immediately or schedule it for after hours. It is that easy.
  • The console includes multi-casting capabilities, support for adding, modifying, and deleting computers, jobs and tasks, and support for managing virtual computers and thin clients.
  • It is also easy to restrict access to console functions and managed systems with role-and-scope-based security, so only authorized staff can access and manage appropriate systems.
  • Our centralized management console increases IT productivity and helps lower the total cost of ownership (TCO) for desktops, laptops, tablets, and servers.

Simplified Inventory, Software, and Settings

OS deployment and configuration is only part of the battle. Once a computer is in day-to-day usage, ongoing tasks like inventory, software management, and basic asset management are also important areas that must be addressed.

Symantec Ghost Solution Suite 3.3 makes it fast and easy to deploy, configure, and upgrade software on managed devices including being able to group machines based on application versions for easy targeting.

Symantec Ghost Solution Suite also enables power users to perform advanced automation and customized scripting. Whether it is support for server-side scripting or conditional error handling, Ghost Solution Suite provides nparalleled job and task management.

Technician’s Web Console

Symantec Ghost Solution Suite 3.3 includes a web-based console designed specifically for technicians with minimal experience. It complements the full console and is simple to use with built-in wizards for common tasks such as Windows 10 migration and image deployment. The console also has a modern UI and works with any browser.

With the web console, frequently run jobs can be delegated to frontline technicians to optimize resources and reduce costs. The web console is also highly scalable, so a large number of technicians can use it simultaneously.

Quick Tasks

Quick tasks allow you to schedule existing jobs, move computers to groups or to add new computers for immediate provisioning of images. Quick tasks can simplify complex processes into step-by-step flows that will make even the newest admin feel like a pro.

Job Creation Wizards

Job Creation Wizards provide step-by-step guides to create the most common jobs executed in the console. These wizards allow users to quickly learn how to create jobs and ensure consistency throughout the process. Jobs can be deployed using the web console and can also be edited further in the standard Symantec Ghost Solution Suite console.

Faster Imaging

A significant part of the time required for imaging machines is booting into automation. The longer a machine takes to get into automation, the longer the overall imaging process takes. Symantec Ghost Solution Suite 3.3 supports iPXE which delivers a dramatic speed improvement to the pre-boot automation process. iPXE shortens the overall downtime during deployment activities and gets the end user back to productivity quicker

  • 27% Off
Symantec Web Protection Suite One-Year Subscription License Symantec Web Protection Suite One-Year Subscription License
Symantec Web Protection Suite One-Year Subscription License
Availability: In Stock
400.00 550.00

1-Year Subscription License.

Symantec Web Protection Suite gives organizations an advanced cloud-delivered Secure Web Gateway and leading on-premises Secure Web Gateway (SWG) deployment – both of which can operate seamlessly together with a unified management, reporting and policy control interface. It also includes Threat Intelligence, SSL Inspection, Content Analysis, Isolation, Sandboxing, WAF and more.

The Symantec Web Protection Suite is suitable for customers who are considering cloud SWG adoption, yet would like flexibility to begin this journey now, or any time in the future. The Suite also serves as an entry level SASE foundation enabling secure and fast access for any user, from any device, located anywhere protecting users, devices and data from known and unknown threats across all locations (Remote, branch, and HQ).

The cloud-native SWG facet of this solution differs from others in the market that are run from single purpose Data Centers and fail to protect against advanced threats.

The cloud SWG is deployed across a cloud-native, hyper-scaling and high performant infrastructure built on top of a leading CSP (Google). It is directly on the same backbone delivering YouTube, Google’s Ad Network and other world class services.

Symantec Web Protection Suite – What’s Included:

  • Symantec Web Security Service. Included in base license. This cloud-based service includes Content filtering, SSL Interception, Anti-Malware scanning, reporting for 100 days, Explicit Proxy, IPsec VPN, and WSS Agent. Also supports integration to Symantec DLP and CASB and Symantec Endpoint Security.
  • Symantec Proxy Virtual or Physical Appliances. Included in base license. For every 100 users of WPS, one Proxy processing core is available for on-prem deployment, whether virtual, in a private cloud or on dedicated Symantec Hardware (SSP-410 appliances – sold separately).
  • Content Analysis System Virtual or Physical Appliances. Included in base license. For every 100 users of WPS, two Content Analysis processing cores are available for on-prem deployment, whether virtual, in a private cloud or on dedicated Symantec Hardware (SSP-410 appliances – sold separately).
  • Intelligence Service Advanced. Included in base license. This adds Symantec’s per-URL risk level ratings, access to the CASB applications, and geo-location data feeds.
  • High Risk Isolation. Included in base license. This cloud-based service provides Remote Web Browser Isolation applicable to high risk and uncategorized sites for both the cloud Web Security Service and Symantec Proxy virtual appliances.
  • Management Center Virtual Appliance. Included in base license
  • Cloud SWG Reporting. Included in base license. Includes 100 days of storage.
  • Reporter Virtual Appliance. Included in base license. Includes 100 days of storage.
  • Malware Analysis Standard. Included in base license. This cloud-based service extends the Anti-Malware scanning with emulation-based sandboxing.
  • Web Application Firewall. Included in base license. WAF license can be used with ProxySG virtual appliances.

 

  • 8% Off
Symantec Endpoint Security Complete One Year Subscription License Symantec Endpoint Security Complete One Year Subscription License
Symantec Endpoint Security Complete One Year Subscription License
Availability: In Stock
560.00 610.00

1-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Prevent attacks early in the attack chain before a full breach occurs. Only Symantec delivers attack and breach prevention, response and remediation across the attack chain.

Symantec Endpoint Security Complete provides your organization with ultimate security at the endpoint. It stops endpoint compromise with superior next gen protection technologies that span the attack chain. Innovative prevention and proactive attack surface reduction technologies provide the strongest defense against the hardest to detect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, automated investigation playbooks, and industry first lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.

Protections for All Phases of the Attack Lifecycle

Pre-Attack Surface Reduction

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Attack Prevention

Multilayer attack prevention immediately and effectively protects against file-based and fileless attack vectors and methods. Machine learning and artificial intelligence use advanced device and cloud-based detection schemes to identify evolving threats across device types, operating systems, and applications. Attacks are blocked in real-time to maintain endpoint integrity and avoid negative impacts.

  • Malware Prevention combines signature-based methods (file and website reputation analysis and antivirus scanning) and pre-execution detection and blocking of new and evolving threats (advanced machine learning, sandboxing to detect malware hidden in custom packers, and suspicious file behavioral monitoring and blocking).
  • Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
  • Intensive Protection enables fine-grained tuning of the level of detection and blocking separately to optimize protection and gain enhanced visibility into suspicious files.
  • Network Connection Security identifies rogue Wi-Fi networks and utilizes hotspot reputation technology and delivers a policy-driven VPN to protect network connections and support compliance.

Breach Prevention

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Response and Remediation

Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk.
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks.
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices.
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps.

Click here to download a datasheet on Symantec Endpoint Security.

  • 15% Off
Symantec Endpoint Protection 14 for One Year Subscription License Symantec Endpoint Protection 14 for One Year Subscription License
Symantec Endpoint Protection 14 for One Year Subscription License
Availability: In Stock
110.00 130.00

1-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.

Symantec Endpoint Protection 14 fuses Artificial intelligence with critical endpoint technologies to deliver the most complete endpoint security on the planet.

Stronger, faster, lighter

  • Symantec Endpoint Protection 14 reduces bandwidth usage and definition file sizes by 70 percent over previous versions.
  • Our proprietary real-time cloud lookup enables faster scanning times.
  • Supports machine learning, exploit prevention, Endpoint Detection and Response (EDR), and antimalware, from one single agent.
  • Reduce total cost of ownership and IT resources via automated updates.
  • READ THE REPORT

Respond and protect at scale

  • Integrates seamlessly with Symantec Blue Coat ProxySG web gateway and other security controls via programmable APIs to respond smartly at the endpoint.
  • See and manage all your endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems.
  • Ensure the most current protection with self-updating endpoint agents and extended LiveUpdate Administrator capabilities to support security patching.

175 million endpoints at your service

  • Symantec's global intelligence network of 175 million endpoints and our advanced machine learning technologies allow you to detect threats more accurately.
  • Advanced machine learning done right: Stop unknown threats with advanced machine learning AI to deliver maximum protection at the endpoint with minimal false positives.
  • Wrap your endpoints in multi-layered protection—artificial intelligence in the cloud, combined with critical endpoint technologies creates the most threat-resistant endpoint security in the world.
  • Block zero-day attacks that prey on memory-based vulnerabilities in many popular applications with memory exploit mitigation.

For more information, download the Symantec Endpoint Protection 14 datasheet here.

  • 17% Off
Symantec Web Security Service One-Year Subscription License Symantec Web Security Service One-Year Subscription License
Symantec Web Security Service One-Year Subscription License
Availability: In Stock
270.00 325.00

1-Year Subscription License.

Symantec Web Security Service - cloud-delivered network security service enforces comprehensive internet security and data compliance policies, regardless of location or device.

Increasing web use, rapid cloud adoption, and greater numbers of mobile and remote users are exposing your network to additional risk. Symantec Web Security Service (WSS) is an indispensable line of defense against modern day cyber threats. It provides secure web services, enables enterprises to control access, protects users from threats, and secures their sensitive data.

Your Data and Apps are moving to the cloud – So can your security

Advanced cloud and web security services to protect applications like Office 365

Moving to the cloud introduces new security and compliance risks, but it also enables tremendous new defensive strategies. Cloud-delivered network security adds flexibility and boosts performance, while protecting users with consistent threat prevention and data compliance policies—wherever they go.

Symantec Web Security Service delivers a broad set of advanced capabilities—including a secure web gateway (SWG), software defined perimeter, anti-virus scanning, sandboxing, web isolation, data loss prevention (DLP), and email security. As your users directly access the web, you can extend consistent policies that follow your sensitive data wherever it goes.

  • Secure Access Cloud – Apply Zero Trust Access to your IaaS applications
  • Web Isolation—Prevent websites from delivering zero-day malware to employees.
  • Symantec Endpoint Integrations – Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Mobile (SEP Mobile) can be added for complete laptop and mobile device protection.

Consolidate your security stack

Simplify with our cloud-delivered network security service

Don't waste time and effort stitching together point products. Instead, select a complete web and cloud security service that gives you the protection, threat prevention and compliance capabilities your business needs to stay secure. Our full arsenal of WSS technologies offers broad and deep protection.

  • Broad network security service with SWG, web isolation, anti-virus scanning, sandboxing, DLP, CASB, and email security capabilities.
  • Innovative threat prevention to block more threats and minimize false positives.
  • Unparalleled DLP/DRM service to prevent exfiltration of sensitive or proprietary data.
  • Strong SSL inspection capability to find malware hidden in encrypted traffic.
  • Shadow IT control for more than 30,000 applications; set proxy policies to govern access to cloud applications, extending to a full CASB service.
  • Office 365 security enforces DLP and threat prevention security policies.

Strong, central Web and cloud access governance.

Consistently apply network security policies across web and cloud applications

Protect users with web and cloud security services that connect all devices to distributed, global data centers for reliable, high-performance, local service. Configure and enforce powerful web and cloud application access-control policies.

  • Set policies based on website content-based classifications and threat risk levels.
  • Classify URLs in 70 categories covering more than 55 languages.
  • Authenticate users and enforce user, group, and location-based security controls.
  • Control employee access to Shadow IT cloud apps (unsanctioned cloud applications).
  • Enable application-level point-to-point connectivity, cloaking all resources from the end-user devices and the internet

Protect users from threats hiding in encrypted Web and cloud traffic.

Advanced proxy architecture delivers SWG and Advanced Threat Protection capabilities

Symantec Web Security Service protects your organization from cyber attacks using an advanced proxy architecture that terminates, inspects, and controls high volumes of web and cloud traffic, even when it's SSL/TLS encrypted. Our proxy architecture combats advanced threats, secures your information, and protects your users wherever they go. It's built to meet the challenges of the Cloud Generation.

  • Advanced proxy architecture—Enforce granular threat inspection policies for encrypted web traffic and traffic from cloud apps such as Box and Office 365.
  • Browsing threat prevention/web isolation—Use isolation to combat the latest generation of threats targeting users' email and web browsing.
  • File threat prevention—Block high-risk and advanced threats with multilayer file inspection and customizable sandboxing.
  • Threat Risk Levels—Set web access policies based on a URL’s relative level of threat risk.

Industry leading NGFW security controls for all internet traffic.

Cloud Firewall Service extends protection to all internet traffic, covering all ports and protocols

A simple add-on for Web Security Service enables customers to manage non-web internet traffic in the cloud for all users, regardless of where they are located. This ensures consistent policies are applied and provides easy-to-access, centralized visibility and reporting on internet use.

Symantec Cloud Firewall Service allows you to:

  • Configure policy to block traffic based any TCP/UDP port
  • Set policy (allow/deny) based on authenticated User/Groups, as well as Source and/or Destination criteria
  • Use dashboards and reports to monitor data connections and traffic volume details (such as applications and protocols)

 

 


busy...